Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment_Advice-pdf.exe

Overview

General Information

Sample name:Payment_Advice-pdf.exe
Analysis ID:1407051
MD5:d5f853358e53cae39dba60601507842c
SHA1:c76532dba79ec69659b4cdb8adddbc8417662d76
SHA256:d202f0b84b0e2a15c1c90284d0286b8b497e245e6b083e7b98294e1227d52925
Tags:agentteslaexezgrat
Infos:

Detection

AgentTesla, PureLog Stealer, RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected PureLog Stealer
Yara detected RedLine Stealer
.NET source code contains method to dynamically call methods (often used by packers)
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Payment_Advice-pdf.exe (PID: 7348 cmdline: C:\Users\user\Desktop\Payment_Advice-pdf.exe MD5: D5F853358E53CAE39DBA60601507842C)
    • RegSvcs.exe (PID: 7400 cmdline: C:\Users\user\Desktop\Payment_Advice-pdf.exe MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • Payment_Advice-pdf.exe (PID: 7408 cmdline: C:\Users\user\Desktop\Payment_Advice-pdf.exe MD5: D5F853358E53CAE39DBA60601507842C)
      • RegSvcs.exe (PID: 7436 cmdline: C:\Users\user\Desktop\Payment_Advice-pdf.exe MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"Exfil Mode": "SMTP", "Host": "webmail.wapination.net", "Username": "work2@wapination.net", "Password": "sync@#1235"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.1718278629.0000000003B10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000002.00000002.1718278629.0000000003B10000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x700:$s3: 83 EC 38 53 B0 DC 88 44 24 2B 88 44 24 2F B0 05 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1e9d0:$s5: delete[]
      • 0x1de88:$s6: constructor or from DllMain.
      00000003.00000002.2910016483.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000003.00000002.2910016483.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
        • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
        • 0x1300:$s3: 83 EC 38 53 B0 DC 88 44 24 2B 88 44 24 2F B0 05 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
        • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
        • 0x1fdd0:$s5: delete[]
        • 0x1f288:$s6: constructor or from DllMain.
        00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 21 entries
          SourceRuleDescriptionAuthorStrings
          3.2.RegSvcs.exe.400000.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            3.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x1300:$s3: 83 EC 38 53 B0 DC 88 44 24 2B 88 44 24 2F B0 05 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1fdd0:$s5: delete[]
            • 0x1f288:$s6: constructor or from DllMain.
            2.2.Payment_Advice-pdf.exe.3b10000.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              2.2.Payment_Advice-pdf.exe.3b10000.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
              • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
              • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
              • 0x700:$s3: 83 EC 38 53 B0 DC 88 44 24 2B 88 44 24 2F B0 05 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
              • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
              • 0x1e9d0:$s5: delete[]
              • 0x1de88:$s6: constructor or from DllMain.
              3.2.RegSvcs.exe.5270000.6.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 67 entries

                System Summary

                barindex
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 108.179.234.136, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7436, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49729
                Timestamp:03/11/24-20:53:08.961460
                SID:2855542
                Source Port:49729
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:03/11/24-20:53:08.961460
                SID:2855245
                Source Port:49729
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:03/11/24-20:53:08.961460
                SID:2851779
                Source Port:49729
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:03/11/24-20:53:08.961460
                SID:2840032
                Source Port:49729
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:03/11/24-20:53:08.961460
                SID:2839723
                Source Port:49729
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:03/11/24-20:53:08.961460
                SID:2030171
                Source Port:49729
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "webmail.wapination.net", "Username": "work2@wapination.net", "Password": "sync@#1235"}
                Source: Payment_Advice-pdf.exeReversingLabs: Detection: 39%
                Source: Payment_Advice-pdf.exeJoe Sandbox ML: detected
                Source: Payment_Advice-pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: Payment_Advice-pdf.exe, 00000000.00000003.1687668588.0000000004520000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000000.00000003.1687896314.0000000004380000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000002.00000003.1715589602.00000000043D0000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000002.00000003.1716789021.0000000004230000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Payment_Advice-pdf.exe, 00000000.00000003.1687668588.0000000004520000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000000.00000003.1687896314.0000000004380000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000002.00000003.1715589602.00000000043D0000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000002.00000003.1716789021.0000000004230000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00FF4696
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00FFC9C7
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFC93C FindFirstFileW,FindClose,0_2_00FFC93C
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FFF200
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FFF35D
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FFF65E
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FF3A2B
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FF3D4E
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FFBF27

                Networking

                barindex
                Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49729 -> 108.179.234.136:587
                Source: TrafficSnort IDS: 2855245 ETPRO TROJAN Agent Tesla Exfil via SMTP 192.168.2.4:49729 -> 108.179.234.136:587
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49729 -> 108.179.234.136:587
                Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49729 -> 108.179.234.136:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49729 -> 108.179.234.136:587
                Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.4:49729 -> 108.179.234.136:587
                Source: global trafficTCP traffic: 192.168.2.4:49729 -> 108.179.234.136:587
                Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                Source: global trafficTCP traffic: 192.168.2.4:49729 -> 108.179.234.136:587
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_010025E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_010025E2
                Source: unknownDNS traffic detected: queries for: webmail.wapination.net
                Source: RegSvcs.exe, 00000003.00000002.2911331278.0000000002C97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wapination.net
                Source: RegSvcs.exe, 00000003.00000002.2911331278.0000000002C97000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://webmail.wapination.net
                Source: RegSvcs.exe, 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, n00.cs.Net Code: tDNRtEPwKHh
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_0100425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0100425A
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_01004458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_01004458
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_0100425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0100425A
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF0219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00FF0219
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_0101CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0101CDAC

                System Summary

                barindex
                Source: 3.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 2.2.Payment_Advice-pdf.exe.3b10000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 3.2.RegSvcs.exe.5270000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.Payment_Advice-pdf.exe.4330000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 3.2.RegSvcs.exe.296fd06.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.5270000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 3.2.RegSvcs.exe.296ee1e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3c92d90.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3c46458.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3c45570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.5270ee8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.296ee1e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.52c0000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3c45570.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000002.00000002.1718278629.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000003.00000002.2910016483.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000000.00000002.1690019977.0000000004330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: This is a third-party compiled AutoIt script.0_2_00F93B4C
                Source: Payment_Advice-pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: Payment_Advice-pdf.exe, 00000000.00000000.1660729703.0000000001045000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_181fccf8-b
                Source: Payment_Advice-pdf.exe, 00000000.00000000.1660729703.0000000001045000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_88900613-4
                Source: Payment_Advice-pdf.exe, 00000002.00000002.1717704814.0000000001045000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_47a21124-0
                Source: Payment_Advice-pdf.exe, 00000002.00000002.1717704814.0000000001045000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_3c24b215-8
                Source: Payment_Advice-pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fd1d7335-6
                Source: Payment_Advice-pdf.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_28cc7be0-b
                Source: initial sampleStatic PE information: Filename: Payment_Advice-pdf.exe
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF40B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00FF40B1
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FE8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00FE8858
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00FF545F
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F9E8000_2_00F9E800
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FBDBB50_2_00FBDBB5
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F9FE400_2_00F9FE40
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F9E0600_2_00F9E060
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_0101804A0_2_0101804A
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FA41400_2_00FA4140
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FB24050_2_00FB2405
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FC65220_2_00FC6522
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FC267E0_2_00FC267E
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_010106650_2_01010665
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FA68430_2_00FA6843
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FB283A0_2_00FB283A
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FC89DF0_2_00FC89DF
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FC6A940_2_00FC6A94
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FA8A0E0_2_00FA8A0E
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_01010AE20_2_01010AE2
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF8B130_2_00FF8B13
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FEEB070_2_00FEEB07
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FBCD610_2_00FBCD61
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FC70060_2_00FC7006
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FA31900_2_00FA3190
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FA710E0_2_00FA710E
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F912870_2_00F91287
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FB33C70_2_00FB33C7
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FBF4190_2_00FBF419
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FB16C40_2_00FB16C4
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FA56800_2_00FA5680
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FB78D30_2_00FB78D3
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FA58C00_2_00FA58C0
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FB1BB80_2_00FB1BB8
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FC9D050_2_00FC9D05
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FBBFE60_2_00FBBFE6
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FB1FD00_2_00FB1FD0
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_019B37900_2_019B3790
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 2_2_021A37902_2_021A3790
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00408C603_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040DC113_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00407C3F3_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00418CCC3_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00406CA03_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004028B03_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041A4BE3_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00408C603_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004182443_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004016503_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402F203_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004193C43_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004187883_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402F893_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402B903_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004073A03_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0279D6203_2_0279D620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0279CA083_2_0279CA08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02790FD03_2_02790FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_027910303_2_02791030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0279CD503_2_0279CD50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0586AF883_2_0586AF88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0586E7C03_2_0586E7C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0586E0683_2_0586E068
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05868C183_2_05868C18
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_058600073_2_05860007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_058650183_2_05865018
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_058600403_2_05860040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_062D56B03_2_062D56B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_062D95E03_2_062D95E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_062D43383_2_062D4338
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_062D06383_2_062D0638
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_062D78A83_2_062D78A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05868C0A3_2_05868C0A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_058663993_2_05866399
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 43 times
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: String function: 00FB8B40 appears 42 times
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: String function: 00FB0D27 appears 70 times
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: String function: 00F97F41 appears 35 times
                Source: Payment_Advice-pdf.exe, 00000000.00000003.1687896314.00000000044A3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Payment_Advice-pdf.exe
                Source: Payment_Advice-pdf.exe, 00000000.00000003.1687668588.000000000464D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Payment_Advice-pdf.exe
                Source: Payment_Advice-pdf.exe, 00000000.00000002.1690019977.0000000004330000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameae4aab88-00c5-495e-a909-8e351a823b52.exe4 vs Payment_Advice-pdf.exe
                Source: Payment_Advice-pdf.exe, 00000002.00000002.1718278629.0000000003B10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameae4aab88-00c5-495e-a909-8e351a823b52.exe4 vs Payment_Advice-pdf.exe
                Source: Payment_Advice-pdf.exe, 00000002.00000003.1716789021.0000000004353000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Payment_Advice-pdf.exe
                Source: Payment_Advice-pdf.exe, 00000002.00000003.1717022595.00000000044FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Payment_Advice-pdf.exe
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: wldp.dllJump to behavior
                Source: Payment_Advice-pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 3.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 2.2.Payment_Advice-pdf.exe.3b10000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 3.2.RegSvcs.exe.5270000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.Payment_Advice-pdf.exe.4330000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 3.2.RegSvcs.exe.296fd06.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.5270000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 3.2.RegSvcs.exe.296ee1e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3c92d90.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3c46458.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3c45570.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.5270ee8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.296ee1e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.52c0000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3c45570.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000002.00000002.1718278629.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000003.00000002.2910016483.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000000.00000002.1690019977.0000000004330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, NpXw3kw.csCryptographic APIs: 'TransformFinalBlock'
                Source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, NpXw3kw.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@1/1
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFA2D5 GetLastError,FormatMessageW,0_2_00FFA2D5
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FE8713 AdjustTokenPrivileges,CloseHandle,0_2_00FE8713
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FE8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00FE8CC3
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00FFB59E
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_0100F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0100F121
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFC602 CoInitialize,CoCreateInstance,CoUninitialize,0_2_00FFC602
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F94FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00F94FE9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeFile created: C:\Users\user\AppData\Local\Temp\aut2D03.tmpJump to behavior
                Source: Payment_Advice-pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Payment_Advice-pdf.exeReversingLabs: Detection: 39%
                Source: unknownProcess created: C:\Users\user\Desktop\Payment_Advice-pdf.exe C:\Users\user\Desktop\Payment_Advice-pdf.exe
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\Desktop\Payment_Advice-pdf.exe
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess created: C:\Users\user\Desktop\Payment_Advice-pdf.exe C:\Users\user\Desktop\Payment_Advice-pdf.exe
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\Desktop\Payment_Advice-pdf.exe
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\Desktop\Payment_Advice-pdf.exeJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess created: C:\Users\user\Desktop\Payment_Advice-pdf.exe C:\Users\user\Desktop\Payment_Advice-pdf.exeJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\Desktop\Payment_Advice-pdf.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: Payment_Advice-pdf.exeStatic file information: File size 1210368 > 1048576
                Source: Payment_Advice-pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: Payment_Advice-pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: Payment_Advice-pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: Payment_Advice-pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Payment_Advice-pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: Payment_Advice-pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: Payment_Advice-pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: Payment_Advice-pdf.exe, 00000000.00000003.1687668588.0000000004520000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000000.00000003.1687896314.0000000004380000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000002.00000003.1715589602.00000000043D0000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000002.00000003.1716789021.0000000004230000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Payment_Advice-pdf.exe, 00000000.00000003.1687668588.0000000004520000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000000.00000003.1687896314.0000000004380000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000002.00000003.1715589602.00000000043D0000.00000004.00001000.00020000.00000000.sdmp, Payment_Advice-pdf.exe, 00000002.00000003.1716789021.0000000004230000.00000004.00001000.00020000.00000000.sdmp
                Source: Payment_Advice-pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Payment_Advice-pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Payment_Advice-pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Payment_Advice-pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Payment_Advice-pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation

                barindex
                Source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_0100C304 LoadLibraryA,GetProcAddress,0_2_0100C304
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF8719 push FFFFFF8Bh; iretd 0_2_00FF871B
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FBE94F push edi; ret 0_2_00FBE951
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FBEA68 push esi; ret 0_2_00FBEA6A
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FB8B85 push ecx; ret 0_2_00FB8B98
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FBEC43 push esi; ret 0_2_00FBEC45
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FBED2C push edi; ret 0_2_00FBED2E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C40C push cs; iretd 3_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00423149 push eax; ret 3_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C50E push cs; iretd 3_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004231C8 push eax; ret 3_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040E21D push ecx; ret 3_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C6BE push ebx; ret 3_2_0041C6BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040BB97 push dword ptr [ecx-75h]; iretd 3_2_0040BBA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0279475F push ebx; retf 3_2_02794762
                Source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'fd23WFlLRaXj9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'fd23WFlLRaXj9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'fd23WFlLRaXj9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'fd23WFlLRaXj9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'fd23WFlLRaXj9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F94A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F94A35
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_010155FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_010155FD
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FB33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00FB33C7
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,3_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2290Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 495Jump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-98435
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeAPI coverage: 4.7 %
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00FF4696
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00FFC9C7
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFC93C FindFirstFileW,FindClose,0_2_00FFC93C
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FFF200
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FFF35D
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FFF65E
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FF3A2B
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FF3D4E
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FFBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FFBF27
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F94AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F94AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99342Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegSvcs.exe, 00000003.00000002.2913306699.00000000055C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-97769
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-97835
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_010041FD BlockInput,0_2_010041FD
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F93B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F93B4C
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FC5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00FC5CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,3_2_004019F0
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_0100C304 LoadLibraryA,GetProcAddress,0_2_0100C304
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_019B3680 mov eax, dword ptr fs:[00000030h]0_2_019B3680
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_019B3620 mov eax, dword ptr fs:[00000030h]0_2_019B3620
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_019B1ED0 mov eax, dword ptr fs:[00000030h]0_2_019B1ED0
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 2_2_021A3680 mov eax, dword ptr fs:[00000030h]2_2_021A3680
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 2_2_021A3620 mov eax, dword ptr fs:[00000030h]2_2_021A3620
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 2_2_021A1ED0 mov eax, dword ptr fs:[00000030h]2_2_021A1ED0
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FE81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00FE81F7
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FBA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FBA395
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FBA364 SetUnhandledExceptionFilter,0_2_00FBA364
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004123F1 SetUnhandledExceptionFilter,3_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 82A008Jump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FE8C93 LogonUserW,0_2_00FE8C93
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F93B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F93B4C
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F94A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F94A35
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF4EF5 mouse_event,0_2_00FF4EF5
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\Desktop\Payment_Advice-pdf.exeJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\Desktop\Payment_Advice-pdf.exeJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FE81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00FE81F7
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FF4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00FF4C03
                Source: Payment_Advice-pdf.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: Payment_Advice-pdf.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FB886B cpuid 0_2_00FB886B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,3_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FC50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00FC50D7
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FD2230 GetUserNameW,0_2_00FD2230
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00FC418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00FC418A
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_00F94AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F94AFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296fd06.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296ee1e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c92d90.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c46458.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c45570.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296ee1e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.52c0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c45570.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911331278.0000000002C8F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911331278.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911331278.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7436, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296fd06.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296ee1e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c92d90.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c46458.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c45570.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296ee1e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.52c0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c45570.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.Payment_Advice-pdf.exe.3b10000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment_Advice-pdf.exe.4330000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1718278629.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2910016483.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1690019977.0000000004330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: Payment_Advice-pdf.exeBinary or memory string: WIN_81
                Source: Payment_Advice-pdf.exeBinary or memory string: WIN_XP
                Source: Payment_Advice-pdf.exeBinary or memory string: WIN_XPe
                Source: Payment_Advice-pdf.exeBinary or memory string: WIN_VISTA
                Source: Payment_Advice-pdf.exeBinary or memory string: WIN_7
                Source: Payment_Advice-pdf.exeBinary or memory string: WIN_8
                Source: Payment_Advice-pdf.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296fd06.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296ee1e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c92d90.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c46458.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c45570.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296ee1e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.52c0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c45570.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911331278.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7436, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296fd06.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296ee1e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c92d90.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c46458.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c45570.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296ee1e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.52c0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c45570.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911331278.0000000002C8F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911331278.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911331278.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7436, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296fd06.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296ee1e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c92d90.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296fd06.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c92d90.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c46458.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c46458.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c45570.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270ee8.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.296ee1e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.52c0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.5270ee8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.52c0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3c45570.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.Payment_Advice-pdf.exe.3b10000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Payment_Advice-pdf.exe.4330000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1718278629.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2910016483.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1690019977.0000000004330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_01006596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_01006596
                Source: C:\Users\user\Desktop\Payment_Advice-pdf.exeCode function: 0_2_01006A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_01006A5A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts2
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                121
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                Software Packing
                NTDS48
                System Information Discovery
                Distributed Component Object Model121
                Input Capture
                1
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                11
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Valid Accounts
                Cached Domain Credentials121
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items121
                Virtualization/Sandbox Evasion
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Payment_Advice-pdf.exe39%ReversingLabsWin32.Spyware.RedLine
                Payment_Advice-pdf.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://wapination.net0%Avira URL Cloudsafe
                http://webmail.wapination.net0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                wapination.net
                108.179.234.136
                truetrue
                  unknown
                  webmail.wapination.net
                  unknown
                  unknowntrue
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://account.dyn.com/RegSvcs.exe, 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmpfalse
                      high
                      http://wapination.netRegSvcs.exe, 00000003.00000002.2911331278.0000000002C97000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://webmail.wapination.netRegSvcs.exe, 00000003.00000002.2911331278.0000000002C97000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      108.179.234.136
                      wapination.netUnited States
                      46606UNIFIEDLAYER-AS-1UStrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1407051
                      Start date and time:2024-03-11 20:52:09 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 35s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:8
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Payment_Advice-pdf.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@7/6@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 97%
                      • Number of executed functions: 63
                      • Number of non-executed functions: 262
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: Payment_Advice-pdf.exe
                      TimeTypeDescription
                      20:53:06API Interceptor14x Sleep call for process: RegSvcs.exe modified
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      UNIFIEDLAYER-AS-1USQuotation MEW Tender 2024.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                      • 50.87.186.52
                      RFQ__ PO-7647454645_PDF.exeGet hashmaliciousAgentTeslaBrowse
                      • 162.144.32.209
                      copia TT allegata.exeGet hashmaliciousAgentTeslaBrowse
                      • 162.144.32.209
                      ADSFDGHJs#U034fx#U034fl#U034fx#U034f..exeGet hashmaliciousFormBookBrowse
                      • 162.144.32.209
                      N270-10-MR-1671-01.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                      • 50.87.186.52
                      OUTSTANDING PO.exeGet hashmaliciousFormBookBrowse
                      • 162.144.32.209
                      ENQUIRY FOR QUOTATION.exeGet hashmaliciousAgentTeslaBrowse
                      • 162.144.32.209
                      PAYMENT.exeGet hashmaliciousAgentTeslaBrowse
                      • 162.144.32.209
                      Urgent request for a quote.exeGet hashmaliciousAgentTeslaBrowse
                      • 162.144.32.209
                      Your file name without extension goes here.exeGet hashmaliciousAgentTeslaBrowse
                      • 162.144.32.209
                      No context
                      No context
                      Process:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):264840
                      Entropy (8bit):7.979091056058801
                      Encrypted:false
                      SSDEEP:6144:AXRz06bY2/m1cbRvarB/y66KQQDGiYEIq6xHSP2JXs:AB4yY2/WByVuDaECs
                      MD5:D8492D83BD53179EC16D989EFD544AAA
                      SHA1:CA4C609A72604D54A5AB76D610B7C38E6C0331F1
                      SHA-256:1E111E592DD3BC208C69D986A684479A2CEFE6A485022B1334B1C476152F1BD2
                      SHA-512:A2F8341B65C33671085E37D2C43B9F5DB2E3040D02476197E3047148DE0242EC8A2864225361A8CABF74B7B1B2C60FB7AC498CAD1F1C84EB73CB3F7EE7971790
                      Malicious:false
                      Reputation:low
                      Preview:EA06..........Q...T..T.Sf....g...5j...;4 ....Oe..}.._..~.HFn.g...V)L.w#..%7i.J.,.M.3I...@.].........r.Dn.[.....,..m7..f.n.j$....g...e.....I.q.V..~uz.v).....w.L.3]..........n.N.`..BQ!... ..."u...0h...y..4|..".9..F!2..)u..2.M..*....(.8W@.....8.Vj.@...V...3A....Y.T(..u..Q...\..f..q...gB..1bJ...boD...T..OE.P.2.Z-6R...ei5J...s......I..&.y...8........p...JH.W...U.1...A6..T........@.G....`...J.#..l..E......:......Q1....GP..'Z...[7.U.......Q....@%...;..?..b4..~g4.m.S:.?.'....y...A.L..M.bk.....v7...f1...#5..I....g...Q...MFg>.Ph..6...n.Y......T.......E9...g.5.N.Yj..-...2..2.5..u.9...M...+G*.V....e.M...(X9.^....p.pH..4.C+u.g3{.....j_..G.]9.nD........K.7...r.\+.I........w..m&.F...jM7....,....}..Ph..&.....W..._._h[.?..D.S.B...M}...1.'w]<.....R....../..A..Vz..d.i..k....&.. |.n.Q..`.Z.b_Q..ZH.S.O.I..gg.o.6;.i...Z.W...L.....&tp....S(.../ .M(.x....s.WY=V...O..H. ...s.@..~!`...@..;......F>cD...2=`.z*...Z......R+..s(T.......W...=e.U...%6oD..a.h'+..........~.@*.J
                      Process:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):13304
                      Entropy (8bit):7.697592806507836
                      Encrypted:false
                      SSDEEP:384:vQyiU2jt8U6p8NYTdAStRkOg3Pi7zjqlZs:oyiU25KXeStRng/i7zjAS
                      MD5:91E0641787386F0C21B7B6D779B0495D
                      SHA1:31D8E3679EC80C28CC9126D5866FFCB4191C8ECF
                      SHA-256:367F1FC0E0F877C80302AA511C99ACD7099999A747A8446FAC23657E7D680D20
                      SHA-512:37DE19DC6379E47D66E2CEC3E6AA198949BF001CFFD6AB831FC0580FB8F975463C24C1F8DA4128B6365286885A50C64FFC88EDD9A935EA8084075C8DA0BDDD3D
                      Malicious:false
                      Reputation:low
                      Preview:EA06.....g....{6....y..`."Lf@....=.L......."m1..@...t.@......p.@.......R.@....m3.u..H.qN..2.o.Lf3..n.f.....[..9..9t...,.p.....J.S....@.Z........~.+32..@*......U......U...b.S.....S...&.U ..........c......K.....`.........e.....~.p..L.(.....V.............h...7.O...?..O..<6.+.x.`............N..............z@.....A4..../..-..(d........@7.P'?...S@7?..Q.........@#).+....1.a............p..@. eL....`.........8.........w...........&...Ho.j....Xd.....k~.Yy....3PMO...........5....<.6.....s8...f.._.........._..z..;.....2..`u..........`u.......A....hX.....-..%b`...),M.=...V..=..I.V..*.6..........U..?.x...W....;....`.......X..r.. ...'..............s..'..S..L.9s....'!..X}~&.(..`r..Q..........:..0.. ...`...)....O... .....f.9..X..@. *..b#-.g.....}.|.@..o\.......<....._..G....+..'>@g....A...R..n.'.......n.{...L.'....f.W..9..Nn....f..Nt.....h.@O6.?........a...p'#........*.&.'....[.'.h=v..{5.......=..;|.....l)g...*..%. .........}....@.....f '...ICs....^`._....s`...M. N......p...`.c.....
                      Process:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):264840
                      Entropy (8bit):7.979091056058801
                      Encrypted:false
                      SSDEEP:6144:AXRz06bY2/m1cbRvarB/y66KQQDGiYEIq6xHSP2JXs:AB4yY2/WByVuDaECs
                      MD5:D8492D83BD53179EC16D989EFD544AAA
                      SHA1:CA4C609A72604D54A5AB76D610B7C38E6C0331F1
                      SHA-256:1E111E592DD3BC208C69D986A684479A2CEFE6A485022B1334B1C476152F1BD2
                      SHA-512:A2F8341B65C33671085E37D2C43B9F5DB2E3040D02476197E3047148DE0242EC8A2864225361A8CABF74B7B1B2C60FB7AC498CAD1F1C84EB73CB3F7EE7971790
                      Malicious:false
                      Reputation:low
                      Preview:EA06..........Q...T..T.Sf....g...5j...;4 ....Oe..}.._..~.HFn.g...V)L.w#..%7i.J.,.M.3I...@.].........r.Dn.[.....,..m7..f.n.j$....g...e.....I.q.V..~uz.v).....w.L.3]..........n.N.`..BQ!... ..."u...0h...y..4|..".9..F!2..)u..2.M..*....(.8W@.....8.Vj.@...V...3A....Y.T(..u..Q...\..f..q...gB..1bJ...boD...T..OE.P.2.Z-6R...ei5J...s......I..&.y...8........p...JH.W...U.1...A6..T........@.G....`...J.#..l..E......:......Q1....GP..'Z...[7.U.......Q....@%...;..?..b4..~g4.m.S:.?.'....y...A.L..M.bk.....v7...f1...#5..I....g...Q...MFg>.Ph..6...n.Y......T.......E9...g.5.N.Yj..-...2..2.5..u.9...M...+G*.V....e.M...(X9.^....p.pH..4.C+u.g3{.....j_..G.]9.nD........K.7...r.\+.I........w..m&.F...jM7....,....}..Ph..&.....W..._._h[.?..D.S.B...M}...1.'w]<.....R....../..A..Vz..d.i..k....&.. |.n.Q..`.Z.b_Q..ZH.S.O.I..gg.o.6;.i...Z.W...L.....&tp....S(.../ .M(.x....s.WY=V...O..H. ...s.@..~!`...@..;......F>cD...2=`.z*...Z......R+..s(T.......W...=e.U...%6oD..a.h'+..........~.@*.J
                      Process:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):13304
                      Entropy (8bit):7.697592806507836
                      Encrypted:false
                      SSDEEP:384:vQyiU2jt8U6p8NYTdAStRkOg3Pi7zjqlZs:oyiU25KXeStRng/i7zjAS
                      MD5:91E0641787386F0C21B7B6D779B0495D
                      SHA1:31D8E3679EC80C28CC9126D5866FFCB4191C8ECF
                      SHA-256:367F1FC0E0F877C80302AA511C99ACD7099999A747A8446FAC23657E7D680D20
                      SHA-512:37DE19DC6379E47D66E2CEC3E6AA198949BF001CFFD6AB831FC0580FB8F975463C24C1F8DA4128B6365286885A50C64FFC88EDD9A935EA8084075C8DA0BDDD3D
                      Malicious:false
                      Reputation:low
                      Preview:EA06.....g....{6....y..`."Lf@....=.L......."m1..@...t.@......p.@.......R.@....m3.u..H.qN..2.o.Lf3..n.f.....[..9..9t...,.p.....J.S....@.Z........~.+32..@*......U......U...b.S.....S...&.U ..........c......K.....`.........e.....~.p..L.(.....V.............h...7.O...?..O..<6.+.x.`............N..............z@.....A4..../..-..(d........@7.P'?...S@7?..Q.........@#).+....1.a............p..@. eL....`.........8.........w...........&...Ho.j....Xd.....k~.Yy....3PMO...........5....<.6.....s8...f.._.........._..z..;.....2..`u..........`u.......A....hX.....-..%b`...),M.=...V..=..I.V..*.6..........U..?.x...W....;....`.......X..r.. ...'..............s..'..S..L.9s....'!..X}~&.(..`r..Q..........:..0.. ...`...)....O... .....f.9..X..@. *..b#-.g.....}.|.@..o\.......<....._..G....+..'>@g....A...R..n.'.......n.{...L.'....f.W..9..Nn....f..Nt.....h.@O6.?........a...p'#........*.&.'....[.'.h=v..{5.......=..;|.....l)g...*..%. .........}....@.....f '...ICs....^`._....s`...M. N......p...`.c.....
                      Process:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):267264
                      Entropy (8bit):7.868775736098433
                      Encrypted:false
                      SSDEEP:6144:sQc1xh58eIUyUoe9IAmQC+kMi7tr1vrEdswnsK/GmOYguJZj4QrtT8LN:w39IAmskBF1gOtYguJ+Q5yN
                      MD5:497FA5301AC5D916495D18670923C0DA
                      SHA1:E9441F19940BBD36BFC59FFF400668043DE1E82C
                      SHA-256:3797FF1F0D912EB8D64E2DCE9C375B9FCCFD54874042D944A84952CB6EEAEF32
                      SHA-512:EE8266DA4B242C88AE29C1F5954007223C264B76AA576DF4AC34E71AEFF096518A996EB9B39AD0AE1C76C87DF6060B4E657D4D41F04211261ED146BFC0F82999
                      Malicious:false
                      Reputation:low
                      Preview:...M6DVQ73BA..VT.M5DVQ33.ABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM.DVQ=,.OB._.e.4..pg[+2b)$;#?T)v2R],.6y41d?@*v8]....y;; (.I[[.3BABYVT,].iz .Mn0.'z%.3.g)/.B.?I..*o<.:z .M.0.'dw*3)5./..+?.(.*vnN:{ .M.(!1z%.35DVQ33BABYVTDM5D.:.VBABY..DMyERQG.B.BYVTDM5D.Q.2I@KYV.EM5<TQ33BAm.VTD]5DV.23BA.YVDDM5FVQ63BABYVTAM5DVQ33B!FYVPDM..TQ13B.BYFTD]5DVQ#3BQBYVTDM%DVQ33BABYVT.X7D.Q33B!@Y..EM5DVQ33BABYVTDM5DVQ33BABY..EM)DVQ33BABYVTDM5DVQ33BABYVTDM.ITQs3BABYVTDM5DV.23.@BYVTDM5DVQ33BABYVTDM5DVQ33l5'!"TDM-.WQ3#BAB.WTDI5DVQ33BABYVTDM.DV1.A& 68VT. 5DV.23B/BYV.EM5DVQ33BABYVT.M5.x5RG#ABY.dDM5dTQ3%BABSTTDM5DVQ33BABY.TD..6%#P3BA:.WTD-7DV.23Ba@YVTDM5DVQ33BA.YV.DM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5DVQ33BABYVTDM5D
                      Process:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      File Type:ASCII text, with very long lines (65536), with no line terminators
                      Category:dropped
                      Size (bytes):99057
                      Entropy (8bit):2.9239386184333815
                      Encrypted:false
                      SSDEEP:384:w99wg2MNx29vfRr+2ZAyFbwv6VXufORYtwqhWjy4/xr0O6BvS7A8kjyR3qDAngCI:Xe1ickopPcb/R+j
                      MD5:ACB314098226E039CD35539EF13D4D9D
                      SHA1:D120830B09C51F376BFDB3D58D5592EE16B18FC8
                      SHA-256:C15D83951A2635629BE605C41278B933036F5CB2D0AECD9F6C67575AD0EA92CC
                      SHA-512:0AA300B3A036440A580858795183E92F9CDA5FDEDAB499E0AF37FFED420BEF3B6CF026ADFCC0A017B7596F6C94DEA5D8E7E8CD87ED0275E4D868462C60DEBDB6
                      Malicious:false
                      Reputation:low
                      Preview:59=131=64=64=67=109=112=110=67=60=112=110=110=110=59=61=59=59=59=59=64=65=64=66=109=67=65=109=59=59=59=59=59=59=65=65=67=68=63=64=67=63=109=68=65=64=59=59=59=59=59=59=65=65=67=68=63=111=67=65=109=108=66=61=59=59=59=59=59=59=65=65=67=68=64=64=67=67=109=67=65=112=59=59=59=59=59=59=65=65=67=68=63=64=67=108=109=68=65=64=59=59=59=59=59=59=65=65=67=68=63=111=67=110=109=108=65=110=59=59=59=59=59=59=65=65=67=68=64=64=67=112=109=67=62=62=59=59=59=59=59=59=65=65=67=68=63=64=68=59=109=68=62=61=59=59=59=59=59=59=65=65=67=68=63=111=68=61=109=108=61=112=59=59=59=59=59=59=65=65=67=68=64=64=68=63=109=67=65=63=59=59=59=59=59=59=65=65=67=68=63=64=68=65=109=68=65=110=59=59=59=59=59=59=65=65=67=68=63=111=68=67=109=108=65=110=59=59=59=59=59=59=65=65=67=68=64=64=68=108=62=62=110=59=65=65=67=68=63=64=68=110=109=68=65=112=59=59=59=59=59=59=65=65=67=68=67=111=63=63=113=113=113=113=113=113=109=108=66=63=59=59=59=59=59=59=65=65=67=68=68=64=63=65=113=113=113=113=113=113=109=67=65=63=59=59=59=59=59=59=65=65=67=68=
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.164680290352159
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:Payment_Advice-pdf.exe
                      File size:1'210'368 bytes
                      MD5:d5f853358e53cae39dba60601507842c
                      SHA1:c76532dba79ec69659b4cdb8adddbc8417662d76
                      SHA256:d202f0b84b0e2a15c1c90284d0286b8b497e245e6b083e7b98294e1227d52925
                      SHA512:04d13c04ee6a88b10ca0fe7d08fe8e0114b2c20aa792cd238830d1971ef3488df0a51821d077cc491b1b99a86f9f726512c1c449c07aacb96c9bb4e03e129f1e
                      SSDEEP:24576:UAHnh+eWsN3skA4RV1Hom2KXMmHaedfN2ffZ/socXiFi5:jh+ZkldoPK8Yaed1mZ/socSK
                      TLSH:5A45BE0273D2D036FFAB92739B6AF64156BD78254123852F13981DB9BC701B2273E663
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                      Icon Hash:aaf3e3e3938382a0
                      Entrypoint:0x42800a
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                      Time Stamp:0x65EA4FEC [Thu Mar 7 23:38:20 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:afcdf79be1557326c854b6e20cb900a7
                      Instruction
                      call 00007F89691DA15Dh
                      jmp 00007F89691CCF14h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push edi
                      push esi
                      mov esi, dword ptr [esp+10h]
                      mov ecx, dword ptr [esp+14h]
                      mov edi, dword ptr [esp+0Ch]
                      mov eax, ecx
                      mov edx, ecx
                      add eax, esi
                      cmp edi, esi
                      jbe 00007F89691CD09Ah
                      cmp edi, eax
                      jc 00007F89691CD3FEh
                      bt dword ptr [004C41FCh], 01h
                      jnc 00007F89691CD099h
                      rep movsb
                      jmp 00007F89691CD3ACh
                      cmp ecx, 00000080h
                      jc 00007F89691CD264h
                      mov eax, edi
                      xor eax, esi
                      test eax, 0000000Fh
                      jne 00007F89691CD0A0h
                      bt dword ptr [004BF324h], 01h
                      jc 00007F89691CD570h
                      bt dword ptr [004C41FCh], 00000000h
                      jnc 00007F89691CD23Dh
                      test edi, 00000003h
                      jne 00007F89691CD24Eh
                      test esi, 00000003h
                      jne 00007F89691CD22Dh
                      bt edi, 02h
                      jnc 00007F89691CD09Fh
                      mov eax, dword ptr [esi]
                      sub ecx, 04h
                      lea esi, dword ptr [esi+04h]
                      mov dword ptr [edi], eax
                      lea edi, dword ptr [edi+04h]
                      bt edi, 03h
                      jnc 00007F89691CD0A3h
                      movq xmm1, qword ptr [esi]
                      sub ecx, 08h
                      lea esi, dword ptr [esi+08h]
                      movq qword ptr [edi], xmm1
                      lea edi, dword ptr [edi+08h]
                      test esi, 00000007h
                      je 00007F89691CD0F5h
                      bt esi, 03h
                      Programming Language:
                      • [ASM] VS2013 build 21005
                      • [ C ] VS2013 build 21005
                      • [C++] VS2013 build 21005
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      • [ASM] VS2013 UPD5 build 40629
                      • [RES] VS2013 build 21005
                      • [LNK] VS2013 UPD5 build 40629
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x5d04c.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1260000x7134.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0xc80000x5d04c0x5d2000a43a637996f4f34962d23376501991cFalse0.9289691694630873data7.898230753466024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x1260000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                      RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                      RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                      RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                      RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                      RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                      RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                      RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                      RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                      RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                      RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                      RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                      RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                      RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                      RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                      RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                      RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                      RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                      RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                      RT_RCDATA0xd07b80x54314data1.000336376184566
                      RT_GROUP_ICON0x124acc0x76dataEnglishGreat Britain0.6610169491525424
                      RT_GROUP_ICON0x124b440x14dataEnglishGreat Britain1.25
                      RT_GROUP_ICON0x124b580x14dataEnglishGreat Britain1.15
                      RT_GROUP_ICON0x124b6c0x14dataEnglishGreat Britain1.25
                      RT_VERSION0x124b800xdcdataEnglishGreat Britain0.6181818181818182
                      RT_MANIFEST0x124c5c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                      DLLImport
                      WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                      VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                      MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                      WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                      PSAPI.DLLGetProcessMemoryInfo
                      IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                      USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                      UxTheme.dllIsThemeActive
                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                      USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                      GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                      COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                      SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                      OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                      Language of compilation systemCountry where language is spokenMap
                      EnglishGreat Britain
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      03/11/24-20:53:08.961460TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49729587192.168.2.4108.179.234.136
                      03/11/24-20:53:08.961460TCP2855245ETPRO TROJAN Agent Tesla Exfil via SMTP49729587192.168.2.4108.179.234.136
                      03/11/24-20:53:08.961460TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49729587192.168.2.4108.179.234.136
                      03/11/24-20:53:08.961460TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249729587192.168.2.4108.179.234.136
                      03/11/24-20:53:08.961460TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49729587192.168.2.4108.179.234.136
                      03/11/24-20:53:08.961460TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49729587192.168.2.4108.179.234.136
                      TimestampSource PortDest PortSource IPDest IP
                      Mar 11, 2024 20:53:07.842181921 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:07.951601982 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:07.951839924 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:08.171597004 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:08.172678947 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:08.282459021 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:08.284110069 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:08.394023895 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:08.397258043 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:08.550033092 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:08.621875048 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:08.625274897 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:08.737864971 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:08.737966061 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:08.738245010 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:08.849808931 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:08.850052118 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:08.959672928 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:08.959705114 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:08.961460114 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:08.961460114 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:08.961561918 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:08.961608887 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:53:09.071417093 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:09.071439981 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:09.072422028 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:53:09.121288061 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:54:47.621552944 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:54:47.771707058 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:54:47.932261944 CET58749729108.179.234.136192.168.2.4
                      Mar 11, 2024 20:54:47.932394028 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:54:47.932563066 CET49729587192.168.2.4108.179.234.136
                      Mar 11, 2024 20:54:48.042071104 CET58749729108.179.234.136192.168.2.4
                      TimestampSource PortDest PortSource IPDest IP
                      Mar 11, 2024 20:53:07.611465931 CET6354453192.168.2.41.1.1.1
                      Mar 11, 2024 20:53:07.830135107 CET53635441.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Mar 11, 2024 20:53:07.611465931 CET192.168.2.41.1.1.10x7941Standard query (0)webmail.wapination.netA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Mar 11, 2024 20:53:07.830135107 CET1.1.1.1192.168.2.40x7941No error (0)webmail.wapination.netwapination.netCNAME (Canonical name)IN (0x0001)false
                      Mar 11, 2024 20:53:07.830135107 CET1.1.1.1192.168.2.40x7941No error (0)wapination.net108.179.234.136A (IP address)IN (0x0001)false
                      TimestampSource PortDest PortSource IPDest IPCommands
                      Mar 11, 2024 20:53:08.171597004 CET58749729108.179.234.136192.168.2.4220-gator4249.hostgator.com ESMTP Exim 4.96.2 #2 Mon, 11 Mar 2024 14:53:08 -0500
                      220-We do not authorize the use of this system to transport unsolicited,
                      220 and/or bulk e-mail.
                      Mar 11, 2024 20:53:08.172678947 CET49729587192.168.2.4108.179.234.136EHLO 103386
                      Mar 11, 2024 20:53:08.282459021 CET58749729108.179.234.136192.168.2.4250-gator4249.hostgator.com Hello 103386 [191.96.150.227]
                      250-SIZE 52428800
                      250-8BITMIME
                      250-PIPELINING
                      250-PIPECONNECT
                      250-AUTH PLAIN LOGIN
                      250-STARTTLS
                      250 HELP
                      Mar 11, 2024 20:53:08.284110069 CET49729587192.168.2.4108.179.234.136AUTH login d29yazJAd2FwaW5hdGlvbi5uZXQ=
                      Mar 11, 2024 20:53:08.394023895 CET58749729108.179.234.136192.168.2.4334 UGFzc3dvcmQ6
                      Mar 11, 2024 20:53:08.621875048 CET58749729108.179.234.136192.168.2.4235 Authentication succeeded
                      Mar 11, 2024 20:53:08.625274897 CET49729587192.168.2.4108.179.234.136MAIL FROM:<work2@wapination.net>
                      Mar 11, 2024 20:53:08.737966061 CET58749729108.179.234.136192.168.2.4250 OK
                      Mar 11, 2024 20:53:08.738245010 CET49729587192.168.2.4108.179.234.136RCPT TO:<work2@wapination.net>
                      Mar 11, 2024 20:53:08.849808931 CET58749729108.179.234.136192.168.2.4250 Accepted
                      Mar 11, 2024 20:53:08.850052118 CET49729587192.168.2.4108.179.234.136DATA
                      Mar 11, 2024 20:53:08.959705114 CET58749729108.179.234.136192.168.2.4354 Enter message, ending with "." on a line by itself
                      Mar 11, 2024 20:53:08.961608887 CET49729587192.168.2.4108.179.234.136.
                      Mar 11, 2024 20:53:09.072422028 CET58749729108.179.234.136192.168.2.4250 OK id=1rjlhs-0000wR-2u
                      Mar 11, 2024 20:54:47.621552944 CET49729587192.168.2.4108.179.234.136QUIT
                      Mar 11, 2024 20:54:47.932261944 CET58749729108.179.234.136192.168.2.4221 gator4249.hostgator.com closing connection

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:20:52:59
                      Start date:11/03/2024
                      Path:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      Imagebase:0xf90000
                      File size:1'210'368 bytes
                      MD5 hash:D5F853358E53CAE39DBA60601507842C
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1690019977.0000000004330000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1690019977.0000000004330000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:20:53:02
                      Start date:11/03/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      Imagebase:0x240000
                      File size:45'984 bytes
                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:20:53:02
                      Start date:11/03/2024
                      Path:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      Imagebase:0xf90000
                      File size:1'210'368 bytes
                      MD5 hash:D5F853358E53CAE39DBA60601507842C
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000002.00000002.1718278629.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.1718278629.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                      Reputation:low
                      Has exited:true

                      Target ID:3
                      Start time:20:53:04
                      Start date:11/03/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\Payment_Advice-pdf.exe
                      Imagebase:0x7b0000
                      File size:45'984 bytes
                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000003.00000002.2910016483.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000003.00000002.2910016483.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.2912325728.0000000003C41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000003.00000002.2912925365.0000000005270000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2911331278.0000000002C8F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.2911041529.000000000292E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2911331278.0000000002C97000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000003.00000002.2913029107.00000000052C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2911331278.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2911331278.0000000002C41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:4.3%
                        Dynamic/Decrypted Code Coverage:0.4%
                        Signature Coverage:5.5%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:163
                        execution_graph 97615 f9107d 97620 f971eb 97615->97620 97617 f9108c 97651 fb2f80 97617->97651 97621 f971fb __ftell_nolock 97620->97621 97654 f977c7 97621->97654 97625 f972ba 97666 fb074f 97625->97666 97632 f977c7 59 API calls 97633 f972eb 97632->97633 97685 f97eec 97633->97685 97635 f972f4 RegOpenKeyExW 97636 fcecda RegQueryValueExW 97635->97636 97640 f97316 Mailbox 97635->97640 97637 fced6c RegCloseKey 97636->97637 97638 fcecf7 97636->97638 97637->97640 97649 fced7e _wcscat Mailbox __wsetenvp 97637->97649 97689 fb0ff6 97638->97689 97640->97617 97641 fced10 97699 f9538e 97641->97699 97644 fced38 97702 f97d2c 97644->97702 97646 fced52 97646->97637 97648 f93f84 59 API calls 97648->97649 97649->97640 97649->97648 97650 f97b52 59 API calls 97649->97650 97711 f97f41 97649->97711 97650->97649 97776 fb2e84 97651->97776 97653 f91096 97655 fb0ff6 Mailbox 59 API calls 97654->97655 97656 f977e8 97655->97656 97657 fb0ff6 Mailbox 59 API calls 97656->97657 97658 f972b1 97657->97658 97659 f94864 97658->97659 97715 fc1b90 97659->97715 97662 f97f41 59 API calls 97663 f94897 97662->97663 97717 f948ae 97663->97717 97665 f948a1 Mailbox 97665->97625 97667 fc1b90 __ftell_nolock 97666->97667 97668 fb075c GetFullPathNameW 97667->97668 97669 fb077e 97668->97669 97670 f97d2c 59 API calls 97669->97670 97671 f972c5 97670->97671 97672 f97e0b 97671->97672 97673 f97e1f 97672->97673 97674 fcf173 97672->97674 97739 f97db0 97673->97739 97744 f98189 97674->97744 97677 f972d3 97679 f93f84 97677->97679 97678 fcf17e __wsetenvp _memmove 97680 f93f92 97679->97680 97684 f93fb4 _memmove 97679->97684 97682 fb0ff6 Mailbox 59 API calls 97680->97682 97681 fb0ff6 Mailbox 59 API calls 97683 f93fc8 97681->97683 97682->97684 97683->97632 97684->97681 97686 f97f06 97685->97686 97688 f97ef9 97685->97688 97687 fb0ff6 Mailbox 59 API calls 97686->97687 97687->97688 97688->97635 97692 fb0ffe 97689->97692 97691 fb1018 97691->97641 97692->97691 97694 fb101c std::exception::exception 97692->97694 97747 fb594c 97692->97747 97764 fb35e1 DecodePointer 97692->97764 97765 fb87db RaiseException 97694->97765 97696 fb1046 97766 fb8711 58 API calls _free 97696->97766 97698 fb1058 97698->97641 97700 fb0ff6 Mailbox 59 API calls 97699->97700 97701 f953a0 RegQueryValueExW 97700->97701 97701->97644 97701->97646 97703 f97d38 __wsetenvp 97702->97703 97704 f97da5 97702->97704 97706 f97d4e 97703->97706 97707 f97d73 97703->97707 97705 f97e8c 59 API calls 97704->97705 97710 f97d56 _memmove 97705->97710 97775 f98087 59 API calls Mailbox 97706->97775 97709 f98189 59 API calls 97707->97709 97709->97710 97710->97646 97712 f97f50 __wsetenvp _memmove 97711->97712 97713 fb0ff6 Mailbox 59 API calls 97712->97713 97714 f97f8e 97713->97714 97714->97649 97716 f94871 GetModuleFileNameW 97715->97716 97716->97662 97718 fc1b90 __ftell_nolock 97717->97718 97719 f948bb GetFullPathNameW 97718->97719 97720 f948da 97719->97720 97721 f948f7 97719->97721 97722 f97d2c 59 API calls 97720->97722 97723 f97eec 59 API calls 97721->97723 97724 f948e6 97722->97724 97723->97724 97727 f97886 97724->97727 97728 f97894 97727->97728 97731 f97e8c 97728->97731 97730 f948f2 97730->97665 97732 f97e9a 97731->97732 97734 f97ea3 _memmove 97731->97734 97732->97734 97735 f97faf 97732->97735 97734->97730 97736 f97fc2 97735->97736 97738 f97fbf _memmove 97735->97738 97737 fb0ff6 Mailbox 59 API calls 97736->97737 97737->97738 97738->97734 97740 f97dbf __wsetenvp 97739->97740 97741 f98189 59 API calls 97740->97741 97742 f97dd0 _memmove 97740->97742 97743 fcf130 _memmove 97741->97743 97742->97677 97745 fb0ff6 Mailbox 59 API calls 97744->97745 97746 f98193 97745->97746 97746->97678 97748 fb59c7 97747->97748 97760 fb5958 97747->97760 97773 fb35e1 DecodePointer 97748->97773 97750 fb59cd 97774 fb8d68 58 API calls __getptd_noexit 97750->97774 97753 fb598b RtlAllocateHeap 97753->97760 97763 fb59bf 97753->97763 97755 fb59b3 97771 fb8d68 58 API calls __getptd_noexit 97755->97771 97759 fb5963 97759->97760 97767 fba3ab 58 API calls 2 library calls 97759->97767 97768 fba408 58 API calls 8 library calls 97759->97768 97769 fb32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97759->97769 97760->97753 97760->97755 97760->97759 97761 fb59b1 97760->97761 97770 fb35e1 DecodePointer 97760->97770 97772 fb8d68 58 API calls __getptd_noexit 97761->97772 97763->97692 97764->97692 97765->97696 97766->97698 97767->97759 97768->97759 97770->97760 97771->97761 97772->97763 97773->97750 97774->97763 97775->97710 97777 fb2e90 __freefls@4 97776->97777 97784 fb3457 97777->97784 97783 fb2eb7 __freefls@4 97783->97653 97801 fb9e4b 97784->97801 97786 fb2e99 97787 fb2ec8 DecodePointer DecodePointer 97786->97787 97788 fb2ea5 97787->97788 97789 fb2ef5 97787->97789 97798 fb2ec2 97788->97798 97789->97788 97847 fb89e4 59 API calls __mbschr_l 97789->97847 97791 fb2f07 97792 fb2f58 EncodePointer EncodePointer 97791->97792 97793 fb2f2c 97791->97793 97848 fb8aa4 61 API calls 2 library calls 97791->97848 97792->97788 97793->97788 97797 fb2f46 EncodePointer 97793->97797 97849 fb8aa4 61 API calls 2 library calls 97793->97849 97796 fb2f40 97796->97788 97796->97797 97797->97792 97850 fb3460 97798->97850 97802 fb9e6f EnterCriticalSection 97801->97802 97803 fb9e5c 97801->97803 97802->97786 97808 fb9ed3 97803->97808 97805 fb9e62 97805->97802 97832 fb32f5 58 API calls 3 library calls 97805->97832 97809 fb9edf __freefls@4 97808->97809 97810 fb9ee8 97809->97810 97811 fb9f00 97809->97811 97833 fba3ab 58 API calls 2 library calls 97810->97833 97819 fb9f21 __freefls@4 97811->97819 97836 fb8a5d 58 API calls 2 library calls 97811->97836 97813 fb9eed 97834 fba408 58 API calls 8 library calls 97813->97834 97816 fb9f15 97817 fb9f2b 97816->97817 97818 fb9f1c 97816->97818 97822 fb9e4b __lock 58 API calls 97817->97822 97837 fb8d68 58 API calls __getptd_noexit 97818->97837 97819->97805 97820 fb9ef4 97835 fb32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97820->97835 97824 fb9f32 97822->97824 97826 fb9f3f 97824->97826 97827 fb9f57 97824->97827 97838 fba06b InitializeCriticalSectionAndSpinCount 97826->97838 97839 fb2f95 97827->97839 97830 fb9f4b 97845 fb9f73 LeaveCriticalSection _doexit 97830->97845 97833->97813 97834->97820 97836->97816 97837->97819 97838->97830 97840 fb2fc7 _free 97839->97840 97841 fb2f9e RtlFreeHeap 97839->97841 97840->97830 97841->97840 97842 fb2fb3 97841->97842 97846 fb8d68 58 API calls __getptd_noexit 97842->97846 97844 fb2fb9 GetLastError 97844->97840 97845->97819 97846->97844 97847->97791 97848->97793 97849->97796 97853 fb9fb5 LeaveCriticalSection 97850->97853 97852 fb2ec7 97852->97783 97853->97852 97854 fb7e93 97855 fb7e9f __freefls@4 97854->97855 97891 fba048 GetStartupInfoW 97855->97891 97858 fb7ea4 97893 fb8dbc GetProcessHeap 97858->97893 97859 fb7efc 97860 fb7f07 97859->97860 97976 fb7fe3 58 API calls 3 library calls 97859->97976 97894 fb9d26 97860->97894 97863 fb7f0d 97864 fb7f18 __RTC_Initialize 97863->97864 97977 fb7fe3 58 API calls 3 library calls 97863->97977 97915 fbd812 97864->97915 97867 fb7f27 97868 fb7f33 GetCommandLineW 97867->97868 97978 fb7fe3 58 API calls 3 library calls 97867->97978 97934 fc5173 GetEnvironmentStringsW 97868->97934 97871 fb7f32 97871->97868 97874 fb7f4d 97875 fb7f58 97874->97875 97979 fb32f5 58 API calls 3 library calls 97874->97979 97944 fc4fa8 97875->97944 97878 fb7f5e 97879 fb7f69 97878->97879 97980 fb32f5 58 API calls 3 library calls 97878->97980 97958 fb332f 97879->97958 97882 fb7f71 97883 fb7f7c __wwincmdln 97882->97883 97981 fb32f5 58 API calls 3 library calls 97882->97981 97964 f9492e 97883->97964 97886 fb7f90 97887 fb7f9f 97886->97887 97982 fb3598 58 API calls _doexit 97886->97982 97983 fb3320 58 API calls _doexit 97887->97983 97890 fb7fa4 __freefls@4 97892 fba05e 97891->97892 97892->97858 97893->97859 97984 fb33c7 36 API calls 2 library calls 97894->97984 97896 fb9d2b 97985 fb9f7c InitializeCriticalSectionAndSpinCount __getstream 97896->97985 97898 fb9d30 97899 fb9d34 97898->97899 97987 fb9fca TlsAlloc 97898->97987 97986 fb9d9c 61 API calls 2 library calls 97899->97986 97902 fb9d39 97902->97863 97903 fb9d46 97903->97899 97904 fb9d51 97903->97904 97988 fb8a15 97904->97988 97907 fb9d93 97996 fb9d9c 61 API calls 2 library calls 97907->97996 97910 fb9d72 97910->97907 97912 fb9d78 97910->97912 97911 fb9d98 97911->97863 97995 fb9c73 58 API calls 4 library calls 97912->97995 97914 fb9d80 GetCurrentThreadId 97914->97863 97916 fbd81e __freefls@4 97915->97916 97917 fb9e4b __lock 58 API calls 97916->97917 97918 fbd825 97917->97918 97919 fb8a15 __calloc_crt 58 API calls 97918->97919 97920 fbd836 97919->97920 97921 fbd8a1 GetStartupInfoW 97920->97921 97922 fbd841 @_EH4_CallFilterFunc@8 __freefls@4 97920->97922 97928 fbd8b6 97921->97928 97929 fbd9e5 97921->97929 97922->97867 97923 fbdaad 98010 fbdabd LeaveCriticalSection _doexit 97923->98010 97925 fb8a15 __calloc_crt 58 API calls 97925->97928 97926 fbda32 GetStdHandle 97926->97929 97927 fbda45 GetFileType 97927->97929 97928->97925 97928->97929 97931 fbd904 97928->97931 97929->97923 97929->97926 97929->97927 98009 fba06b InitializeCriticalSectionAndSpinCount 97929->98009 97930 fbd938 GetFileType 97930->97931 97931->97929 97931->97930 98008 fba06b InitializeCriticalSectionAndSpinCount 97931->98008 97935 fb7f43 97934->97935 97936 fc5184 97934->97936 97940 fc4d6b GetModuleFileNameW 97935->97940 98011 fb8a5d 58 API calls 2 library calls 97936->98011 97938 fc51aa _memmove 97939 fc51c0 FreeEnvironmentStringsW 97938->97939 97939->97935 97941 fc4d9f _wparse_cmdline 97940->97941 97943 fc4ddf _wparse_cmdline 97941->97943 98012 fb8a5d 58 API calls 2 library calls 97941->98012 97943->97874 97945 fc4fc1 __wsetenvp 97944->97945 97949 fc4fb9 97944->97949 97946 fb8a15 __calloc_crt 58 API calls 97945->97946 97954 fc4fea __wsetenvp 97946->97954 97947 fc5041 97948 fb2f95 _free 58 API calls 97947->97948 97948->97949 97949->97878 97950 fb8a15 __calloc_crt 58 API calls 97950->97954 97951 fc5066 97952 fb2f95 _free 58 API calls 97951->97952 97952->97949 97954->97947 97954->97949 97954->97950 97954->97951 97955 fc507d 97954->97955 98013 fc4857 58 API calls __mbschr_l 97954->98013 98014 fb9006 IsProcessorFeaturePresent 97955->98014 97957 fc5089 97957->97878 97960 fb333b __IsNonwritableInCurrentImage 97958->97960 98037 fba711 97960->98037 97961 fb3359 __initterm_e 97962 fb2f80 __cinit 67 API calls 97961->97962 97963 fb3378 _doexit __IsNonwritableInCurrentImage 97961->97963 97962->97963 97963->97882 97965 f94948 97964->97965 97975 f949e7 97964->97975 97966 f94982 IsThemeActive 97965->97966 98040 fb35ac 97966->98040 97970 f949ae 98052 f94a5b SystemParametersInfoW SystemParametersInfoW 97970->98052 97972 f949ba 98053 f93b4c 97972->98053 97974 f949c2 SystemParametersInfoW 97974->97975 97975->97886 97976->97860 97977->97864 97978->97871 97982->97887 97983->97890 97984->97896 97985->97898 97986->97902 97987->97903 97990 fb8a1c 97988->97990 97991 fb8a57 97990->97991 97993 fb8a3a 97990->97993 97997 fc5446 97990->97997 97991->97907 97994 fba026 TlsSetValue 97991->97994 97993->97990 97993->97991 98005 fba372 Sleep 97993->98005 97994->97910 97995->97914 97996->97911 97998 fc5451 97997->97998 98004 fc546c 97997->98004 97999 fc545d 97998->97999 97998->98004 98006 fb8d68 58 API calls __getptd_noexit 97999->98006 98000 fc547c HeapAlloc 98002 fc5462 98000->98002 98000->98004 98002->97990 98004->98000 98004->98002 98007 fb35e1 DecodePointer 98004->98007 98005->97993 98006->98002 98007->98004 98008->97931 98009->97929 98010->97922 98011->97938 98012->97943 98013->97954 98015 fb9011 98014->98015 98020 fb8e99 98015->98020 98019 fb902c 98019->97957 98021 fb8eb3 _memset ___raise_securityfailure 98020->98021 98022 fb8ed3 IsDebuggerPresent 98021->98022 98028 fba395 SetUnhandledExceptionFilter UnhandledExceptionFilter 98022->98028 98025 fb8fba 98027 fba380 GetCurrentProcess TerminateProcess 98025->98027 98026 fb8f97 ___raise_securityfailure 98029 fbc836 98026->98029 98027->98019 98028->98026 98030 fbc83e 98029->98030 98031 fbc840 IsProcessorFeaturePresent 98029->98031 98030->98025 98033 fc5b5a 98031->98033 98036 fc5b09 5 API calls ___raise_securityfailure 98033->98036 98035 fc5c3d 98035->98025 98036->98035 98038 fba714 EncodePointer 98037->98038 98038->98038 98039 fba72e 98038->98039 98039->97961 98041 fb9e4b __lock 58 API calls 98040->98041 98042 fb35b7 DecodePointer EncodePointer 98041->98042 98105 fb9fb5 LeaveCriticalSection 98042->98105 98044 f949a7 98045 fb3614 98044->98045 98046 fb3638 98045->98046 98047 fb361e 98045->98047 98046->97970 98047->98046 98106 fb8d68 58 API calls __getptd_noexit 98047->98106 98049 fb3628 98107 fb8ff6 9 API calls __mbschr_l 98049->98107 98051 fb3633 98051->97970 98052->97972 98054 f93b59 __ftell_nolock 98053->98054 98055 f977c7 59 API calls 98054->98055 98056 f93b63 GetCurrentDirectoryW 98055->98056 98108 f93778 98056->98108 98058 f93b8c IsDebuggerPresent 98059 fcd4ad MessageBoxA 98058->98059 98060 f93b9a 98058->98060 98062 fcd4c7 98059->98062 98060->98062 98063 f93bb7 98060->98063 98091 f93c73 98060->98091 98061 f93c7a SetCurrentDirectoryW 98065 f93c87 Mailbox 98061->98065 98318 f97373 59 API calls Mailbox 98062->98318 98189 f973e5 98063->98189 98065->97974 98067 fcd4d7 98072 fcd4ed SetCurrentDirectoryW 98067->98072 98072->98065 98091->98061 98105->98044 98106->98049 98107->98051 98109 f977c7 59 API calls 98108->98109 98110 f9378e 98109->98110 98329 f93d43 98110->98329 98112 f937ac 98113 f94864 61 API calls 98112->98113 98114 f937c0 98113->98114 98115 f97f41 59 API calls 98114->98115 98116 f937cd 98115->98116 98343 f94f3d 98116->98343 98119 fcd3ae 98414 ff97e5 98119->98414 98120 f937ee Mailbox 98367 f981a7 98120->98367 98123 fcd3cd 98126 fb2f95 _free 58 API calls 98123->98126 98128 fcd3da 98126->98128 98130 f94faa 84 API calls 98128->98130 98132 fcd3e3 98130->98132 98136 f93ee2 59 API calls 98132->98136 98133 f97f41 59 API calls 98134 f9381a 98133->98134 98374 f98620 98134->98374 98138 fcd3fe 98136->98138 98137 f9382c Mailbox 98139 f97f41 59 API calls 98137->98139 98140 f93ee2 59 API calls 98138->98140 98141 f93852 98139->98141 98142 fcd41a 98140->98142 98143 f98620 69 API calls 98141->98143 98144 f94864 61 API calls 98142->98144 98146 f93861 Mailbox 98143->98146 98145 fcd43f 98144->98145 98147 f93ee2 59 API calls 98145->98147 98149 f977c7 59 API calls 98146->98149 98148 fcd44b 98147->98148 98150 f981a7 59 API calls 98148->98150 98151 f9387f 98149->98151 98152 fcd459 98150->98152 98378 f93ee2 98151->98378 98155 f93ee2 59 API calls 98152->98155 98156 fcd468 98155->98156 98162 f981a7 59 API calls 98156->98162 98158 f93899 98158->98132 98159 f938a3 98158->98159 98160 fb313d _W_store_winword 60 API calls 98159->98160 98161 f938ae 98160->98161 98161->98138 98163 f938b8 98161->98163 98164 fcd48a 98162->98164 98165 fb313d _W_store_winword 60 API calls 98163->98165 98166 f93ee2 59 API calls 98164->98166 98167 f938c3 98165->98167 98168 fcd497 98166->98168 98167->98142 98169 f938cd 98167->98169 98168->98168 98170 fb313d _W_store_winword 60 API calls 98169->98170 98171 f938d8 98170->98171 98171->98156 98172 f93919 98171->98172 98174 f93ee2 59 API calls 98171->98174 98172->98156 98173 f93926 98172->98173 98394 f9942e 98173->98394 98176 f938fc 98174->98176 98177 f981a7 59 API calls 98176->98177 98179 f9390a 98177->98179 98181 f93ee2 59 API calls 98179->98181 98181->98172 98184 f993ea 59 API calls 98186 f93961 98184->98186 98185 f99040 60 API calls 98185->98186 98186->98184 98186->98185 98187 f93ee2 59 API calls 98186->98187 98188 f939a7 Mailbox 98186->98188 98187->98186 98188->98058 98190 f973f2 __ftell_nolock 98189->98190 98191 f9740b 98190->98191 98192 fcee4b _memset 98190->98192 98193 f948ae 60 API calls 98191->98193 98195 fcee67 GetOpenFileNameW 98192->98195 98194 f97414 98193->98194 99290 fb09d5 98194->99290 98197 fceeb6 98195->98197 98199 f97d2c 59 API calls 98197->98199 98200 fceecb 98199->98200 98200->98200 98202 f97429 99308 f969ca 98202->99308 98318->98067 98330 f93d50 __ftell_nolock 98329->98330 98331 f97d2c 59 API calls 98330->98331 98336 f93eb6 Mailbox 98330->98336 98332 f93d82 98331->98332 98339 f93db8 Mailbox 98332->98339 98455 f97b52 98332->98455 98334 f93e89 98335 f97f41 59 API calls 98334->98335 98334->98336 98338 f93eaa 98335->98338 98336->98112 98337 f97f41 59 API calls 98337->98339 98340 f93f84 59 API calls 98338->98340 98339->98334 98339->98336 98339->98337 98341 f93f84 59 API calls 98339->98341 98342 f97b52 59 API calls 98339->98342 98340->98336 98341->98339 98342->98339 98458 f94d13 98343->98458 98348 f94f68 LoadLibraryExW 98468 f94cc8 98348->98468 98349 fcdd0f 98351 f94faa 84 API calls 98349->98351 98352 fcdd16 98351->98352 98354 f94cc8 3 API calls 98352->98354 98356 fcdd1e 98354->98356 98494 f9506b 98356->98494 98357 f94f8f 98357->98356 98358 f94f9b 98357->98358 98360 f94faa 84 API calls 98358->98360 98362 f937e6 98360->98362 98362->98119 98362->98120 98364 fcdd45 98502 f95027 98364->98502 98366 fcdd52 98368 f93801 98367->98368 98369 f981b2 98367->98369 98371 f993ea 98368->98371 98929 f980d7 59 API calls 2 library calls 98369->98929 98372 fb0ff6 Mailbox 59 API calls 98371->98372 98373 f9380d 98372->98373 98373->98133 98375 f9862b 98374->98375 98377 f98652 98375->98377 98930 f98b13 69 API calls Mailbox 98375->98930 98377->98137 98379 f93eec 98378->98379 98380 f93f05 98378->98380 98381 f981a7 59 API calls 98379->98381 98382 f97d2c 59 API calls 98380->98382 98383 f9388b 98381->98383 98382->98383 98384 fb313d 98383->98384 98385 fb3149 98384->98385 98386 fb31be 98384->98386 98393 fb316e 98385->98393 98931 fb8d68 58 API calls __getptd_noexit 98385->98931 98933 fb31d0 60 API calls 3 library calls 98386->98933 98389 fb31cb 98389->98158 98390 fb3155 98932 fb8ff6 9 API calls __mbschr_l 98390->98932 98392 fb3160 98392->98158 98393->98158 98395 f99436 98394->98395 98396 fb0ff6 Mailbox 59 API calls 98395->98396 98397 f99444 98396->98397 98398 f93936 98397->98398 98934 f9935c 59 API calls Mailbox 98397->98934 98400 f991b0 98398->98400 98935 f992c0 98400->98935 98402 f991bf 98403 fb0ff6 Mailbox 59 API calls 98402->98403 98404 f93944 98402->98404 98403->98404 98405 f99040 98404->98405 98406 fcf5a5 98405->98406 98410 f99057 98405->98410 98406->98410 98962 f98d3b 59 API calls Mailbox 98406->98962 98408 f99158 98411 fb0ff6 Mailbox 59 API calls 98408->98411 98409 f991a0 98949 f99e9c 98409->98949 98410->98408 98410->98409 98413 f9915f 98410->98413 98411->98413 98413->98186 98415 f95045 85 API calls 98414->98415 98416 ff9854 98415->98416 98965 ff99be 98416->98965 98419 f9506b 74 API calls 98420 ff9881 98419->98420 98421 f9506b 74 API calls 98420->98421 98422 ff9891 98421->98422 98423 f9506b 74 API calls 98422->98423 98424 ff98ac 98423->98424 98425 f9506b 74 API calls 98424->98425 98426 ff98c7 98425->98426 98427 f95045 85 API calls 98426->98427 98428 ff98de 98427->98428 98429 fb594c std::exception::_Copy_str 58 API calls 98428->98429 98430 ff98e5 98429->98430 98431 fb594c std::exception::_Copy_str 58 API calls 98430->98431 98432 ff98ef 98431->98432 98433 f9506b 74 API calls 98432->98433 98434 ff9903 98433->98434 98435 ff9393 GetSystemTimeAsFileTime 98434->98435 98436 ff9916 98435->98436 98437 ff992b 98436->98437 98438 ff9940 98436->98438 98439 fb2f95 _free 58 API calls 98437->98439 98440 ff9946 98438->98440 98441 ff99a5 98438->98441 98443 ff9931 98439->98443 98971 ff8d90 98440->98971 98442 fb2f95 _free 58 API calls 98441->98442 98448 fcd3c1 98442->98448 98445 fb2f95 _free 58 API calls 98443->98445 98445->98448 98447 fb2f95 _free 58 API calls 98447->98448 98448->98123 98449 f94faa 98448->98449 98450 f94fb4 98449->98450 98452 f94fbb 98449->98452 98451 fb55d6 __fcloseall 83 API calls 98450->98451 98451->98452 98453 f94fdb FreeLibrary 98452->98453 98454 f94fca 98452->98454 98453->98454 98454->98123 98456 f97faf 59 API calls 98455->98456 98457 f97b5d 98456->98457 98457->98332 98507 f94d61 98458->98507 98461 f94d3a 98463 f94d4a FreeLibrary 98461->98463 98464 f94d53 98461->98464 98462 f94d61 2 API calls 98462->98461 98463->98464 98465 fb548b 98464->98465 98511 fb54a0 98465->98511 98467 f94f5c 98467->98348 98467->98349 98669 f94d94 98468->98669 98471 f94d08 98475 f94dd0 98471->98475 98472 f94cff FreeLibrary 98472->98471 98473 f94d94 2 API calls 98474 f94ced 98473->98474 98474->98471 98474->98472 98476 fb0ff6 Mailbox 59 API calls 98475->98476 98477 f94de5 98476->98477 98478 f9538e 59 API calls 98477->98478 98479 f94df1 _memmove 98478->98479 98480 f94e2c 98479->98480 98482 f94ee9 98479->98482 98483 f94f21 98479->98483 98481 f95027 69 API calls 98480->98481 98489 f94e35 98481->98489 98673 f94fe9 CreateStreamOnHGlobal 98482->98673 98684 ff9ba5 95 API calls 98483->98684 98486 f9506b 74 API calls 98486->98489 98488 f94ec9 98488->98357 98489->98486 98489->98488 98490 fcdcd0 98489->98490 98679 f95045 98489->98679 98491 f95045 85 API calls 98490->98491 98492 fcdce4 98491->98492 98493 f9506b 74 API calls 98492->98493 98493->98488 98495 f9507d 98494->98495 98496 fcddf6 98494->98496 98708 fb5812 98495->98708 98499 ff9393 98906 ff91e9 98499->98906 98501 ff93a9 98501->98364 98503 fcddb9 98502->98503 98504 f95036 98502->98504 98911 fb5e90 98504->98911 98506 f9503e 98506->98366 98508 f94d2e 98507->98508 98509 f94d6a LoadLibraryA 98507->98509 98508->98461 98508->98462 98509->98508 98510 f94d7b GetProcAddress 98509->98510 98510->98508 98514 fb54ac __freefls@4 98511->98514 98512 fb54bf 98560 fb8d68 58 API calls __getptd_noexit 98512->98560 98514->98512 98516 fb54f0 98514->98516 98515 fb54c4 98561 fb8ff6 9 API calls __mbschr_l 98515->98561 98530 fc0738 98516->98530 98519 fb54f5 98520 fb550b 98519->98520 98521 fb54fe 98519->98521 98522 fb5535 98520->98522 98523 fb5515 98520->98523 98562 fb8d68 58 API calls __getptd_noexit 98521->98562 98545 fc0857 98522->98545 98563 fb8d68 58 API calls __getptd_noexit 98523->98563 98527 fb54cf @_EH4_CallFilterFunc@8 __freefls@4 98527->98467 98531 fc0744 __freefls@4 98530->98531 98532 fb9e4b __lock 58 API calls 98531->98532 98542 fc0752 98532->98542 98533 fc07cd 98570 fb8a5d 58 API calls 2 library calls 98533->98570 98536 fc07d4 98543 fc07c6 98536->98543 98571 fba06b InitializeCriticalSectionAndSpinCount 98536->98571 98537 fc0843 __freefls@4 98537->98519 98539 fb9ed3 __mtinitlocknum 58 API calls 98539->98542 98541 fc07fa EnterCriticalSection 98541->98543 98542->98533 98542->98539 98542->98543 98568 fb6e8d 59 API calls __lock 98542->98568 98569 fb6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 98542->98569 98565 fc084e 98543->98565 98546 fc0877 __wopenfile 98545->98546 98547 fc0891 98546->98547 98559 fc0a4c 98546->98559 98578 fb3a0b 60 API calls 2 library calls 98546->98578 98576 fb8d68 58 API calls __getptd_noexit 98547->98576 98549 fc0896 98577 fb8ff6 9 API calls __mbschr_l 98549->98577 98551 fc0aaf 98573 fc87f1 98551->98573 98552 fb5540 98564 fb5562 LeaveCriticalSection LeaveCriticalSection _fseek 98552->98564 98555 fc0a45 98555->98559 98579 fb3a0b 60 API calls 2 library calls 98555->98579 98557 fc0a64 98557->98559 98580 fb3a0b 60 API calls 2 library calls 98557->98580 98559->98547 98559->98551 98560->98515 98561->98527 98562->98527 98563->98527 98564->98527 98572 fb9fb5 LeaveCriticalSection 98565->98572 98567 fc0855 98567->98537 98568->98542 98569->98542 98570->98536 98571->98541 98572->98567 98581 fc7fd5 98573->98581 98575 fc880a 98575->98552 98576->98549 98577->98552 98578->98555 98579->98557 98580->98559 98582 fc7fe1 __freefls@4 98581->98582 98583 fc7ff7 98582->98583 98586 fc802d 98582->98586 98666 fb8d68 58 API calls __getptd_noexit 98583->98666 98585 fc7ffc 98667 fb8ff6 9 API calls __mbschr_l 98585->98667 98592 fc809e 98586->98592 98589 fc8049 98668 fc8072 LeaveCriticalSection __unlock_fhandle 98589->98668 98591 fc8006 __freefls@4 98591->98575 98593 fc80be 98592->98593 98594 fb471a __wsopen_nolock 58 API calls 98593->98594 98598 fc80da 98594->98598 98595 fc8211 98596 fb9006 __invoke_watson 8 API calls 98595->98596 98597 fc87f0 98596->98597 98600 fc7fd5 __wsopen_helper 103 API calls 98597->98600 98598->98595 98599 fc8114 98598->98599 98606 fc8137 98598->98606 98601 fb8d34 __read 58 API calls 98599->98601 98602 fc880a 98600->98602 98603 fc8119 98601->98603 98602->98589 98604 fb8d68 __mbschr_l 58 API calls 98603->98604 98605 fc8126 98604->98605 98608 fb8ff6 __mbschr_l 9 API calls 98605->98608 98607 fc81f5 98606->98607 98615 fc81d3 98606->98615 98609 fb8d34 __read 58 API calls 98607->98609 98610 fc8130 98608->98610 98611 fc81fa 98609->98611 98610->98589 98612 fb8d68 __mbschr_l 58 API calls 98611->98612 98613 fc8207 98612->98613 98614 fb8ff6 __mbschr_l 9 API calls 98613->98614 98614->98595 98616 fbd4d4 __alloc_osfhnd 61 API calls 98615->98616 98617 fc82a1 98616->98617 98618 fc82ce 98617->98618 98619 fc82ab 98617->98619 98621 fc7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98618->98621 98620 fb8d34 __read 58 API calls 98619->98620 98622 fc82b0 98620->98622 98629 fc82f0 98621->98629 98624 fb8d68 __mbschr_l 58 API calls 98622->98624 98623 fc836e GetFileType 98627 fc8379 GetLastError 98623->98627 98628 fc83bb 98623->98628 98626 fc82ba 98624->98626 98625 fc833c GetLastError 98630 fb8d47 __dosmaperr 58 API calls 98625->98630 98631 fb8d68 __mbschr_l 58 API calls 98626->98631 98632 fb8d47 __dosmaperr 58 API calls 98627->98632 98637 fbd76a __set_osfhnd 59 API calls 98628->98637 98629->98623 98629->98625 98633 fc7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98629->98633 98634 fc8361 98630->98634 98631->98610 98635 fc83a0 CloseHandle 98632->98635 98636 fc8331 98633->98636 98640 fb8d68 __mbschr_l 58 API calls 98634->98640 98635->98634 98638 fc83ae 98635->98638 98636->98623 98636->98625 98643 fc83d9 98637->98643 98639 fb8d68 __mbschr_l 58 API calls 98638->98639 98641 fc83b3 98639->98641 98640->98595 98641->98634 98642 fc8594 98642->98595 98645 fc8767 CloseHandle 98642->98645 98643->98642 98644 fc1b11 __lseeki64_nolock 60 API calls 98643->98644 98653 fc845a 98643->98653 98646 fc8443 98644->98646 98647 fc7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98645->98647 98650 fb8d34 __read 58 API calls 98646->98650 98646->98653 98649 fc878e 98647->98649 98648 fc10ab 70 API calls __read_nolock 98648->98653 98651 fc87c2 98649->98651 98652 fc8796 GetLastError 98649->98652 98650->98653 98651->98595 98654 fb8d47 __dosmaperr 58 API calls 98652->98654 98653->98642 98653->98648 98656 fc0d2d __close_nolock 61 API calls 98653->98656 98657 fc848c 98653->98657 98660 fbdac6 __write 78 API calls 98653->98660 98661 fc8611 98653->98661 98663 fc1b11 60 API calls __lseeki64_nolock 98653->98663 98655 fc87a2 98654->98655 98658 fbd67d __free_osfhnd 59 API calls 98655->98658 98656->98653 98657->98653 98659 fc99f2 __chsize_nolock 82 API calls 98657->98659 98658->98651 98659->98657 98660->98653 98662 fc0d2d __close_nolock 61 API calls 98661->98662 98664 fc8618 98662->98664 98663->98653 98665 fb8d68 __mbschr_l 58 API calls 98664->98665 98665->98595 98666->98585 98667->98591 98668->98591 98670 f94ce1 98669->98670 98671 f94d9d LoadLibraryA 98669->98671 98670->98473 98670->98474 98671->98670 98672 f94dae GetProcAddress 98671->98672 98672->98670 98674 f95020 98673->98674 98675 f95003 FindResourceExW 98673->98675 98674->98480 98675->98674 98676 fcdd5c LoadResource 98675->98676 98676->98674 98677 fcdd71 SizeofResource 98676->98677 98677->98674 98678 fcdd85 LockResource 98677->98678 98678->98674 98680 fcddd4 98679->98680 98681 f95054 98679->98681 98685 fb5a7d 98681->98685 98683 f95062 98683->98489 98684->98480 98689 fb5a89 __freefls@4 98685->98689 98686 fb5a9b 98698 fb8d68 58 API calls __getptd_noexit 98686->98698 98688 fb5ac1 98700 fb6e4e 98688->98700 98689->98686 98689->98688 98690 fb5aa0 98699 fb8ff6 9 API calls __mbschr_l 98690->98699 98693 fb5ac7 98706 fb59ee 83 API calls 5 library calls 98693->98706 98695 fb5ad6 98707 fb5af8 LeaveCriticalSection LeaveCriticalSection _fseek 98695->98707 98697 fb5aab __freefls@4 98697->98683 98698->98690 98699->98697 98701 fb6e5e 98700->98701 98702 fb6e80 EnterCriticalSection 98700->98702 98701->98702 98704 fb6e66 98701->98704 98703 fb6e76 98702->98703 98703->98693 98705 fb9e4b __lock 58 API calls 98704->98705 98705->98703 98706->98695 98707->98697 98711 fb582d 98708->98711 98710 f9508e 98710->98499 98712 fb5839 __freefls@4 98711->98712 98713 fb587c 98712->98713 98714 fb5874 __freefls@4 98712->98714 98718 fb584f _memset 98712->98718 98715 fb6e4e __lock_file 59 API calls 98713->98715 98714->98710 98717 fb5882 98715->98717 98724 fb564d 98717->98724 98738 fb8d68 58 API calls __getptd_noexit 98718->98738 98719 fb5869 98739 fb8ff6 9 API calls __mbschr_l 98719->98739 98727 fb5668 _memset 98724->98727 98731 fb5683 98724->98731 98725 fb5673 98836 fb8d68 58 API calls __getptd_noexit 98725->98836 98727->98725 98727->98731 98735 fb56c3 98727->98735 98728 fb5678 98837 fb8ff6 9 API calls __mbschr_l 98728->98837 98740 fb58b6 LeaveCriticalSection LeaveCriticalSection _fseek 98731->98740 98732 fb57d4 _memset 98839 fb8d68 58 API calls __getptd_noexit 98732->98839 98735->98731 98735->98732 98741 fb4916 98735->98741 98748 fc10ab 98735->98748 98816 fc0df7 98735->98816 98838 fc0f18 58 API calls 3 library calls 98735->98838 98738->98719 98739->98714 98740->98714 98742 fb4920 98741->98742 98743 fb4935 98741->98743 98840 fb8d68 58 API calls __getptd_noexit 98742->98840 98743->98735 98745 fb4925 98841 fb8ff6 9 API calls __mbschr_l 98745->98841 98747 fb4930 98747->98735 98749 fc10cc 98748->98749 98750 fc10e3 98748->98750 98851 fb8d34 58 API calls __getptd_noexit 98749->98851 98752 fc181b 98750->98752 98757 fc111d 98750->98757 98867 fb8d34 58 API calls __getptd_noexit 98752->98867 98754 fc10d1 98852 fb8d68 58 API calls __getptd_noexit 98754->98852 98755 fc1820 98868 fb8d68 58 API calls __getptd_noexit 98755->98868 98759 fc1125 98757->98759 98765 fc113c 98757->98765 98853 fb8d34 58 API calls __getptd_noexit 98759->98853 98760 fc1131 98869 fb8ff6 9 API calls __mbschr_l 98760->98869 98761 fc10d8 98761->98735 98763 fc112a 98854 fb8d68 58 API calls __getptd_noexit 98763->98854 98765->98761 98766 fc1151 98765->98766 98769 fc116b 98765->98769 98771 fc1189 98765->98771 98855 fb8d34 58 API calls __getptd_noexit 98766->98855 98769->98766 98770 fc1176 98769->98770 98842 fc5ebb 98770->98842 98856 fb8a5d 58 API calls 2 library calls 98771->98856 98773 fc1199 98775 fc11bc 98773->98775 98776 fc11a1 98773->98776 98859 fc1b11 60 API calls 3 library calls 98775->98859 98857 fb8d68 58 API calls __getptd_noexit 98776->98857 98777 fc128a 98779 fc1303 ReadFile 98777->98779 98784 fc12a0 GetConsoleMode 98777->98784 98782 fc1325 98779->98782 98783 fc17e3 GetLastError 98779->98783 98781 fc11a6 98858 fb8d34 58 API calls __getptd_noexit 98781->98858 98782->98783 98790 fc12f5 98782->98790 98786 fc12e3 98783->98786 98787 fc17f0 98783->98787 98788 fc12b4 98784->98788 98789 fc1300 98784->98789 98799 fc12e9 98786->98799 98860 fb8d47 58 API calls 3 library calls 98786->98860 98865 fb8d68 58 API calls __getptd_noexit 98787->98865 98788->98789 98792 fc12ba ReadConsoleW 98788->98792 98789->98779 98798 fc15c7 98790->98798 98790->98799 98801 fc135a 98790->98801 98792->98790 98794 fc12dd GetLastError 98792->98794 98793 fc17f5 98866 fb8d34 58 API calls __getptd_noexit 98793->98866 98794->98786 98797 fb2f95 _free 58 API calls 98797->98761 98798->98799 98806 fc16cd ReadFile 98798->98806 98799->98761 98799->98797 98802 fc13c6 ReadFile 98801->98802 98807 fc1447 98801->98807 98803 fc13e7 GetLastError 98802->98803 98814 fc13f1 98802->98814 98803->98814 98804 fc1504 98810 fc14b4 MultiByteToWideChar 98804->98810 98863 fc1b11 60 API calls 3 library calls 98804->98863 98805 fc14f4 98862 fb8d68 58 API calls __getptd_noexit 98805->98862 98809 fc16f0 GetLastError 98806->98809 98815 fc16fe 98806->98815 98807->98799 98807->98804 98807->98805 98807->98810 98809->98815 98810->98794 98810->98799 98814->98801 98861 fc1b11 60 API calls 3 library calls 98814->98861 98815->98798 98864 fc1b11 60 API calls 3 library calls 98815->98864 98817 fc0e02 98816->98817 98822 fc0e17 98816->98822 98903 fb8d68 58 API calls __getptd_noexit 98817->98903 98819 fc0e07 98904 fb8ff6 9 API calls __mbschr_l 98819->98904 98821 fc0e4c 98824 fb4916 __fclose_nolock 58 API calls 98821->98824 98822->98821 98828 fc0e12 98822->98828 98905 fc6234 58 API calls __malloc_crt 98822->98905 98825 fc0e60 98824->98825 98870 fc0f97 98825->98870 98827 fc0e67 98827->98828 98829 fb4916 __fclose_nolock 58 API calls 98827->98829 98828->98735 98830 fc0e8a 98829->98830 98830->98828 98831 fb4916 __fclose_nolock 58 API calls 98830->98831 98832 fc0e96 98831->98832 98832->98828 98833 fb4916 __fclose_nolock 58 API calls 98832->98833 98834 fc0ea3 98833->98834 98835 fb4916 __fclose_nolock 58 API calls 98834->98835 98835->98828 98836->98728 98837->98731 98838->98735 98839->98728 98840->98745 98841->98747 98843 fc5ec6 98842->98843 98844 fc5ed3 98842->98844 98845 fb8d68 __mbschr_l 58 API calls 98843->98845 98847 fc5edf 98844->98847 98848 fb8d68 __mbschr_l 58 API calls 98844->98848 98846 fc5ecb 98845->98846 98846->98777 98847->98777 98849 fc5f00 98848->98849 98850 fb8ff6 __mbschr_l 9 API calls 98849->98850 98850->98846 98851->98754 98852->98761 98853->98763 98854->98760 98855->98763 98856->98773 98857->98781 98858->98761 98859->98770 98860->98799 98861->98814 98862->98799 98863->98810 98864->98815 98865->98793 98866->98799 98867->98755 98868->98760 98869->98761 98871 fc0fa3 __freefls@4 98870->98871 98872 fc0fc7 98871->98872 98873 fc0fb0 98871->98873 98875 fc108b 98872->98875 98877 fc0fdb 98872->98877 98874 fb8d34 __read 58 API calls 98873->98874 98876 fc0fb5 98874->98876 98878 fb8d34 __read 58 API calls 98875->98878 98880 fb8d68 __mbschr_l 58 API calls 98876->98880 98881 fc0ff9 98877->98881 98882 fc1006 98877->98882 98879 fc0ffe 98878->98879 98888 fb8d68 __mbschr_l 58 API calls 98879->98888 98883 fc0fbc __freefls@4 98880->98883 98884 fb8d34 __read 58 API calls 98881->98884 98885 fc1028 98882->98885 98886 fc1013 98882->98886 98883->98827 98884->98879 98887 fbd446 ___lock_fhandle 59 API calls 98885->98887 98889 fb8d34 __read 58 API calls 98886->98889 98890 fc102e 98887->98890 98898 fc1020 98888->98898 98891 fc1018 98889->98891 98892 fc1054 98890->98892 98893 fc1041 98890->98893 98894 fb8d68 __mbschr_l 58 API calls 98891->98894 98897 fb8d68 __mbschr_l 58 API calls 98892->98897 98895 fc10ab __read_nolock 70 API calls 98893->98895 98894->98898 98899 fc104d 98895->98899 98896 fb8ff6 __mbschr_l 9 API calls 98896->98883 98900 fc1059 98897->98900 98898->98896 98902 fc1083 __read LeaveCriticalSection 98899->98902 98901 fb8d34 __read 58 API calls 98900->98901 98901->98899 98902->98883 98903->98819 98904->98828 98905->98821 98909 fb543a GetSystemTimeAsFileTime 98906->98909 98908 ff91f8 98908->98501 98910 fb5468 __aulldiv 98909->98910 98910->98908 98912 fb5e9c __freefls@4 98911->98912 98913 fb5eae 98912->98913 98914 fb5ec3 98912->98914 98925 fb8d68 58 API calls __getptd_noexit 98913->98925 98915 fb6e4e __lock_file 59 API calls 98914->98915 98917 fb5ec9 98915->98917 98927 fb5b00 67 API calls 6 library calls 98917->98927 98918 fb5eb3 98926 fb8ff6 9 API calls __mbschr_l 98918->98926 98921 fb5ebe __freefls@4 98921->98506 98922 fb5ed4 98928 fb5ef4 LeaveCriticalSection LeaveCriticalSection _fseek 98922->98928 98924 fb5ee6 98924->98921 98925->98918 98926->98921 98927->98922 98928->98924 98929->98368 98930->98377 98931->98390 98932->98392 98933->98389 98934->98398 98936 f992c9 Mailbox 98935->98936 98937 fcf5c8 98936->98937 98941 f992d3 98936->98941 98938 fb0ff6 Mailbox 59 API calls 98937->98938 98940 fcf5d4 98938->98940 98939 f992da 98939->98402 98941->98939 98943 f99df0 98941->98943 98945 f99dfb 98943->98945 98944 f99e32 98944->98941 98945->98944 98948 f98e34 59 API calls Mailbox 98945->98948 98947 f99e5d 98947->98941 98948->98947 98950 f99eaa 98949->98950 98956 f99ed8 Mailbox 98949->98956 98951 f99efd 98950->98951 98955 f99eb0 Mailbox 98950->98955 98952 f981a7 59 API calls 98951->98952 98952->98956 98953 fcfe38 98953->98956 98964 fe7405 59 API calls 98953->98964 98954 f99ec4 98954->98956 98957 f99f2c 98954->98957 98958 f99ecf 98954->98958 98955->98953 98955->98954 98956->98413 98957->98956 98963 f98e34 59 API calls Mailbox 98957->98963 98958->98956 98959 fcfe0f VariantClear 98958->98959 98959->98956 98962->98410 98963->98956 98964->98956 98969 ff99d2 __tzset_nolock _wcscmp 98965->98969 98966 ff9393 GetSystemTimeAsFileTime 98966->98969 98967 ff9866 98967->98419 98967->98448 98968 f9506b 74 API calls 98968->98969 98969->98966 98969->98967 98969->98968 98970 f95045 85 API calls 98969->98970 98970->98969 98972 ff8d9b 98971->98972 98973 ff8da9 98971->98973 98974 fb548b 115 API calls 98972->98974 98975 ff8dee 98973->98975 98976 fb548b 115 API calls 98973->98976 99001 ff8db2 98973->99001 98974->98973 99002 ff901b 98975->99002 98978 ff8dd3 98976->98978 98978->98975 98980 ff8ddc 98978->98980 98979 ff8e32 98981 ff8e57 98979->98981 98982 ff8e36 98979->98982 98984 fb55d6 __fcloseall 83 API calls 98980->98984 98980->99001 99006 ff8c33 98981->99006 98983 ff8e43 98982->98983 98986 fb55d6 __fcloseall 83 API calls 98982->98986 98990 fb55d6 __fcloseall 83 API calls 98983->98990 98983->99001 98984->99001 98986->98983 98988 ff8e85 99015 ff8eb5 98988->99015 98989 ff8e65 98991 ff8e72 98989->98991 98993 fb55d6 __fcloseall 83 API calls 98989->98993 98990->99001 98995 fb55d6 __fcloseall 83 API calls 98991->98995 98991->99001 98993->98991 98995->99001 98998 ff8ea0 99000 fb55d6 __fcloseall 83 API calls 98998->99000 98998->99001 99000->99001 99001->98447 99003 ff9029 __tzset_nolock _memmove 99002->99003 99004 ff9040 99002->99004 99003->98979 99005 fb5812 __fread_nolock 74 API calls 99004->99005 99005->99003 99007 fb594c std::exception::_Copy_str 58 API calls 99006->99007 99008 ff8c42 99007->99008 99009 fb594c std::exception::_Copy_str 58 API calls 99008->99009 99010 ff8c56 99009->99010 99011 fb594c std::exception::_Copy_str 58 API calls 99010->99011 99012 ff8c6a 99011->99012 99013 ff8f97 58 API calls 99012->99013 99014 ff8c7d 99012->99014 99013->99014 99014->98988 99014->98989 99019 ff8eca 99015->99019 99016 ff8f82 99048 ff91bf 99016->99048 99017 ff8c8f 74 API calls 99017->99019 99019->99016 99019->99017 99022 ff8e8c 99019->99022 99044 ff909c 99019->99044 99052 ff8d2b 74 API calls 99019->99052 99023 ff8f97 99022->99023 99024 ff8fa4 99023->99024 99027 ff8faa 99023->99027 99025 fb2f95 _free 58 API calls 99024->99025 99025->99027 99026 ff8fbb 99029 ff8e93 99026->99029 99030 fb2f95 _free 58 API calls 99026->99030 99027->99026 99028 fb2f95 _free 58 API calls 99027->99028 99028->99026 99029->98998 99031 fb55d6 99029->99031 99030->99029 99032 fb55e2 __freefls@4 99031->99032 99033 fb55f6 99032->99033 99035 fb560e 99032->99035 99101 fb8d68 58 API calls __getptd_noexit 99033->99101 99037 fb6e4e __lock_file 59 API calls 99035->99037 99040 fb5606 __freefls@4 99035->99040 99036 fb55fb 99102 fb8ff6 9 API calls __mbschr_l 99036->99102 99039 fb5620 99037->99039 99085 fb556a 99039->99085 99040->98998 99045 ff90ab 99044->99045 99046 ff90eb 99044->99046 99045->99019 99046->99045 99053 ff9172 99046->99053 99049 ff91cc 99048->99049 99050 ff91dd 99048->99050 99051 fb4a93 80 API calls 99049->99051 99050->99022 99051->99050 99052->99019 99054 ff919e 99053->99054 99056 ff91af 99053->99056 99057 fb4a93 99054->99057 99056->99046 99058 fb4a9f __freefls@4 99057->99058 99059 fb4abd 99058->99059 99060 fb4ad5 99058->99060 99062 fb4acd __freefls@4 99058->99062 99082 fb8d68 58 API calls __getptd_noexit 99059->99082 99063 fb6e4e __lock_file 59 API calls 99060->99063 99062->99056 99065 fb4adb 99063->99065 99064 fb4ac2 99083 fb8ff6 9 API calls __mbschr_l 99064->99083 99070 fb493a 99065->99070 99073 fb4949 99070->99073 99078 fb4967 99070->99078 99071 fb4957 99072 fb8d68 __mbschr_l 58 API calls 99071->99072 99074 fb495c 99072->99074 99073->99071 99075 fb4981 _memmove 99073->99075 99073->99078 99076 fb8ff6 __mbschr_l 9 API calls 99074->99076 99077 fbb05e __flsbuf 78 API calls 99075->99077 99075->99078 99079 fb4c6d __flush 78 API calls 99075->99079 99080 fb4916 __fclose_nolock 58 API calls 99075->99080 99081 fbdac6 __write 78 API calls 99075->99081 99076->99078 99077->99075 99084 fb4b0d LeaveCriticalSection LeaveCriticalSection _fseek 99078->99084 99079->99075 99080->99075 99081->99075 99082->99064 99083->99062 99084->99062 99086 fb5579 99085->99086 99087 fb558d 99085->99087 99140 fb8d68 58 API calls __getptd_noexit 99086->99140 99089 fb5589 99087->99089 99104 fb4c6d 99087->99104 99103 fb5645 LeaveCriticalSection LeaveCriticalSection _fseek 99089->99103 99090 fb557e 99141 fb8ff6 9 API calls __mbschr_l 99090->99141 99096 fb4916 __fclose_nolock 58 API calls 99097 fb55a7 99096->99097 99114 fc0c52 99097->99114 99099 fb55ad 99099->99089 99100 fb2f95 _free 58 API calls 99099->99100 99100->99089 99101->99036 99102->99040 99103->99040 99105 fb4c80 99104->99105 99106 fb4ca4 99104->99106 99105->99106 99107 fb4916 __fclose_nolock 58 API calls 99105->99107 99110 fc0dc7 99106->99110 99108 fb4c9d 99107->99108 99142 fbdac6 99108->99142 99111 fc0dd4 99110->99111 99113 fb55a1 99110->99113 99112 fb2f95 _free 58 API calls 99111->99112 99111->99113 99112->99113 99113->99096 99115 fc0c5e __freefls@4 99114->99115 99116 fc0c6b 99115->99116 99117 fc0c82 99115->99117 99267 fb8d34 58 API calls __getptd_noexit 99116->99267 99118 fc0d0d 99117->99118 99120 fc0c92 99117->99120 99272 fb8d34 58 API calls __getptd_noexit 99118->99272 99123 fc0cba 99120->99123 99124 fc0cb0 99120->99124 99122 fc0c70 99268 fb8d68 58 API calls __getptd_noexit 99122->99268 99128 fbd446 ___lock_fhandle 59 API calls 99123->99128 99269 fb8d34 58 API calls __getptd_noexit 99124->99269 99125 fc0cb5 99273 fb8d68 58 API calls __getptd_noexit 99125->99273 99131 fc0cc0 99128->99131 99129 fc0c77 __freefls@4 99129->99099 99133 fc0cde 99131->99133 99134 fc0cd3 99131->99134 99132 fc0d19 99274 fb8ff6 9 API calls __mbschr_l 99132->99274 99270 fb8d68 58 API calls __getptd_noexit 99133->99270 99252 fc0d2d 99134->99252 99138 fc0cd9 99271 fc0d05 LeaveCriticalSection __unlock_fhandle 99138->99271 99140->99090 99141->99089 99143 fbdad2 __freefls@4 99142->99143 99144 fbdadf 99143->99144 99145 fbdaf6 99143->99145 99243 fb8d34 58 API calls __getptd_noexit 99144->99243 99147 fbdb95 99145->99147 99149 fbdb0a 99145->99149 99249 fb8d34 58 API calls __getptd_noexit 99147->99249 99148 fbdae4 99244 fb8d68 58 API calls __getptd_noexit 99148->99244 99152 fbdb28 99149->99152 99153 fbdb32 99149->99153 99245 fb8d34 58 API calls __getptd_noexit 99152->99245 99170 fbd446 99153->99170 99154 fbdb2d 99250 fb8d68 58 API calls __getptd_noexit 99154->99250 99155 fbdaeb __freefls@4 99155->99106 99158 fbdb38 99160 fbdb4b 99158->99160 99161 fbdb5e 99158->99161 99179 fbdbb5 99160->99179 99246 fb8d68 58 API calls __getptd_noexit 99161->99246 99162 fbdba1 99251 fb8ff6 9 API calls __mbschr_l 99162->99251 99166 fbdb63 99247 fb8d34 58 API calls __getptd_noexit 99166->99247 99168 fbdb57 99248 fbdb8d LeaveCriticalSection __unlock_fhandle 99168->99248 99171 fbd452 __freefls@4 99170->99171 99172 fbd4a1 EnterCriticalSection 99171->99172 99173 fb9e4b __lock 58 API calls 99171->99173 99174 fbd4c7 __freefls@4 99172->99174 99175 fbd477 99173->99175 99174->99158 99176 fba06b __getstream InitializeCriticalSectionAndSpinCount 99175->99176 99178 fbd48f 99175->99178 99176->99178 99177 fbd4cb ___lock_fhandle LeaveCriticalSection 99177->99172 99178->99177 99180 fbdbc2 __ftell_nolock 99179->99180 99181 fbdbf6 99180->99181 99182 fbdc01 99180->99182 99183 fbdc20 99180->99183 99185 fbc836 __atodbl_l 6 API calls 99181->99185 99184 fb8d34 __read 58 API calls 99182->99184 99187 fbdc78 99183->99187 99188 fbdc5c 99183->99188 99186 fbdc06 99184->99186 99189 fbe416 99185->99189 99190 fb8d68 __mbschr_l 58 API calls 99186->99190 99191 fbdc91 99187->99191 99194 fc1b11 __lseeki64_nolock 60 API calls 99187->99194 99192 fb8d34 __read 58 API calls 99188->99192 99189->99168 99193 fbdc0d 99190->99193 99195 fc5ebb __stbuf 58 API calls 99191->99195 99196 fbdc61 99192->99196 99197 fb8ff6 __mbschr_l 9 API calls 99193->99197 99194->99191 99198 fbdc9f 99195->99198 99199 fb8d68 __mbschr_l 58 API calls 99196->99199 99197->99181 99200 fbdff8 99198->99200 99205 fb9bec _LocaleUpdate::_LocaleUpdate 58 API calls 99198->99205 99201 fbdc68 99199->99201 99202 fbe38b WriteFile 99200->99202 99203 fbe016 99200->99203 99204 fb8ff6 __mbschr_l 9 API calls 99201->99204 99206 fbdfeb GetLastError 99202->99206 99212 fbdfb8 99202->99212 99207 fbe13a 99203->99207 99215 fbe02c 99203->99215 99204->99181 99208 fbdccb GetConsoleMode 99205->99208 99206->99212 99219 fbe22f 99207->99219 99225 fbe145 99207->99225 99208->99200 99210 fbdd0a 99208->99210 99209 fbe3c4 99209->99181 99211 fb8d68 __mbschr_l 58 API calls 99209->99211 99210->99200 99213 fbdd1a GetConsoleCP 99210->99213 99217 fbe3f2 99211->99217 99212->99181 99212->99209 99218 fbe118 99212->99218 99213->99209 99239 fbdd49 99213->99239 99214 fbe09b WriteFile 99214->99206 99216 fbe0d8 99214->99216 99215->99209 99215->99214 99216->99215 99233 fbe0fc 99216->99233 99221 fb8d34 __read 58 API calls 99217->99221 99222 fbe3bb 99218->99222 99223 fbe123 99218->99223 99219->99209 99224 fbe2a4 WideCharToMultiByte 99219->99224 99220 fbe1aa WriteFile 99220->99206 99226 fbe1f9 99220->99226 99221->99181 99228 fb8d47 __dosmaperr 58 API calls 99222->99228 99227 fb8d68 __mbschr_l 58 API calls 99223->99227 99224->99206 99236 fbe2eb 99224->99236 99225->99209 99225->99220 99226->99212 99226->99225 99226->99233 99230 fbe128 99227->99230 99228->99181 99229 fbe2f3 WriteFile 99232 fbe346 GetLastError 99229->99232 99229->99236 99234 fb8d34 __read 58 API calls 99230->99234 99231 fb3835 __write_nolock 58 API calls 99231->99239 99232->99236 99233->99212 99234->99181 99235 fc650a 60 API calls __write_nolock 99235->99239 99236->99212 99236->99219 99236->99229 99236->99233 99237 fc7cae WriteConsoleW CreateFileW __putwch_nolock 99241 fbde9f 99237->99241 99238 fbde32 WideCharToMultiByte 99238->99212 99240 fbde6d WriteFile 99238->99240 99239->99212 99239->99231 99239->99235 99239->99238 99239->99241 99240->99206 99240->99241 99241->99206 99241->99212 99241->99237 99241->99239 99242 fbdec7 WriteFile 99241->99242 99242->99206 99242->99241 99243->99148 99244->99155 99245->99154 99246->99166 99247->99168 99248->99155 99249->99154 99250->99162 99251->99155 99275 fbd703 99252->99275 99254 fc0d91 99288 fbd67d 59 API calls 2 library calls 99254->99288 99256 fc0d3b 99256->99254 99257 fbd703 __lseeki64_nolock 58 API calls 99256->99257 99266 fc0d6f 99256->99266 99261 fc0d66 99257->99261 99258 fbd703 __lseeki64_nolock 58 API calls 99262 fc0d7b FindCloseChangeNotification 99258->99262 99259 fc0d99 99260 fc0dbb 99259->99260 99289 fb8d47 58 API calls 3 library calls 99259->99289 99260->99138 99264 fbd703 __lseeki64_nolock 58 API calls 99261->99264 99262->99254 99265 fc0d87 GetLastError 99262->99265 99264->99266 99265->99254 99266->99254 99266->99258 99267->99122 99268->99129 99269->99125 99270->99138 99271->99129 99272->99125 99273->99132 99274->99129 99276 fbd70e 99275->99276 99277 fbd723 99275->99277 99278 fb8d34 __read 58 API calls 99276->99278 99279 fb8d34 __read 58 API calls 99277->99279 99281 fbd748 99277->99281 99280 fbd713 99278->99280 99282 fbd752 99279->99282 99283 fb8d68 __mbschr_l 58 API calls 99280->99283 99281->99256 99284 fb8d68 __mbschr_l 58 API calls 99282->99284 99285 fbd71b 99283->99285 99286 fbd75a 99284->99286 99285->99256 99287 fb8ff6 __mbschr_l 9 API calls 99286->99287 99287->99285 99288->99259 99289->99260 99291 fb09e2 __ftell_nolock 99290->99291 99292 fb09f1 GetLongPathNameW 99291->99292 99293 f97d2c 59 API calls 99292->99293 99294 f9741d 99293->99294 99295 f9716b 99294->99295 99296 f977c7 59 API calls 99295->99296 99297 f9717d 99296->99297 99298 f948ae 60 API calls 99297->99298 99299 f97188 99298->99299 99300 fcecae 99299->99300 99301 f97193 99299->99301 99306 fcecc8 99300->99306 99348 f97a68 61 API calls 99300->99348 99302 f93f84 59 API calls 99301->99302 99304 f9719f 99302->99304 99342 f934c2 99304->99342 99307 f971b2 Mailbox 99307->98202 99309 f94f3d 136 API calls 99308->99309 99310 f969ef 99309->99310 99311 fce45a 99310->99311 99312 f94f3d 136 API calls 99310->99312 99313 ff97e5 122 API calls 99311->99313 99315 f96a03 99312->99315 99314 fce46f 99313->99314 99316 fce490 99314->99316 99317 fce473 99314->99317 99315->99311 99318 f96a0b 99315->99318 99320 fb0ff6 Mailbox 59 API calls 99316->99320 99319 f94faa 84 API calls 99317->99319 99321 fce47b 99318->99321 99322 f96a17 99318->99322 99319->99321 99341 fce4d5 Mailbox 99320->99341 99458 ff4534 90 API calls _wprintf 99321->99458 99349 f96bec 99322->99349 99325 fce489 99325->99316 99327 fce689 99328 fb2f95 _free 58 API calls 99327->99328 99329 fce691 99328->99329 99330 f94faa 84 API calls 99329->99330 99335 fce69a 99330->99335 99334 fb2f95 _free 58 API calls 99334->99335 99335->99334 99337 f94faa 84 API calls 99335->99337 99461 fefcb1 89 API calls 4 library calls 99335->99461 99337->99335 99338 f97f41 59 API calls 99338->99341 99341->99327 99341->99335 99341->99338 99441 fefc4d 99341->99441 99444 f9766f 99341->99444 99452 f974bd 99341->99452 99459 fefb6e 61 API calls 2 library calls 99341->99459 99460 ff7621 59 API calls Mailbox 99341->99460 99343 f934d4 99342->99343 99347 f934f3 _memmove 99342->99347 99345 fb0ff6 Mailbox 59 API calls 99343->99345 99344 fb0ff6 Mailbox 59 API calls 99346 f9350a 99344->99346 99345->99347 99346->99307 99347->99344 99348->99300 99350 fce847 99349->99350 99351 f96c15 99349->99351 99553 fefcb1 89 API calls 4 library calls 99350->99553 99467 f95906 60 API calls Mailbox 99351->99467 99354 f96c37 99468 f95956 99354->99468 99355 fce85a 99554 fefcb1 89 API calls 4 library calls 99355->99554 99358 f96c54 99360 f977c7 59 API calls 99358->99360 99362 f96c60 99360->99362 99361 fce876 99364 f96cc1 99361->99364 99481 fb0b9b 60 API calls __ftell_nolock 99362->99481 99366 fce889 99364->99366 99367 f96ccf 99364->99367 99365 f96c6c 99370 f977c7 59 API calls 99365->99370 99368 f95dcf CloseHandle 99366->99368 99369 f977c7 59 API calls 99367->99369 99371 fce895 99368->99371 99372 f96cd8 99369->99372 99373 f96c78 99370->99373 99374 f94f3d 136 API calls 99371->99374 99375 f977c7 59 API calls 99372->99375 99376 f948ae 60 API calls 99373->99376 99377 fce8b1 99374->99377 99378 f96ce1 99375->99378 99379 f96c86 99376->99379 99380 fce8da 99377->99380 99383 ff97e5 122 API calls 99377->99383 99491 f946f9 99378->99491 99555 fefcb1 89 API calls 4 library calls 99380->99555 99388 fce8cd 99383->99388 99390 fce8d5 99388->99390 99391 fce8f6 99388->99391 99393 f94faa 84 API calls 99390->99393 99394 f94faa 84 API calls 99391->99394 99393->99380 99396 fce8fb 99394->99396 99395 f96e6c Mailbox 99462 f95934 99395->99462 99397 fb0ff6 Mailbox 59 API calls 99396->99397 99404 fce92f 99397->99404 99405 f9766f 59 API calls 99404->99405 99435 fce978 Mailbox 99405->99435 99440 fce8f1 99440->99395 99442 fb0ff6 Mailbox 59 API calls 99441->99442 99443 fefc7d _memmove 99442->99443 99443->99341 99445 f9770f 99444->99445 99450 f97682 _memmove 99444->99450 99447 fb0ff6 Mailbox 59 API calls 99445->99447 99446 fb0ff6 Mailbox 59 API calls 99448 f97689 99446->99448 99447->99450 99449 fb0ff6 Mailbox 59 API calls 99448->99449 99451 f976b2 99448->99451 99449->99451 99450->99446 99451->99341 99453 f974d0 99452->99453 99456 f9757e 99452->99456 99455 fb0ff6 Mailbox 59 API calls 99453->99455 99457 f97502 99453->99457 99454 fb0ff6 59 API calls Mailbox 99454->99457 99455->99457 99456->99341 99457->99454 99457->99456 99458->99325 99459->99341 99460->99341 99461->99335 99463 f95dcf CloseHandle 99462->99463 99464 f9593c Mailbox 99463->99464 99465 f95dcf CloseHandle 99464->99465 99466 f9594b 99465->99466 99467->99354 99469 f95dcf CloseHandle 99468->99469 99470 f95962 99469->99470 99564 f95df9 99470->99564 99472 f959a4 99472->99355 99472->99358 99473 f95981 99473->99472 99572 f95770 99473->99572 99475 f95993 99589 f953db SetFilePointerEx SetFilePointerEx 99475->99589 99477 f9599a 99477->99472 99478 fce030 99477->99478 99590 ff3696 SetFilePointerEx SetFilePointerEx WriteFile 99478->99590 99480 fce060 99480->99472 99481->99365 99492 f977c7 59 API calls 99491->99492 99493 f9470f 99492->99493 99494 f977c7 59 API calls 99493->99494 99495 f94717 99494->99495 99496 f977c7 59 API calls 99495->99496 99497 f9471f 99496->99497 99498 f977c7 59 API calls 99497->99498 99499 f94727 99498->99499 99553->99355 99554->99361 99555->99440 99565 f95e12 CreateFileW 99564->99565 99566 fce181 99564->99566 99567 f95e34 99565->99567 99566->99567 99568 fce187 CreateFileW 99566->99568 99567->99473 99568->99567 99569 fce1ad 99568->99569 99570 f95c4e 2 API calls 99569->99570 99571 fce1b8 99570->99571 99571->99567 99573 fcdfce 99572->99573 99574 f9578b 99572->99574 99588 f9581a 99573->99588 99597 f95e3f 99573->99597 99575 f95c4e 2 API calls 99574->99575 99574->99588 99576 f957ad 99575->99576 99578 f9538e 59 API calls 99576->99578 99579 f957b7 99578->99579 99579->99573 99580 f957c4 99579->99580 99581 fb0ff6 Mailbox 59 API calls 99580->99581 99582 f957cf 99581->99582 99588->99475 99589->99477 99590->99480 99598 f95c4e 2 API calls 99597->99598 99599 f95e60 99598->99599 99600 f95c4e 2 API calls 99599->99600 99601 f95e74 99600->99601 99601->99588 100295 f93633 100296 f9366a 100295->100296 100297 f93688 100296->100297 100298 f936e7 100296->100298 100335 f936e5 100296->100335 100302 f9375d PostQuitMessage 100297->100302 100303 f93695 100297->100303 100300 fcd31c 100298->100300 100301 f936ed 100298->100301 100299 f936ca DefWindowProcW 100337 f936d8 100299->100337 100345 fa11d0 10 API calls Mailbox 100300->100345 100304 f936f2 100301->100304 100305 f93715 SetTimer RegisterWindowMessageW 100301->100305 100302->100337 100306 fcd38f 100303->100306 100307 f936a0 100303->100307 100309 f936f9 KillTimer 100304->100309 100310 fcd2bf 100304->100310 100311 f9373e CreatePopupMenu 100305->100311 100305->100337 100349 ff2a16 71 API calls _memset 100306->100349 100312 f936a8 100307->100312 100313 f93767 100307->100313 100340 f944cb Shell_NotifyIconW _memset 100309->100340 100316 fcd2f8 MoveWindow 100310->100316 100317 fcd2c4 100310->100317 100311->100337 100319 fcd374 100312->100319 100320 f936b3 100312->100320 100343 f94531 64 API calls _memset 100313->100343 100315 fcd343 100346 fa11f3 341 API calls Mailbox 100315->100346 100316->100337 100325 fcd2c8 100317->100325 100326 fcd2e7 SetFocus 100317->100326 100319->100299 100348 fe817e 59 API calls Mailbox 100319->100348 100328 f9374b 100320->100328 100329 f936be 100320->100329 100321 fcd3a1 100321->100299 100321->100337 100324 f9375b 100324->100337 100325->100329 100330 fcd2d1 100325->100330 100326->100337 100327 f9370c 100341 f93114 DeleteObject DestroyWindow Mailbox 100327->100341 100342 f945df 81 API calls _memset 100328->100342 100329->100299 100347 f944cb Shell_NotifyIconW _memset 100329->100347 100344 fa11d0 10 API calls Mailbox 100330->100344 100335->100299 100338 fcd368 100339 f943db 68 API calls 100338->100339 100339->100335 100340->100327 100341->100337 100342->100324 100343->100324 100344->100337 100345->100315 100346->100329 100347->100338 100348->100335 100349->100321 100350 f91055 100355 f92649 100350->100355 100353 fb2f80 __cinit 67 API calls 100354 f91064 100353->100354 100356 f977c7 59 API calls 100355->100356 100357 f926b7 100356->100357 100362 f93582 100357->100362 100360 f92754 100361 f9105a 100360->100361 100365 f93416 59 API calls 2 library calls 100360->100365 100361->100353 100366 f935b0 100362->100366 100365->100360 100367 f935bd 100366->100367 100368 f935a1 100366->100368 100367->100368 100369 f935c4 RegOpenKeyExW 100367->100369 100368->100360 100369->100368 100370 f935de RegQueryValueExW 100369->100370 100371 f935ff 100370->100371 100372 f93614 RegCloseKey 100370->100372 100371->100372 100372->100368 100373 fd0251 100385 fafb84 100373->100385 100375 fd0267 100376 fd027d 100375->100376 100377 fd02e8 100375->100377 100394 f99fbd 60 API calls 100376->100394 100379 f9fe40 341 API calls 100377->100379 100380 fd02dc Mailbox 100379->100380 100383 fd0ce1 Mailbox 100380->100383 100396 ffa0b5 89 API calls 4 library calls 100380->100396 100382 fd02bc 100382->100380 100395 ff85d9 59 API calls Mailbox 100382->100395 100386 fafba2 100385->100386 100387 fafb90 100385->100387 100389 fafba8 100386->100389 100390 fafbd1 100386->100390 100388 f99e9c 60 API calls 100387->100388 100393 fafb9a 100388->100393 100391 fb0ff6 Mailbox 59 API calls 100389->100391 100392 f99e9c 60 API calls 100390->100392 100391->100393 100392->100393 100393->100375 100394->100382 100395->100380 100396->100383 100397 f99af6 100398 fb0ff6 Mailbox 59 API calls 100397->100398 100399 f99afd 100398->100399 100400 f91016 100405 f94ad2 100400->100405 100403 fb2f80 __cinit 67 API calls 100404 f91025 100403->100404 100406 fb0ff6 Mailbox 59 API calls 100405->100406 100407 f94ada 100406->100407 100408 f9101b 100407->100408 100412 f94a94 100407->100412 100408->100403 100413 f94a9d 100412->100413 100414 f94aaf 100412->100414 100415 fb2f80 __cinit 67 API calls 100413->100415 100416 f94afe 100414->100416 100415->100414 100417 f977c7 59 API calls 100416->100417 100418 f94b16 GetVersionExW 100417->100418 100419 f97d2c 59 API calls 100418->100419 100420 f94b59 100419->100420 100421 f97e8c 59 API calls 100420->100421 100424 f94b86 100420->100424 100422 f94b7a 100421->100422 100423 f97886 59 API calls 100422->100423 100423->100424 100425 fcdc8d 100424->100425 100426 f94bf1 GetCurrentProcess IsWow64Process 100424->100426 100427 f94c0a 100426->100427 100428 f94c89 GetSystemInfo 100427->100428 100429 f94c20 100427->100429 100430 f94c56 100428->100430 100440 f94c95 100429->100440 100430->100408 100433 f94c7d GetSystemInfo 100436 f94c47 100433->100436 100434 f94c32 100435 f94c95 2 API calls 100434->100435 100437 f94c3a GetNativeSystemInfo 100435->100437 100436->100430 100438 f94c4d FreeLibrary 100436->100438 100437->100436 100438->100430 100441 f94c2e 100440->100441 100442 f94c9e LoadLibraryA 100440->100442 100441->100433 100441->100434 100442->100441 100443 f94caf GetProcAddress 100442->100443 100443->100441 100444 f9e608 100447 f9d260 100444->100447 100446 f9e616 100448 f9d27d 100447->100448 100476 f9d4dd 100447->100476 100449 fd2abb 100448->100449 100450 fd2b0a 100448->100450 100479 f9d2a4 100448->100479 100451 fd2abe 100449->100451 100461 fd2ad9 100449->100461 100491 100a6fb 341 API calls __cinit 100450->100491 100454 fd2aca 100451->100454 100451->100479 100489 100ad0f 341 API calls 100454->100489 100457 fb2f80 __cinit 67 API calls 100457->100479 100458 fd2cdf 100458->100458 100459 f9d6ab 100459->100446 100460 f9d594 100483 f98bb2 68 API calls 100460->100483 100461->100476 100490 100b1b7 341 API calls 3 library calls 100461->100490 100465 f9d5a3 100465->100446 100466 fd2c26 100494 100aa66 89 API calls 100466->100494 100470 f98620 69 API calls 100470->100479 100474 f99e9c 60 API calls 100474->100479 100476->100459 100495 ffa0b5 89 API calls 4 library calls 100476->100495 100477 f9a000 341 API calls 100477->100479 100478 f981a7 59 API calls 100478->100479 100479->100457 100479->100459 100479->100460 100479->100466 100479->100470 100479->100474 100479->100476 100479->100477 100479->100478 100481 f988a0 68 API calls __cinit 100479->100481 100482 f986a2 68 API calls 100479->100482 100484 f9859a 68 API calls 100479->100484 100485 f9d0dc 341 API calls 100479->100485 100486 f99f3a 59 API calls Mailbox 100479->100486 100487 f9d060 89 API calls 100479->100487 100488 f9cedd 341 API calls 100479->100488 100492 f98bb2 68 API calls 100479->100492 100493 fe6d03 60 API calls 100479->100493 100481->100479 100482->100479 100483->100465 100484->100479 100485->100479 100486->100479 100487->100479 100488->100479 100489->100459 100490->100476 100491->100479 100492->100479 100493->100479 100494->100476 100495->100458 100496 f9e70b 100497 f9d260 341 API calls 100496->100497 100498 f9e719 100497->100498 100499 f9568a 100506 f95c18 100499->100506 100505 f956ba Mailbox 100507 fb0ff6 Mailbox 59 API calls 100506->100507 100508 f95c2b 100507->100508 100509 fb0ff6 Mailbox 59 API calls 100508->100509 100510 f9569c 100509->100510 100511 f95632 100510->100511 100518 f95a2f 100511->100518 100513 f95674 100513->100505 100517 f981c1 61 API calls Mailbox 100513->100517 100514 f95d20 2 API calls 100515 f95643 100514->100515 100515->100513 100515->100514 100525 f95bda 100515->100525 100517->100505 100519 fce065 100518->100519 100520 f95a40 100518->100520 100534 fe6443 59 API calls Mailbox 100519->100534 100520->100515 100522 fce06f 100523 fb0ff6 Mailbox 59 API calls 100522->100523 100524 fce07b 100523->100524 100526 f95bee 100525->100526 100527 fce117 100525->100527 100535 f95b19 100526->100535 100540 fe6443 59 API calls Mailbox 100527->100540 100530 f95bfa 100530->100515 100531 fce122 100532 fb0ff6 Mailbox 59 API calls 100531->100532 100533 fce137 _memmove 100532->100533 100534->100522 100536 f95b31 100535->100536 100539 f95b2a _memmove 100535->100539 100537 fb0ff6 Mailbox 59 API calls 100536->100537 100538 fce0a7 100536->100538 100537->100539 100539->100530 100540->100531 100541 f9e5ec 100544 f9ce1a 100541->100544 100543 f9e5f8 100545 f9ce86 100544->100545 100546 f9ce32 100544->100546 100550 f9ceaf 100545->100550 100553 ffa0b5 89 API calls 4 library calls 100545->100553 100546->100545 100548 f9a000 341 API calls 100546->100548 100551 f9ce69 100548->100551 100549 fd29e6 100549->100549 100550->100543 100551->100550 100552 f99e9c 60 API calls 100551->100552 100552->100545 100553->100549 100554 fcff06 100555 fcff10 100554->100555 100560 f9ac90 Mailbox _memmove 100554->100560 100867 f98e34 59 API calls Mailbox 100555->100867 100559 fb0ff6 59 API calls Mailbox 100562 f9a097 Mailbox 100559->100562 100560->100562 100564 f9b685 100560->100564 100568 f9a1b7 100560->100568 100575 f97f41 59 API calls 100560->100575 100584 100bf80 341 API calls 100560->100584 100587 fb0ff6 59 API calls Mailbox 100560->100587 100588 f9b416 100560->100588 100589 f9a000 341 API calls 100560->100589 100591 fd0c94 100560->100591 100593 fd0ca2 100560->100593 100596 f9b37c 100560->100596 100603 f9ade2 Mailbox 100560->100603 100823 100c5f4 100560->100823 100855 ff7be0 100560->100855 100861 fe66f4 100560->100861 100868 fe7405 59 API calls 100560->100868 100869 100c4a7 85 API calls 2 library calls 100560->100869 100562->100559 100565 f9b5d5 100562->100565 100567 f9b5da 100562->100567 100562->100568 100571 fd047f 100562->100571 100572 f981a7 59 API calls 100562->100572 100574 f977c7 59 API calls 100562->100574 100578 fe7405 59 API calls 100562->100578 100581 fd0e00 100562->100581 100583 fb2f80 67 API calls __cinit 100562->100583 100585 f9a6ba 100562->100585 100864 f9ca20 341 API calls 2 library calls 100562->100864 100865 f9ba60 60 API calls Mailbox 100562->100865 100872 ffa0b5 89 API calls 4 library calls 100564->100872 100570 f981a7 59 API calls 100565->100570 100876 ffa0b5 89 API calls 4 library calls 100567->100876 100570->100568 100871 ffa0b5 89 API calls 4 library calls 100571->100871 100572->100562 100574->100562 100575->100560 100577 fd048e 100578->100562 100580 fe66f4 Mailbox 59 API calls 100580->100568 100875 ffa0b5 89 API calls 4 library calls 100581->100875 100583->100562 100584->100560 100874 ffa0b5 89 API calls 4 library calls 100585->100874 100587->100560 100866 f9f803 341 API calls 100588->100866 100589->100560 100592 f99df0 Mailbox 59 API calls 100591->100592 100595 fd0c86 100592->100595 100873 ffa0b5 89 API calls 4 library calls 100593->100873 100595->100568 100595->100580 100597 f99e9c 60 API calls 100596->100597 100598 f9b38d 100597->100598 100600 f99e9c 60 API calls 100598->100600 100600->100588 100602 f99df0 Mailbox 59 API calls 100602->100603 100603->100564 100603->100568 100603->100595 100603->100602 100604 fd00e0 VariantClear 100603->100604 100605 f97eec 59 API calls 100603->100605 100611 100e237 100603->100611 100614 fa3723 100603->100614 100689 ffd2e6 100603->100689 100736 ffd2e5 100603->100736 100783 fa2123 100603->100783 100870 fe7405 59 API calls 100603->100870 100604->100603 100605->100603 100612 100cdf1 130 API calls 100611->100612 100613 100e247 100612->100613 100613->100603 100615 f99997 84 API calls 100614->100615 100616 fa3742 100615->100616 100617 f99997 84 API calls 100616->100617 100618 fa3757 100617->100618 100619 f99997 84 API calls 100618->100619 100620 fa376a 100619->100620 100621 f99997 84 API calls 100620->100621 100622 fa3780 100621->100622 100623 f97b76 59 API calls 100622->100623 100624 fa3794 100623->100624 100625 fa37b9 100624->100625 100877 f99c9c 59 API calls 100624->100877 100627 fd744e 100625->100627 100648 fa37e3 __wopenfile 100625->100648 100628 f9942e 59 API calls 100627->100628 100630 fd7461 100628->100630 100629 fa39de 100631 f9942e 59 API calls 100629->100631 100632 f991b0 59 API calls 100630->100632 100633 fd7631 100631->100633 100634 fd7473 100632->100634 100636 fd767e 100633->100636 100637 fd763a 100633->100637 100641 f99040 60 API calls 100634->100641 100666 fd7498 100634->100666 100635 f99997 84 API calls 100638 fa386a 100635->100638 100642 f991b0 59 API calls 100636->100642 100640 f991b0 59 API calls 100637->100640 100643 f99997 84 API calls 100638->100643 100639 fa39ac Mailbox 100639->100603 100645 fd7645 100640->100645 100641->100666 100646 fd7688 100642->100646 100647 fa387f 100643->100647 100649 f99997 84 API calls 100645->100649 100650 f99040 60 API calls 100646->100650 100647->100629 100652 f9942e 59 API calls 100647->100652 100648->100629 100648->100635 100654 fd74f6 100648->100654 100671 fa38d0 __wopenfile 100648->100671 100655 fd7657 100649->100655 100651 fd76a4 100650->100651 100663 f99997 84 API calls 100651->100663 100656 fa389e 100652->100656 100653 f993ea 59 API calls 100653->100666 100654->100629 100657 f991b0 59 API calls 100654->100657 100881 f978ad 59 API calls 2 library calls 100655->100881 100656->100654 100659 fa38a9 100656->100659 100661 fd755d 100657->100661 100664 f991b0 59 API calls 100659->100664 100660 f99040 60 API calls 100660->100666 100667 f99040 60 API calls 100661->100667 100662 fd766b 100668 f993ea 59 API calls 100662->100668 100669 fd76bf 100663->100669 100670 fa38b8 100664->100670 100666->100639 100666->100653 100666->100660 100879 f978ad 59 API calls 2 library calls 100666->100879 100667->100671 100672 fd7679 100668->100672 100882 f978ad 59 API calls 2 library calls 100669->100882 100674 f97eec 59 API calls 100670->100674 100671->100639 100675 f993ea 59 API calls 100671->100675 100679 f99040 60 API calls 100671->100679 100680 fd75a9 100671->100680 100878 f978ad 59 API calls 2 library calls 100671->100878 100677 f99040 60 API calls 100672->100677 100674->100671 100675->100671 100676 fd76d3 100678 f993ea 59 API calls 100676->100678 100677->100639 100678->100672 100679->100671 100681 fd75e2 100680->100681 100682 fd75d3 100680->100682 100683 f993ea 59 API calls 100681->100683 100880 f97a84 59 API calls 2 library calls 100682->100880 100685 fd75f0 100683->100685 100686 f99040 60 API calls 100685->100686 100687 fd7603 100686->100687 100688 f97eec 59 API calls 100687->100688 100688->100629 100690 ffd310 100689->100690 100691 ffd305 100689->100691 100695 f977c7 59 API calls 100690->100695 100726 ffd3ea Mailbox 100690->100726 100883 f99c9c 59 API calls 100691->100883 100693 fb0ff6 Mailbox 59 API calls 100694 ffd433 100693->100694 100696 ffd43f 100694->100696 100886 f95906 60 API calls Mailbox 100694->100886 100697 ffd334 100695->100697 100700 f99997 84 API calls 100696->100700 100699 f977c7 59 API calls 100697->100699 100701 ffd33d 100699->100701 100702 ffd457 100700->100702 100703 f99997 84 API calls 100701->100703 100704 f95956 67 API calls 100702->100704 100705 ffd349 100703->100705 100706 ffd466 100704->100706 100707 f946f9 59 API calls 100705->100707 100708 ffd49e 100706->100708 100709 ffd46a GetLastError 100706->100709 100710 ffd35e 100707->100710 100713 ffd4c9 100708->100713 100714 ffd500 100708->100714 100711 ffd483 100709->100711 100712 f97c8e 59 API calls 100710->100712 100732 ffd3f3 Mailbox 100711->100732 100887 f95a1a CloseHandle 100711->100887 100715 ffd391 100712->100715 100717 fb0ff6 Mailbox 59 API calls 100713->100717 100716 fb0ff6 Mailbox 59 API calls 100714->100716 100718 ffd3e3 100715->100718 100719 ff3e73 3 API calls 100715->100719 100720 ffd505 100716->100720 100721 ffd4ce 100717->100721 100885 f99c9c 59 API calls 100718->100885 100724 ffd3a1 100719->100724 100728 f977c7 59 API calls 100720->100728 100720->100732 100725 ffd4df 100721->100725 100729 f977c7 59 API calls 100721->100729 100724->100718 100727 ffd3a5 100724->100727 100888 fff835 59 API calls 2 library calls 100725->100888 100726->100693 100726->100732 100730 f97f41 59 API calls 100727->100730 100728->100732 100729->100725 100733 ffd3b2 100730->100733 100732->100603 100884 ff3c66 63 API calls Mailbox 100733->100884 100735 ffd3bb Mailbox 100735->100718 100737 ffd310 100736->100737 100738 ffd305 100736->100738 100740 ffd3ea Mailbox 100737->100740 100743 f977c7 59 API calls 100737->100743 100889 f99c9c 59 API calls 100738->100889 100741 fb0ff6 Mailbox 59 API calls 100740->100741 100779 ffd3f3 Mailbox 100740->100779 100742 ffd433 100741->100742 100744 ffd43f 100742->100744 100892 f95906 60 API calls Mailbox 100742->100892 100745 ffd334 100743->100745 100748 f99997 84 API calls 100744->100748 100747 f977c7 59 API calls 100745->100747 100749 ffd33d 100747->100749 100750 ffd457 100748->100750 100751 f99997 84 API calls 100749->100751 100752 f95956 67 API calls 100750->100752 100753 ffd349 100751->100753 100754 ffd466 100752->100754 100755 f946f9 59 API calls 100753->100755 100756 ffd49e 100754->100756 100757 ffd46a GetLastError 100754->100757 100758 ffd35e 100755->100758 100761 ffd4c9 100756->100761 100762 ffd500 100756->100762 100759 ffd483 100757->100759 100760 f97c8e 59 API calls 100758->100760 100759->100779 100893 f95a1a CloseHandle 100759->100893 100763 ffd391 100760->100763 100765 fb0ff6 Mailbox 59 API calls 100761->100765 100764 fb0ff6 Mailbox 59 API calls 100762->100764 100766 ffd3e3 100763->100766 100767 ff3e73 3 API calls 100763->100767 100768 ffd505 100764->100768 100769 ffd4ce 100765->100769 100891 f99c9c 59 API calls 100766->100891 100772 ffd3a1 100767->100772 100775 f977c7 59 API calls 100768->100775 100768->100779 100773 ffd4df 100769->100773 100776 f977c7 59 API calls 100769->100776 100772->100766 100774 ffd3a5 100772->100774 100894 fff835 59 API calls 2 library calls 100773->100894 100777 f97f41 59 API calls 100774->100777 100775->100779 100776->100773 100780 ffd3b2 100777->100780 100779->100603 100890 ff3c66 63 API calls Mailbox 100780->100890 100782 ffd3bb Mailbox 100782->100766 100895 f99bf8 100783->100895 100787 fb0ff6 Mailbox 59 API calls 100788 fa2154 100787->100788 100791 fa2164 100788->100791 100923 f95906 60 API calls Mailbox 100788->100923 100789 fd69af 100790 fa2189 100789->100790 100927 fff7df 59 API calls 100789->100927 100800 fa2196 100790->100800 100928 f99c9c 59 API calls 100790->100928 100793 f99997 84 API calls 100791->100793 100794 fa2172 100793->100794 100796 f95956 67 API calls 100794->100796 100798 fa2181 100796->100798 100797 fd69f7 100799 fd69ff 100797->100799 100797->100800 100798->100789 100798->100790 100926 f95a1a CloseHandle 100798->100926 100929 f99c9c 59 API calls 100799->100929 100801 f95e3f 2 API calls 100800->100801 100804 fa219d 100801->100804 100805 fd6a11 100804->100805 100806 fa21b7 100804->100806 100807 fb0ff6 Mailbox 59 API calls 100805->100807 100808 f977c7 59 API calls 100806->100808 100809 fd6a17 100807->100809 100810 fa21bf 100808->100810 100815 fd6a2b 100809->100815 100930 f959b0 ReadFile SetFilePointerEx 100809->100930 100908 f956d2 100810->100908 100812 fa21ce 100817 fd6a2f _memmove 100812->100817 100924 f99b9c 59 API calls Mailbox 100812->100924 100815->100817 100931 ff794e 59 API calls 2 library calls 100815->100931 100818 fa21e2 Mailbox 100819 fa221c 100818->100819 100820 f95dcf CloseHandle 100818->100820 100819->100603 100821 fa2210 100820->100821 100821->100819 100925 f95a1a CloseHandle 100821->100925 100824 f977c7 59 API calls 100823->100824 100825 100c608 100824->100825 100826 f977c7 59 API calls 100825->100826 100827 100c610 100826->100827 100828 f977c7 59 API calls 100827->100828 100829 100c618 100828->100829 100830 f99997 84 API calls 100829->100830 100852 100c626 100830->100852 100831 f97a84 59 API calls 100831->100852 100832 f97d2c 59 API calls 100832->100852 100833 100c80f 100834 100c83c Mailbox 100833->100834 100937 f99b9c 59 API calls Mailbox 100833->100937 100834->100560 100836 100c7f6 100838 f97e0b 59 API calls 100836->100838 100837 f981a7 59 API calls 100837->100852 100840 100c803 100838->100840 100839 100c811 100841 f97e0b 59 API calls 100839->100841 100843 f97c8e 59 API calls 100840->100843 100844 100c820 100841->100844 100842 f97faf 59 API calls 100845 100c6bd CharUpperBuffW 100842->100845 100843->100833 100846 f97c8e 59 API calls 100844->100846 100935 f9859a 68 API calls 100845->100935 100846->100833 100847 f97faf 59 API calls 100848 100c77d CharUpperBuffW 100847->100848 100936 f9c707 69 API calls 2 library calls 100848->100936 100851 f99997 84 API calls 100851->100852 100852->100831 100852->100832 100852->100833 100852->100834 100852->100836 100852->100837 100852->100839 100852->100842 100852->100847 100852->100851 100853 f97c8e 59 API calls 100852->100853 100854 f97e0b 59 API calls 100852->100854 100853->100852 100854->100852 100856 ff7bec 100855->100856 100857 fb0ff6 Mailbox 59 API calls 100856->100857 100858 ff7bfa 100857->100858 100859 ff7c08 100858->100859 100860 f977c7 59 API calls 100858->100860 100859->100560 100860->100859 100938 fe6636 100861->100938 100863 fe6702 100863->100560 100864->100562 100865->100562 100866->100564 100867->100560 100868->100560 100869->100560 100870->100603 100871->100577 100872->100595 100873->100595 100874->100568 100875->100567 100876->100568 100877->100625 100878->100671 100879->100666 100880->100629 100881->100662 100882->100676 100883->100690 100884->100735 100885->100726 100886->100696 100887->100732 100888->100732 100889->100737 100890->100782 100891->100740 100892->100744 100893->100779 100894->100779 100896 f99c08 100895->100896 100897 fcfbff 100895->100897 100901 fb0ff6 Mailbox 59 API calls 100896->100901 100898 fcfc10 100897->100898 100899 f97d2c 59 API calls 100897->100899 100900 f97eec 59 API calls 100898->100900 100899->100898 100903 fcfc1a 100900->100903 100902 f99c1b 100901->100902 100902->100903 100904 f99c26 100902->100904 100905 f99c34 100903->100905 100906 f977c7 59 API calls 100903->100906 100904->100905 100907 f97f41 59 API calls 100904->100907 100905->100787 100905->100789 100906->100905 100907->100905 100909 f956dd 100908->100909 100910 f95702 100908->100910 100909->100910 100914 f956ec 100909->100914 100911 f97eec 59 API calls 100910->100911 100915 ff349a 100911->100915 100912 ff34c9 100912->100812 100916 f95c18 59 API calls 100914->100916 100915->100912 100932 ff3436 ReadFile SetFilePointerEx 100915->100932 100933 f97a84 59 API calls 2 library calls 100915->100933 100918 ff35ba 100916->100918 100919 f95632 61 API calls 100918->100919 100920 ff35c8 100919->100920 100922 ff35d8 Mailbox 100920->100922 100934 f9793a 61 API calls Mailbox 100920->100934 100922->100812 100923->100791 100924->100818 100925->100819 100926->100789 100927->100789 100928->100797 100929->100804 100930->100815 100931->100817 100932->100915 100933->100915 100934->100922 100935->100852 100936->100852 100937->100834 100939 fe665e 100938->100939 100940 fe6641 100938->100940 100939->100863 100940->100939 100942 fe6621 59 API calls Mailbox 100940->100942 100942->100940 100943 fd0226 100950 f9ade2 Mailbox 100943->100950 100944 f9b6c1 100960 ffa0b5 89 API calls 4 library calls 100944->100960 100946 fd0c86 100947 fe66f4 Mailbox 59 API calls 100946->100947 100948 fd0c8f 100947->100948 100949 f99df0 Mailbox 59 API calls 100949->100950 100950->100944 100950->100946 100950->100948 100950->100949 100951 fd00e0 VariantClear 100950->100951 100953 f97eec 59 API calls 100950->100953 100954 100e237 130 API calls 100950->100954 100955 fa2123 95 API calls 100950->100955 100956 ffd2e6 101 API calls 100950->100956 100957 fa3723 86 API calls 100950->100957 100958 ffd2e5 101 API calls 100950->100958 100959 fe7405 59 API calls 100950->100959 100951->100950 100953->100950 100954->100950 100955->100950 100956->100950 100957->100950 100958->100950 100959->100950 100960->100946 100961 19b24e0 100976 19b0000 100961->100976 100963 19b25ba 100979 19b2300 100963->100979 100982 19b3620 GetPEB 100976->100982 100978 19b068b 100978->100963 100980 19b230d Sleep 100979->100980 100981 19b231c 100980->100981 100983 19b364a 100982->100983 100983->100978 100984 f91066 100989 f9f8cf 100984->100989 100986 f9106c 100987 fb2f80 __cinit 67 API calls 100986->100987 100988 f91076 100987->100988 100990 f9f8f0 100989->100990 101022 fb0143 100990->101022 100994 f9f937 100995 f977c7 59 API calls 100994->100995 100996 f9f941 100995->100996 100997 f977c7 59 API calls 100996->100997 100998 f9f94b 100997->100998 100999 f977c7 59 API calls 100998->100999 101000 f9f955 100999->101000 101001 f977c7 59 API calls 101000->101001 101002 f9f993 101001->101002 101003 f977c7 59 API calls 101002->101003 101004 f9fa5e 101003->101004 101032 fa60e7 101004->101032 101008 f9fa90 101009 f977c7 59 API calls 101008->101009 101010 f9fa9a 101009->101010 101060 faffde 101010->101060 101012 f9fae1 101013 f9faf1 GetStdHandle 101012->101013 101014 f9fb3d 101013->101014 101015 fd49d5 101013->101015 101017 f9fb45 OleInitialize 101014->101017 101015->101014 101016 fd49de 101015->101016 101067 ff6dda 64 API calls Mailbox 101016->101067 101017->100986 101019 fd49e5 101068 ff74a9 CreateThread 101019->101068 101021 fd49f1 CloseHandle 101021->101017 101069 fb021c 101022->101069 101025 fb021c 59 API calls 101026 fb0185 101025->101026 101027 f977c7 59 API calls 101026->101027 101028 fb0191 101027->101028 101029 f97d2c 59 API calls 101028->101029 101030 f9f8f6 101029->101030 101031 fb03a2 6 API calls 101030->101031 101031->100994 101033 f977c7 59 API calls 101032->101033 101034 fa60f7 101033->101034 101035 f977c7 59 API calls 101034->101035 101036 fa60ff 101035->101036 101076 fa5bfd 101036->101076 101039 fa5bfd 59 API calls 101040 fa610f 101039->101040 101041 f977c7 59 API calls 101040->101041 101042 fa611a 101041->101042 101043 fb0ff6 Mailbox 59 API calls 101042->101043 101044 f9fa68 101043->101044 101045 fa6259 101044->101045 101046 fa6267 101045->101046 101047 f977c7 59 API calls 101046->101047 101048 fa6272 101047->101048 101049 f977c7 59 API calls 101048->101049 101050 fa627d 101049->101050 101051 f977c7 59 API calls 101050->101051 101052 fa6288 101051->101052 101053 f977c7 59 API calls 101052->101053 101054 fa6293 101053->101054 101055 fa5bfd 59 API calls 101054->101055 101056 fa629e 101055->101056 101057 fb0ff6 Mailbox 59 API calls 101056->101057 101058 fa62a5 RegisterWindowMessageW 101057->101058 101058->101008 101061 faffee 101060->101061 101062 fe5cc3 101060->101062 101063 fb0ff6 Mailbox 59 API calls 101061->101063 101079 ff9d71 60 API calls 101062->101079 101065 fafff6 101063->101065 101065->101012 101066 fe5cce 101067->101019 101068->101021 101080 ff748f 65 API calls 101068->101080 101070 f977c7 59 API calls 101069->101070 101071 fb0227 101070->101071 101072 f977c7 59 API calls 101071->101072 101073 fb022f 101072->101073 101074 f977c7 59 API calls 101073->101074 101075 fb017b 101074->101075 101075->101025 101077 f977c7 59 API calls 101076->101077 101078 fa5c05 101077->101078 101078->101039 101079->101066

                        Control-flow Graph

                        APIs
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F93B7A
                        • IsDebuggerPresent.KERNEL32 ref: 00F93B8C
                        • GetFullPathNameW.KERNEL32(00007FFF,?,?,010562F8,010562E0,?,?), ref: 00F93BFD
                          • Part of subcall function 00F97D2C: _memmove.LIBCMT ref: 00F97D66
                          • Part of subcall function 00FA0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00F93C26,010562F8,?,?,?), ref: 00FA0ACE
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F93C81
                        • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,010493F0,00000010), ref: 00FCD4BC
                        • SetCurrentDirectoryW.KERNEL32(?,010562F8,?,?,?), ref: 00FCD4F4
                        • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,01045D40,010562F8,?,?,?), ref: 00FCD57A
                        • ShellExecuteW.SHELL32(00000000,?,?), ref: 00FCD581
                          • Part of subcall function 00F93A58: GetSysColorBrush.USER32(0000000F), ref: 00F93A62
                          • Part of subcall function 00F93A58: LoadCursorW.USER32(00000000,00007F00), ref: 00F93A71
                          • Part of subcall function 00F93A58: LoadIconW.USER32(00000063), ref: 00F93A88
                          • Part of subcall function 00F93A58: LoadIconW.USER32(000000A4), ref: 00F93A9A
                          • Part of subcall function 00F93A58: LoadIconW.USER32(000000A2), ref: 00F93AAC
                          • Part of subcall function 00F93A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F93AD2
                          • Part of subcall function 00F93A58: RegisterClassExW.USER32(?), ref: 00F93B28
                          • Part of subcall function 00F939E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F93A15
                          • Part of subcall function 00F939E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F93A36
                          • Part of subcall function 00F939E7: ShowWindow.USER32(00000000,?,?), ref: 00F93A4A
                          • Part of subcall function 00F939E7: ShowWindow.USER32(00000000,?,?), ref: 00F93A53
                          • Part of subcall function 00F943DB: _memset.LIBCMT ref: 00F94401
                          • Part of subcall function 00F943DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F944A6
                        Strings
                        • runas, xrefs: 00FCD575
                        • This is a third-party compiled AutoIt script., xrefs: 00FCD4B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                        • String ID: This is a third-party compiled AutoIt script.$runas
                        • API String ID: 529118366-3287110873
                        • Opcode ID: 0c699337c8022153e314e51f8ab0f2df358c9133d488ceab16483b176d1e5229
                        • Instruction ID: aeb082e232b870da709e9371a8e5df1221da0f4d35d56e8f7c41c3cd5756649d
                        • Opcode Fuzzy Hash: 0c699337c8022153e314e51f8ab0f2df358c9133d488ceab16483b176d1e5229
                        • Instruction Fuzzy Hash: 7B513731D04749ABEF21EBB4DC06EFE7BB8AF04350F004169F891A6142DA3F5A45EB21
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 996 f94afe-f94b5e call f977c7 GetVersionExW call f97d2c 1001 f94c69-f94c6b 996->1001 1002 f94b64 996->1002 1003 fcdb90-fcdb9c 1001->1003 1004 f94b67-f94b6c 1002->1004 1005 fcdb9d-fcdba1 1003->1005 1006 f94c70-f94c71 1004->1006 1007 f94b72 1004->1007 1009 fcdba4-fcdbb0 1005->1009 1010 fcdba3 1005->1010 1008 f94b73-f94baa call f97e8c call f97886 1006->1008 1007->1008 1018 fcdc8d-fcdc90 1008->1018 1019 f94bb0-f94bb1 1008->1019 1009->1005 1012 fcdbb2-fcdbb7 1009->1012 1010->1009 1012->1004 1014 fcdbbd-fcdbc4 1012->1014 1014->1003 1016 fcdbc6 1014->1016 1020 fcdbcb-fcdbce 1016->1020 1021 fcdca9-fcdcad 1018->1021 1022 fcdc92 1018->1022 1019->1020 1023 f94bb7-f94bc2 1019->1023 1024 f94bf1-f94c08 GetCurrentProcess IsWow64Process 1020->1024 1025 fcdbd4-fcdbf2 1020->1025 1030 fcdcaf-fcdcb8 1021->1030 1031 fcdc98-fcdca1 1021->1031 1026 fcdc95 1022->1026 1027 f94bc8-f94bca 1023->1027 1028 fcdc13-fcdc19 1023->1028 1032 f94c0a 1024->1032 1033 f94c0d-f94c1e 1024->1033 1025->1024 1029 fcdbf8-fcdbfe 1025->1029 1026->1031 1034 fcdc2e-fcdc3a 1027->1034 1035 f94bd0-f94bd3 1027->1035 1038 fcdc1b-fcdc1e 1028->1038 1039 fcdc23-fcdc29 1028->1039 1036 fcdc08-fcdc0e 1029->1036 1037 fcdc00-fcdc03 1029->1037 1030->1026 1040 fcdcba-fcdcbd 1030->1040 1031->1021 1032->1033 1041 f94c89-f94c93 GetSystemInfo 1033->1041 1042 f94c20-f94c30 call f94c95 1033->1042 1046 fcdc3c-fcdc3f 1034->1046 1047 fcdc44-fcdc4a 1034->1047 1043 f94bd9-f94be8 1035->1043 1044 fcdc5a-fcdc5d 1035->1044 1036->1024 1037->1024 1038->1024 1039->1024 1040->1031 1045 f94c56-f94c66 1041->1045 1053 f94c7d-f94c87 GetSystemInfo 1042->1053 1054 f94c32-f94c3f call f94c95 1042->1054 1050 fcdc4f-fcdc55 1043->1050 1051 f94bee 1043->1051 1044->1024 1049 fcdc63-fcdc78 1044->1049 1046->1024 1047->1024 1055 fcdc7a-fcdc7d 1049->1055 1056 fcdc82-fcdc88 1049->1056 1050->1024 1051->1024 1058 f94c47-f94c4b 1053->1058 1061 f94c41-f94c45 GetNativeSystemInfo 1054->1061 1062 f94c76-f94c7b 1054->1062 1055->1024 1056->1024 1058->1045 1060 f94c4d-f94c50 FreeLibrary 1058->1060 1060->1045 1061->1058 1062->1061
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 00F94B2B
                          • Part of subcall function 00F97D2C: _memmove.LIBCMT ref: 00F97D66
                        • GetCurrentProcess.KERNEL32(?,0101FAEC,00000000,00000000,?), ref: 00F94BF8
                        • IsWow64Process.KERNEL32(00000000), ref: 00F94BFF
                        • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00F94C45
                        • FreeLibrary.KERNEL32(00000000), ref: 00F94C50
                        • GetSystemInfo.KERNEL32(00000000), ref: 00F94C81
                        • GetSystemInfo.KERNEL32(00000000), ref: 00F94C8D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                        • String ID:
                        • API String ID: 1986165174-0
                        • Opcode ID: ea4f4952ed12aa10e14536956b7559056196ed01eaaf06616d248f28210c408b
                        • Instruction ID: 42258be8ef15870a311f2d5b93a65d9ada67d72efcdb7e3bdb0c0f485e503468
                        • Opcode Fuzzy Hash: ea4f4952ed12aa10e14536956b7559056196ed01eaaf06616d248f28210c408b
                        • Instruction Fuzzy Hash: B691F73194A7C1DEDB31DB788551AAAFFE4AF76310B444DADD0CB83A41D224F908E719
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1063 f94fe9-f95001 CreateStreamOnHGlobal 1064 f95021-f95026 1063->1064 1065 f95003-f9501a FindResourceExW 1063->1065 1066 fcdd5c-fcdd6b LoadResource 1065->1066 1067 f95020 1065->1067 1066->1067 1068 fcdd71-fcdd7f SizeofResource 1066->1068 1067->1064 1068->1067 1069 fcdd85-fcdd90 LockResource 1068->1069 1069->1067 1070 fcdd96-fcddb4 1069->1070 1070->1067
                        APIs
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00F94EEE,?,?,00000000,00000000), ref: 00F94FF9
                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00F94EEE,?,?,00000000,00000000), ref: 00F95010
                        • LoadResource.KERNEL32(?,00000000,?,?,00F94EEE,?,?,00000000,00000000,?,?,?,?,?,?,00F94F8F), ref: 00FCDD60
                        • SizeofResource.KERNEL32(?,00000000,?,?,00F94EEE,?,?,00000000,00000000,?,?,?,?,?,?,00F94F8F), ref: 00FCDD75
                        • LockResource.KERNEL32(00F94EEE,?,?,00F94EEE,?,?,00000000,00000000,?,?,?,?,?,?,00F94F8F,00000000), ref: 00FCDD88
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                        • String ID: SCRIPT
                        • API String ID: 3051347437-3967369404
                        • Opcode ID: be78f94081306edd7e436d2553d8e43148d2377ad7af77ff6d9e3ad4edb525e6
                        • Instruction ID: f8d57cb275e866735a0fcc57dd2dab3e367903db6539b0a8f6e6bc878872a50b
                        • Opcode Fuzzy Hash: be78f94081306edd7e436d2553d8e43148d2377ad7af77ff6d9e3ad4edb525e6
                        • Instruction Fuzzy Hash: 7D119A71600B02AFEB318B25DC48F677BB9EBC9B11F20416CF44686260DB7AE8049760
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: BuffCharUpper
                        • String ID:
                        • API String ID: 3964851224-0
                        • Opcode ID: 6d026bf438d3411ea999e2ec042e937d1dd39b5d7c448a6dac726f0f8e7a028d
                        • Instruction ID: a493b44c51104e7427c4c4509de4269574bf1a5999390322861e24efa8171d6e
                        • Opcode Fuzzy Hash: 6d026bf438d3411ea999e2ec042e937d1dd39b5d7c448a6dac726f0f8e7a028d
                        • Instruction Fuzzy Hash: AE926DB5A083418FD720DF14D480B6AB7E1BF85314F18896DF88A8B361DB75EC45EB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetFileAttributesW.KERNELBASE(?,00FCE7C1), ref: 00FF46A6
                        • FindFirstFileW.KERNELBASE(?,?), ref: 00FF46B7
                        • FindClose.KERNEL32(00000000), ref: 00FF46C7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FileFind$AttributesCloseFirst
                        • String ID:
                        • API String ID: 48322524-0
                        • Opcode ID: 30e32ae44c8d0f351c01b31d1274d89e6eee5f8462341a1055cdbda46671e2c3
                        • Instruction ID: e07d2d0418ed33838930facaac89805bc48773ca7753874cf5a637b0e21dcacc
                        • Opcode Fuzzy Hash: 30e32ae44c8d0f351c01b31d1274d89e6eee5f8462341a1055cdbda46671e2c3
                        • Instruction Fuzzy Hash: 55E020328104065B4220A638EC4D4FBB75CDE06335F100715FA75C11E0FBBC6D5497D5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        • Variable must be of type 'Object'., xrefs: 00FD428C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID: Variable must be of type 'Object'.
                        • API String ID: 0-109567571
                        • Opcode ID: 19880f4242b37d7194b0244a6dd04ef5449b02f54cd644f2df6d353d28ea4d5f
                        • Instruction ID: 7c39156fc54fd67ee352ef865f91b3e240653761cc9833cdcc2ffe4a946a5b2b
                        • Opcode Fuzzy Hash: 19880f4242b37d7194b0244a6dd04ef5449b02f54cd644f2df6d353d28ea4d5f
                        • Instruction Fuzzy Hash: 2BA27C75E00205CBEF24CF58C480AAAB7B2FF48314F68805AE956AB351D735AD46EB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FA0BBB
                        • timeGetTime.WINMM ref: 00FA0E76
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FA0FB3
                        • TranslateMessage.USER32(?), ref: 00FA0FC7
                        • DispatchMessageW.USER32(?), ref: 00FA0FD5
                        • Sleep.KERNEL32(0000000A), ref: 00FA0FDF
                        • LockWindowUpdate.USER32(00000000,?,?), ref: 00FA105A
                        • DestroyWindow.USER32 ref: 00FA1066
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FA1080
                        • Sleep.KERNEL32(0000000A,?,?), ref: 00FD52AD
                        • TranslateMessage.USER32(?), ref: 00FD608A
                        • DispatchMessageW.USER32(?), ref: 00FD6098
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FD60AC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                        • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                        • API String ID: 4003667617-3242690629
                        • Opcode ID: ff324fbe5c99b5fa565bb2fb434b17aefdd0fdc2f7f5ce431ca10585ab763f7f
                        • Instruction ID: 24063fb25c4c17ae666e15f6da80aae374bf10e7c47ab9033294ca461bce7523
                        • Opcode Fuzzy Hash: ff324fbe5c99b5fa565bb2fb434b17aefdd0fdc2f7f5ce431ca10585ab763f7f
                        • Instruction Fuzzy Hash: 59B2C370A08741DFDB24DF24C884BAAB7E5BF85714F18491EF48987391DB79E844EB82
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00FF91E9: __time64.LIBCMT ref: 00FF91F3
                          • Part of subcall function 00F95045: _fseek.LIBCMT ref: 00F9505D
                        • __wsplitpath.LIBCMT ref: 00FF94BE
                          • Part of subcall function 00FB432E: __wsplitpath_helper.LIBCMT ref: 00FB436E
                        • _wcscpy.LIBCMT ref: 00FF94D1
                        • _wcscat.LIBCMT ref: 00FF94E4
                        • __wsplitpath.LIBCMT ref: 00FF9509
                        • _wcscat.LIBCMT ref: 00FF951F
                        • _wcscat.LIBCMT ref: 00FF9532
                          • Part of subcall function 00FF922F: _memmove.LIBCMT ref: 00FF9268
                          • Part of subcall function 00FF922F: _memmove.LIBCMT ref: 00FF9277
                        • _wcscmp.LIBCMT ref: 00FF9479
                          • Part of subcall function 00FF99BE: _wcscmp.LIBCMT ref: 00FF9AAE
                          • Part of subcall function 00FF99BE: _wcscmp.LIBCMT ref: 00FF9AC1
                        • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FF96DC
                        • _wcsncpy.LIBCMT ref: 00FF974F
                        • DeleteFileW.KERNEL32(?,?), ref: 00FF9785
                        • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FF979B
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FF97AC
                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FF97BE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                        • String ID:
                        • API String ID: 1500180987-0
                        • Opcode ID: 9e7a955fd5ad6f3e1e7409ea8cf485c07cf5cfe7de2d5e3f228a7d80133be217
                        • Instruction ID: 107fc7790b3278e094d52994477d62964dc068a3a940bc74515d77e24a3e71ad
                        • Opcode Fuzzy Hash: 9e7a955fd5ad6f3e1e7409ea8cf485c07cf5cfe7de2d5e3f228a7d80133be217
                        • Instruction Fuzzy Hash: C1C15BB1D0021DAADF21DF95CC85EEEB7BDEF44310F0040AAF609E6161EB749A449F65
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00F93074
                        • RegisterClassExW.USER32(00000030), ref: 00F9309E
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F930AF
                        • InitCommonControlsEx.COMCTL32(?), ref: 00F930CC
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F930DC
                        • LoadIconW.USER32(000000A9), ref: 00F930F2
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F93101
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: 374f87347123bf0618b29fe5f9151f22864f98a3ae6e3acc4c4dd5ea95197aa0
                        • Instruction ID: 9624b570e633f8dfc1f7fa2868dfbacb0ca48288f47dbe9fa23db968fe1a95df
                        • Opcode Fuzzy Hash: 374f87347123bf0618b29fe5f9151f22864f98a3ae6e3acc4c4dd5ea95197aa0
                        • Instruction Fuzzy Hash: 78316BB184530AEFDB61DFA4D889ADABBF0FB09310F10465AE5C0E6284D3BE0549CF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00F93074
                        • RegisterClassExW.USER32(00000030), ref: 00F9309E
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F930AF
                        • InitCommonControlsEx.COMCTL32(?), ref: 00F930CC
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F930DC
                        • LoadIconW.USER32(000000A9), ref: 00F930F2
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F93101
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: acfddc9521c400b2d5b6550fcdeb1f081d6c4cd6ff83c4d3069aec207c752952
                        • Instruction ID: 740b3af39e6dc80c767a4026bdd818f3172301dc19283b68d8caa9ddaf1bebd3
                        • Opcode Fuzzy Hash: acfddc9521c400b2d5b6550fcdeb1f081d6c4cd6ff83c4d3069aec207c752952
                        • Instruction Fuzzy Hash: A921C7B1D01319AFDB20DFA4E849B9EBBF4FB08710F40421AF591E6284D7BB45488F91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00F94864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,010562F8,?,00F937C0,?), ref: 00F94882
                          • Part of subcall function 00FB074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00F972C5), ref: 00FB0771
                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00F97308
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00FCECF1
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00FCED32
                        • RegCloseKey.ADVAPI32(?), ref: 00FCED70
                        • _wcscat.LIBCMT ref: 00FCEDC9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                        • API String ID: 2673923337-2727554177
                        • Opcode ID: f3e1efa10e06bf1fd4addc3f0a8459d0efe1bca0fb8222c6fa98711c1b67315c
                        • Instruction ID: 71608b777fca1ddaf6ca68d3035884a9b7fad106f52417d38acd7850e8e4538c
                        • Opcode Fuzzy Hash: f3e1efa10e06bf1fd4addc3f0a8459d0efe1bca0fb8222c6fa98711c1b67315c
                        • Instruction Fuzzy Hash: 7D71A2715083019ED724EF25EC819AFB7F8FF94790F80052EF48587164DB399948EB62
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00F93A62
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00F93A71
                        • LoadIconW.USER32(00000063), ref: 00F93A88
                        • LoadIconW.USER32(000000A4), ref: 00F93A9A
                        • LoadIconW.USER32(000000A2), ref: 00F93AAC
                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F93AD2
                        • RegisterClassExW.USER32(?), ref: 00F93B28
                          • Part of subcall function 00F93041: GetSysColorBrush.USER32(0000000F), ref: 00F93074
                          • Part of subcall function 00F93041: RegisterClassExW.USER32(00000030), ref: 00F9309E
                          • Part of subcall function 00F93041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F930AF
                          • Part of subcall function 00F93041: InitCommonControlsEx.COMCTL32(?), ref: 00F930CC
                          • Part of subcall function 00F93041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F930DC
                          • Part of subcall function 00F93041: LoadIconW.USER32(000000A9), ref: 00F930F2
                          • Part of subcall function 00F93041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F93101
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                        • String ID: #$0$AutoIt v3
                        • API String ID: 423443420-4155596026
                        • Opcode ID: c5ee5496a0d2c9a9dddff74dffee134c50bed98a43b885d68f0d00fc2fd82da7
                        • Instruction ID: 8e2b09ae6964010061b3e8910faad1a30ca84ce2f91ff275e47ce034aa9dc7ca
                        • Opcode Fuzzy Hash: c5ee5496a0d2c9a9dddff74dffee134c50bed98a43b885d68f0d00fc2fd82da7
                        • Instruction Fuzzy Hash: 1F214871D00309BFEB209FA4E809B9E7BB4FB08750F40012AF584A6294D3BF5A589F84
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 767 f93633-f93681 769 f936e1-f936e3 767->769 770 f93683-f93686 767->770 769->770 773 f936e5 769->773 771 f93688-f9368f 770->771 772 f936e7 770->772 777 f9375d-f93765 PostQuitMessage 771->777 778 f93695-f9369a 771->778 775 fcd31c-fcd34a call fa11d0 call fa11f3 772->775 776 f936ed-f936f0 772->776 774 f936ca-f936d2 DefWindowProcW 773->774 784 f936d8-f936de 774->784 814 fcd34f-fcd356 775->814 779 f936f2-f936f3 776->779 780 f93715-f9373c SetTimer RegisterWindowMessageW 776->780 785 f93711-f93713 777->785 781 fcd38f-fcd3a3 call ff2a16 778->781 782 f936a0-f936a2 778->782 786 f936f9-f9370c KillTimer call f944cb call f93114 779->786 787 fcd2bf-fcd2c2 779->787 780->785 788 f9373e-f93749 CreatePopupMenu 780->788 781->785 808 fcd3a9 781->808 789 f936a8-f936ad 782->789 790 f93767-f93776 call f94531 782->790 785->784 786->785 793 fcd2f8-fcd317 MoveWindow 787->793 794 fcd2c4-fcd2c6 787->794 788->785 796 fcd374-fcd37b 789->796 797 f936b3-f936b8 789->797 790->785 793->785 802 fcd2c8-fcd2cb 794->802 803 fcd2e7-fcd2f3 SetFocus 794->803 796->774 805 fcd381-fcd38a call fe817e 796->805 806 f9374b-f9375b call f945df 797->806 807 f936be-f936c4 797->807 802->807 810 fcd2d1-fcd2e2 call fa11d0 802->810 803->785 805->774 806->785 807->774 807->814 808->774 810->785 814->774 815 fcd35c-fcd36f call f944cb call f943db 814->815 815->774
                        APIs
                        • DefWindowProcW.USER32(?,?,?,?), ref: 00F936D2
                        • KillTimer.USER32(?,00000001), ref: 00F936FC
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F9371F
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F9372A
                        • CreatePopupMenu.USER32 ref: 00F9373E
                        • PostQuitMessage.USER32(00000000), ref: 00F9375F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                        • String ID: TaskbarCreated
                        • API String ID: 129472671-2362178303
                        • Opcode ID: 5ad683a5023211bec546a903a0ebbea43e04705dfaa8d6f6be51fdd5f13fb4d1
                        • Instruction ID: 9d903f48bd9b2218a9a1667f9b49e1b1ca58169515ea03b8f50fae3c9d2bdd69
                        • Opcode Fuzzy Hash: 5ad683a5023211bec546a903a0ebbea43e04705dfaa8d6f6be51fdd5f13fb4d1
                        • Instruction Fuzzy Hash: 894125B2608606BBFF345BA8DC09F7A3755FB01310F040119FA82C6295CA6FAE04B763
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                        • API String ID: 1825951767-3513169116
                        • Opcode ID: 351fde34739c14597391ddafc1e628cef36c227a3860f51cecb7d6ad4bbc6c78
                        • Instruction ID: 33701d39d44c92bc57fc1f3d47d24994a494ab8555dcb9fc1f7d014772f07543
                        • Opcode Fuzzy Hash: 351fde34739c14597391ddafc1e628cef36c227a3860f51cecb7d6ad4bbc6c78
                        • Instruction Fuzzy Hash: B5A16E72C142199AEF15FFA4CC92EEEB778BF14340F440029F452A7191DF796A09EB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 942 19b2770-19b281e call 19b0000 945 19b2825-19b284b call 19b3680 CreateFileW 942->945 948 19b284d 945->948 949 19b2852-19b2862 945->949 950 19b299d-19b29a1 948->950 957 19b2869-19b2883 VirtualAlloc 949->957 958 19b2864 949->958 951 19b29e3-19b29e6 950->951 952 19b29a3-19b29a7 950->952 954 19b29e9-19b29f0 951->954 955 19b29a9-19b29ac 952->955 956 19b29b3-19b29b7 952->956 961 19b29f2-19b29fd 954->961 962 19b2a45-19b2a5a 954->962 955->956 963 19b29b9-19b29c3 956->963 964 19b29c7-19b29cb 956->964 959 19b288a-19b28a1 ReadFile 957->959 960 19b2885 957->960 958->950 965 19b28a8-19b28e8 VirtualAlloc 959->965 966 19b28a3 959->966 960->950 967 19b29ff 961->967 968 19b2a01-19b2a0d 961->968 969 19b2a6a-19b2a72 962->969 970 19b2a5c-19b2a67 VirtualFree 962->970 963->964 971 19b29db 964->971 972 19b29cd-19b29d7 964->972 973 19b28ea 965->973 974 19b28ef-19b290a call 19b38d0 965->974 966->950 967->962 975 19b2a0f-19b2a1f 968->975 976 19b2a21-19b2a2d 968->976 970->969 971->951 972->971 973->950 982 19b2915-19b291f 974->982 978 19b2a43 975->978 979 19b2a3a-19b2a40 976->979 980 19b2a2f-19b2a38 976->980 978->954 979->978 980->978 983 19b2952-19b2966 call 19b36e0 982->983 984 19b2921-19b2950 call 19b38d0 982->984 989 19b296a-19b296e 983->989 990 19b2968 983->990 984->982 992 19b297a-19b297e 989->992 993 19b2970-19b2974 FindCloseChangeNotification 989->993 990->950 994 19b298e-19b2997 992->994 995 19b2980-19b298b VirtualFree 992->995 993->992 994->945 994->950 995->994
                        APIs
                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 019B2841
                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 019B2A67
                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CreateFileFreeVirtual
                        • String ID:
                        • API String ID: 204039940-0
                        • Opcode ID: 56d4a07515a69c217c6e9093a4c978e985ec34eac0ef6790ae7a8c87854d9146
                        • Instruction ID: 361dd1d5868264216593228e5788a3ccc672ecbd38fdb1c7e7c9c6ada2de8c8e
                        • Opcode Fuzzy Hash: 56d4a07515a69c217c6e9093a4c978e985ec34eac0ef6790ae7a8c87854d9146
                        • Instruction Fuzzy Hash: 5BA13B70E00209EBDB14CFA4CA98BEEBBB5FF48705F208559E109BB281C775AA41CF55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1073 f939e7-f93a57 CreateWindowExW * 2 ShowWindow * 2
                        APIs
                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F93A15
                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F93A36
                        • ShowWindow.USER32(00000000,?,?), ref: 00F93A4A
                        • ShowWindow.USER32(00000000,?,?), ref: 00F93A53
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$CreateShow
                        • String ID: AutoIt v3$edit
                        • API String ID: 1584632944-3779509399
                        • Opcode ID: de7042a2534a8cfd79fd0ecfea5c0bf27a883363b44c9e56cce257beafb0384e
                        • Instruction ID: 6c47b83be5f0562e952a6276f7a93702ef45573cba0b55f9ab4085d69ea5a828
                        • Opcode Fuzzy Hash: de7042a2534a8cfd79fd0ecfea5c0bf27a883363b44c9e56cce257beafb0384e
                        • Instruction Fuzzy Hash: 93F03A716407907EEB311663AC08E272E7DE7C6F90B40001EB944E2158C2AF1800CBB0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1074 19b24e0-19b25e5 call 19b0000 call 19b2390 1079 19b25fa 1074->1079 1080 19b25e7-19b25ef 1074->1080 1082 19b2602-19b2669 call 19b2300 CreateFileW 1079->1082 1080->1079 1083 19b25f1-19b25f8 call 19b2360 1080->1083 1090 19b266b 1082->1090 1091 19b2670-19b2680 1082->1091 1083->1079 1083->1082 1092 19b2720-19b2725 1090->1092 1094 19b2682 1091->1094 1095 19b2687-19b26a1 VirtualAlloc 1091->1095 1094->1092 1096 19b26a3 1095->1096 1097 19b26a5-19b26bc ReadFile 1095->1097 1096->1092 1098 19b26be 1097->1098 1099 19b26c0-19b26fa call 19b2410 call 19b1300 1097->1099 1098->1092 1104 19b26fc-19b2711 call 19b2460 1099->1104 1105 19b2716-19b271e ExitProcess 1099->1105 1104->1105 1105->1092
                        APIs
                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 019B265F
                        • VirtualAlloc.KERNELBASE(00000000,000000FF,00003000,00000004), ref: 019B2694
                        • ReadFile.KERNELBASE(000000FF,00000000,000000FF,?,00000000), ref: 019B26B7
                        • ExitProcess.KERNEL32(00000000), ref: 019B2718
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: File$AllocCreateExitProcessReadVirtual
                        • String ID: VTDM5DVQ33BABY
                        • API String ID: 1333605300-107314074
                        • Opcode ID: 81e2674dc8d4a359a6632efcdf41dd23f0c743a9f7998e0a89ec9c1782ec5f3e
                        • Instruction ID: a5b8e9cd30fe0421baea7c6b74e33a7c75466f00550a0d620bb9a8ec800a08aa
                        • Opcode Fuzzy Hash: 81e2674dc8d4a359a6632efcdf41dd23f0c743a9f7998e0a89ec9c1782ec5f3e
                        • Instruction Fuzzy Hash: F261A030E14248DBEF11DBB4C994BEEBB79EF58700F004599E609BB2C0D7B96A44CB65
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1107 f9410d-f94123 1108 f94129-f9413e call f97b76 1107->1108 1109 f94200-f94204 1107->1109 1112 fcd5dd-fcd5ec LoadStringW 1108->1112 1113 f94144-f94164 call f97d2c 1108->1113 1116 fcd5f7-fcd60f call f97c8e call f97143 1112->1116 1113->1116 1118 f9416a-f9416e 1113->1118 1125 f9417e-f941fb call fb3020 call f9463e call fb2ffc Shell_NotifyIconW call f95a64 1116->1125 1129 fcd615-fcd633 call f97e0b call f97143 call f97e0b 1116->1129 1120 f94205-f9420e call f981a7 1118->1120 1121 f94174-f94179 call f97c8e 1118->1121 1120->1125 1121->1125 1125->1109 1129->1125
                        APIs
                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00FCD5EC
                          • Part of subcall function 00F97D2C: _memmove.LIBCMT ref: 00F97D66
                        • _memset.LIBCMT ref: 00F9418D
                        • _wcscpy.LIBCMT ref: 00F941E1
                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F941F1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                        • String ID: Line:
                        • API String ID: 3942752672-1585850449
                        • Opcode ID: 1453c6b71354abcc64cdfdf42b82ffd1053eec7546b0df9c9fa1e67a81835455
                        • Instruction ID: 82ab693da7509545e61e2e7492ff8168ba9dfad5a76bd06b426985147216078e
                        • Opcode Fuzzy Hash: 1453c6b71354abcc64cdfdf42b82ffd1053eec7546b0df9c9fa1e67a81835455
                        • Instruction Fuzzy Hash: 9231EF71408304AAEB31FB60DC46FDB77E8AF54310F10491EF1C592091EF79A689EB96
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1142 fb564d-fb5666 1143 fb5668-fb566d 1142->1143 1144 fb5683 1142->1144 1143->1144 1145 fb566f-fb5671 1143->1145 1146 fb5685-fb568b 1144->1146 1147 fb568c-fb5691 1145->1147 1148 fb5673-fb5678 call fb8d68 1145->1148 1150 fb569f-fb56a3 1147->1150 1151 fb5693-fb569d 1147->1151 1159 fb567e call fb8ff6 1148->1159 1154 fb56b3-fb56b5 1150->1154 1155 fb56a5-fb56b0 call fb3020 1150->1155 1151->1150 1153 fb56c3-fb56d2 1151->1153 1157 fb56d9 1153->1157 1158 fb56d4-fb56d7 1153->1158 1154->1148 1156 fb56b7-fb56c1 1154->1156 1155->1154 1156->1148 1156->1153 1162 fb56de-fb56e3 1157->1162 1158->1162 1159->1144 1164 fb56e9-fb56f0 1162->1164 1165 fb57cc-fb57cf 1162->1165 1166 fb56f2-fb56fa 1164->1166 1167 fb5731-fb5733 1164->1167 1165->1146 1166->1167 1170 fb56fc 1166->1170 1168 fb579d-fb579e call fc0df7 1167->1168 1169 fb5735-fb5737 1167->1169 1177 fb57a3-fb57a7 1168->1177 1172 fb575b-fb5766 1169->1172 1173 fb5739-fb5741 1169->1173 1174 fb57fa 1170->1174 1175 fb5702-fb5704 1170->1175 1180 fb576a-fb576d 1172->1180 1181 fb5768 1172->1181 1178 fb5743-fb574f 1173->1178 1179 fb5751-fb5755 1173->1179 1176 fb57fe-fb5807 1174->1176 1182 fb570b-fb5710 1175->1182 1183 fb5706-fb5708 1175->1183 1176->1146 1177->1176 1184 fb57a9-fb57ae 1177->1184 1185 fb5757-fb5759 1178->1185 1179->1185 1186 fb576f-fb577b call fb4916 call fc10ab 1180->1186 1187 fb57d4-fb57d8 1180->1187 1181->1180 1182->1187 1188 fb5716-fb572f call fc0f18 1182->1188 1183->1182 1184->1187 1189 fb57b0-fb57c1 1184->1189 1185->1180 1203 fb5780-fb5785 1186->1203 1190 fb57ea-fb57f5 call fb8d68 1187->1190 1191 fb57da-fb57e7 call fb3020 1187->1191 1199 fb5792-fb579b 1188->1199 1194 fb57c4-fb57c6 1189->1194 1190->1159 1191->1190 1194->1164 1194->1165 1199->1194 1204 fb578b-fb578e 1203->1204 1205 fb580c-fb5810 1203->1205 1204->1174 1206 fb5790 1204->1206 1205->1176 1206->1199
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                        • String ID:
                        • API String ID: 1559183368-0
                        • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                        • Instruction ID: 7b18aa6b19bb5e1102499a7ba43ea174d86b94104dab1097dd37e5e835b70316
                        • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                        • Instruction Fuzzy Hash: 11519671F00B09DBDB249E6AC8847EE77A6AF44B30F348729E825961D0DB789D51AF40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F94F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,010562F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F94F6F
                        • _free.LIBCMT ref: 00FCE68C
                        • _free.LIBCMT ref: 00FCE6D3
                          • Part of subcall function 00F96BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F96D0D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _free$CurrentDirectoryLibraryLoad
                        • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                        • API String ID: 2861923089-1757145024
                        • Opcode ID: 2800544fde017d4739e406dea5808d0fe84cde94fa7fa1b6326e8dbf2f6fe11c
                        • Instruction ID: daff3086e61e8acf20a8fd85e3207e21e26e878c8c645dd64a8dd3b54bc84545
                        • Opcode Fuzzy Hash: 2800544fde017d4739e406dea5808d0fe84cde94fa7fa1b6326e8dbf2f6fe11c
                        • Instruction Fuzzy Hash: 59916E7192021A9FDF04EFA4CD92EEDB7B4FF14314F144469F815AB2A1DB38A905EB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00F935A1,SwapMouseButtons,00000004,?), ref: 00F935D4
                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00F935A1,SwapMouseButtons,00000004,?,?,?,?,00F92754), ref: 00F935F5
                        • RegCloseKey.KERNELBASE(00000000,?,?,00F935A1,SwapMouseButtons,00000004,?,?,?,?,00F92754), ref: 00F93617
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: Control Panel\Mouse
                        • API String ID: 3677997916-824357125
                        • Opcode ID: 948a8f1f7ed899bc5172cd81e95f5a3c35f8f8a9f57f8b7a57ff7ab292d7e5e4
                        • Instruction ID: a616b7d14dea52aa66eb175a01fd702a99dae6a909f8b43c19398f6d2f2ad6d5
                        • Opcode Fuzzy Hash: 948a8f1f7ed899bc5172cd81e95f5a3c35f8f8a9f57f8b7a57ff7ab292d7e5e4
                        • Instruction Fuzzy Hash: 57115A71910208BFEF21CFA8D844EAFBBB8EF04750F004459F805D7200D2719F44A760
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000), ref: 019B1B2D
                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 019B1B51
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 019B1B73
                        • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 019B1E7C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                        • String ID:
                        • API String ID: 572931308-0
                        • Opcode ID: ccd039124fc6c1cbba10b731756dcae81c5b697fabd5e9f0d3ea8e9e0934fa5f
                        • Instruction ID: 3a91b9c64d22b791929de37f83c991e2453e634ff294cb147b90be96cfcdd307
                        • Opcode Fuzzy Hash: ccd039124fc6c1cbba10b731756dcae81c5b697fabd5e9f0d3ea8e9e0934fa5f
                        • Instruction Fuzzy Hash: 5A622B30A14258DBEB24CFA4D990BDEB376EF58300F1091A9D20DEB394E7759E81CB59
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F95045: _fseek.LIBCMT ref: 00F9505D
                          • Part of subcall function 00FF99BE: _wcscmp.LIBCMT ref: 00FF9AAE
                          • Part of subcall function 00FF99BE: _wcscmp.LIBCMT ref: 00FF9AC1
                        • _free.LIBCMT ref: 00FF992C
                        • _free.LIBCMT ref: 00FF9933
                        • _free.LIBCMT ref: 00FF999E
                          • Part of subcall function 00FB2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00FB9C64), ref: 00FB2FA9
                          • Part of subcall function 00FB2F95: GetLastError.KERNEL32(00000000,?,00FB9C64), ref: 00FB2FBB
                        • _free.LIBCMT ref: 00FF99A6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                        • String ID:
                        • API String ID: 1552873950-0
                        • Opcode ID: fd18de759458e21508ccb8b902dfc4ac475c3880c7526805842eb646ad61b447
                        • Instruction ID: bbe973e8634009bb5126316796ebf14e8913d04044732a339d4ca2ba2b670eda
                        • Opcode Fuzzy Hash: fd18de759458e21508ccb8b902dfc4ac475c3880c7526805842eb646ad61b447
                        • Instruction Fuzzy Hash: 55516EB1D04618AFDF249F65CC85BAEBBB9EF48310F0004AEB209A7251DB755E80DF58
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                        • String ID:
                        • API String ID: 2782032738-0
                        • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                        • Instruction ID: 8f5666d3976ddc6023546a1469f63158e13e4bee23cde4562e831f7878319838
                        • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                        • Instruction Fuzzy Hash: F341D671A407059BDF18CEABCA809EF7BA9EF80360B24813DE855C7642D774BD40AF44
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00FCEE62
                        • GetOpenFileNameW.COMDLG32(?), ref: 00FCEEAC
                          • Part of subcall function 00F948AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F948A1,?,?,00F937C0,?), ref: 00F948CE
                          • Part of subcall function 00FB09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FB09F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Name$Path$FileFullLongOpen_memset
                        • String ID: X
                        • API String ID: 3777226403-3081909835
                        • Opcode ID: 3451eaa05043bb5ca1e95265c39eec7944a7fa88eb816b977333ac234af05831
                        • Instruction ID: 867871f903368c42a1343a4280bc27e8ac521aa895da12a882123426e6a1dd91
                        • Opcode Fuzzy Hash: 3451eaa05043bb5ca1e95265c39eec7944a7fa88eb816b977333ac234af05831
                        • Instruction Fuzzy Hash: BB21D571A103589BDF15EF94CC45BEE7BF8AF49314F00405AF408A7241DBB859899FA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __fread_nolock_memmove
                        • String ID: EA06
                        • API String ID: 1988441806-3962188686
                        • Opcode ID: f3fe2b14f65f4fe372eff6679c84534cef8feafa335a2ea7136d18a74f76ecbf
                        • Instruction ID: 50f4ae8f3c890aa5511825487885e98640cca9d342dba4b0d50070701f35d263
                        • Opcode Fuzzy Hash: f3fe2b14f65f4fe372eff6679c84534cef8feafa335a2ea7136d18a74f76ecbf
                        • Instruction Fuzzy Hash: C001F972904218AEDB28C6A9CC56FFE7BF89F05701F00419EF552D6181E9B9E604DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetTempPathW.KERNEL32(00000104,?), ref: 00FF9B82
                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00FF9B99
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Temp$FileNamePath
                        • String ID: aut
                        • API String ID: 3285503233-3010740371
                        • Opcode ID: a13bf8397775e60dcef0da82482992ecf9306778124b4be687c78351d5262d02
                        • Instruction ID: 78e19d832bd971b9b4f8ff2f85a495cce1388e020403931c7aea47186c96abab
                        • Opcode Fuzzy Hash: a13bf8397775e60dcef0da82482992ecf9306778124b4be687c78351d5262d02
                        • Instruction Fuzzy Hash: F5D05E7958030EABDB20DA90DC4EFDA776CE744700F0042A1FE9496091DEB955988B91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9e2dfb71fc9b3031f1fa7cdee8b536c09c249ee82269b46ea0869d4b7b1d1cbd
                        • Instruction ID: d61007308235114033ff76e207fb32cd076a67465c71ddf731d5c62d8b5aea44
                        • Opcode Fuzzy Hash: 9e2dfb71fc9b3031f1fa7cdee8b536c09c249ee82269b46ea0869d4b7b1d1cbd
                        • Instruction Fuzzy Hash: 21F169709083019FDB11DF68C880A6EBBE5FF88314F04896EF8999B291D775E945CF92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FB03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FB03D3
                          • Part of subcall function 00FB03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00FB03DB
                          • Part of subcall function 00FB03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FB03E6
                          • Part of subcall function 00FB03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FB03F1
                          • Part of subcall function 00FB03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00FB03F9
                          • Part of subcall function 00FB03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00FB0401
                          • Part of subcall function 00FA6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00F9FA90), ref: 00FA62B4
                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F9FB2D
                        • OleInitialize.OLE32(00000000), ref: 00F9FBAA
                        • CloseHandle.KERNEL32(00000000), ref: 00FD49F2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                        • String ID:
                        • API String ID: 1986988660-0
                        • Opcode ID: 919d39a1670882a22e1b65c4f12fae1e80674a3932e77f6cf75300e59551821f
                        • Instruction ID: afbfa68b29e5d78ea95c8bda82f3dabb4373c0b782e8ad9bf919c4f167820f05
                        • Opcode Fuzzy Hash: 919d39a1670882a22e1b65c4f12fae1e80674a3932e77f6cf75300e59551821f
                        • Instruction Fuzzy Hash: 2881B7B09013408FCBA4EF69E9546277EE6FB99314790826AD499C735AEF3F4408DF11
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00F94401
                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F944A6
                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F944C3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: IconNotifyShell_$_memset
                        • String ID:
                        • API String ID: 1505330794-0
                        • Opcode ID: 27f985b95b04f3bb28a202a5139bef466ad6936dd95575f76539910a6d23fbcd
                        • Instruction ID: 880e6631a0cba0d10561183359aaeeadc725675b55ee8bbd80a19a263c0a372e
                        • Opcode Fuzzy Hash: 27f985b95b04f3bb28a202a5139bef466ad6936dd95575f76539910a6d23fbcd
                        • Instruction Fuzzy Hash: 1B3161719047019FEB31DF24D884B9BBBE8FB58354F00092EE9DA83241D77AA949DB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __FF_MSGBANNER.LIBCMT ref: 00FB5963
                          • Part of subcall function 00FBA3AB: __NMSG_WRITE.LIBCMT ref: 00FBA3D2
                          • Part of subcall function 00FBA3AB: __NMSG_WRITE.LIBCMT ref: 00FBA3DC
                        • __NMSG_WRITE.LIBCMT ref: 00FB596A
                          • Part of subcall function 00FBA408: GetModuleFileNameW.KERNEL32(00000000,010543BA,00000104,?,00000001,00000000), ref: 00FBA49A
                          • Part of subcall function 00FBA408: ___crtMessageBoxW.LIBCMT ref: 00FBA548
                          • Part of subcall function 00FB32DF: ___crtCorExitProcess.LIBCMT ref: 00FB32E5
                          • Part of subcall function 00FB32DF: ExitProcess.KERNEL32 ref: 00FB32EE
                          • Part of subcall function 00FB8D68: __getptd_noexit.LIBCMT ref: 00FB8D68
                        • RtlAllocateHeap.NTDLL(019F0000,00000000,00000001,00000000,?,?,?,00FB1013,?), ref: 00FB598F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                        • String ID:
                        • API String ID: 1372826849-0
                        • Opcode ID: a5e3102c75dd75601366a23798351c89d152b41023f935e4e1b684cd5286ac71
                        • Instruction ID: 94fa278707f6fc36811b0ecc91bcf5b9a5995d5cecdca9ad36af57b4248f7f47
                        • Opcode Fuzzy Hash: a5e3102c75dd75601366a23798351c89d152b41023f935e4e1b684cd5286ac71
                        • Instruction Fuzzy Hash: 2701D236740B16DEE7212B27EC42BEE72988F82BB0F10002AF504DA1C1DA7D9D41BF60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00FF97D2,?,?,?,?,?,00000004), ref: 00FF9B45
                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00FF97D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00FF9B5B
                        • CloseHandle.KERNEL32(00000000,?,00FF97D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FF9B62
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: File$CloseCreateHandleTime
                        • String ID:
                        • API String ID: 3397143404-0
                        • Opcode ID: 50ef976ee2de616d5d275d31c65966be25bb40a3f01be302bade492d73ebc48e
                        • Instruction ID: 59485ae4057c0c4775b26c8f93f1356ff9f78d8ff4ba320e96fa32a5beef2e7e
                        • Opcode Fuzzy Hash: 50ef976ee2de616d5d275d31c65966be25bb40a3f01be302bade492d73ebc48e
                        • Instruction Fuzzy Hash: 8DE08632580615B7D7311A94EC09FDA7B18AB06771F108210FB64690E0C7BA26159798
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _free.LIBCMT ref: 00FF8FA5
                          • Part of subcall function 00FB2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00FB9C64), ref: 00FB2FA9
                          • Part of subcall function 00FB2F95: GetLastError.KERNEL32(00000000,?,00FB9C64), ref: 00FB2FBB
                        • _free.LIBCMT ref: 00FF8FB6
                        • _free.LIBCMT ref: 00FF8FC8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 7ae2d2e3dd28ae231ba4dfbfc9ff98cbdd3434907fe9d12881c55d2a38818b0b
                        • Instruction ID: 2b349a70ec0e9ab5a0d0aa3608da3cdd618f741d9c9926f04ead0d9b1f1db463
                        • Opcode Fuzzy Hash: 7ae2d2e3dd28ae231ba4dfbfc9ff98cbdd3434907fe9d12881c55d2a38818b0b
                        • Instruction Fuzzy Hash: 08E0C2A1B087014ECA20A539ED04AF327EE0F483A0708080DB509DB182CE28E842A424
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID: CALL
                        • API String ID: 0-4196123274
                        • Opcode ID: ae499ca0a3108ae038207e43e06dd10a30f2f5b393e36f48743d4a42dbd31fcd
                        • Instruction ID: 00e2a718adb842092949578f661a6666fad49fb02db9448718cf9f9c226c7987
                        • Opcode Fuzzy Hash: ae499ca0a3108ae038207e43e06dd10a30f2f5b393e36f48743d4a42dbd31fcd
                        • Instruction Fuzzy Hash: 4A224A71908341CFDB24DF14C994B6ABBE1BF85310F15895DE8868B361DB35EC85EB82
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID: EA06
                        • API String ID: 4104443479-3962188686
                        • Opcode ID: c1f95829b6e78243aa01c0d8332adea7ba64b16b970ebeddc41641bd876934f9
                        • Instruction ID: f02cc171741fc4ddb8d57150a735a8df338006ac4cc02362e98bd6ed69b2f9d8
                        • Opcode Fuzzy Hash: c1f95829b6e78243aa01c0d8332adea7ba64b16b970ebeddc41641bd876934f9
                        • Instruction Fuzzy Hash: E5417D32E041545BFF16AF648C51FBF7FA6AF61310F184075F8829B282D525AD42B7A1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 019B24BA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID: D
                        • API String ID: 963392458-2746444292
                        • Opcode ID: cc5cc974fc25a74a4e4796500e7ee75bd57132378abb324dc9bdb49e0f57563c
                        • Instruction ID: 6b4f475d171eb5d5bc4a2b69654a503edbf6e79fc5b879c8b4b5089aca4ae4e1
                        • Opcode Fuzzy Hash: cc5cc974fc25a74a4e4796500e7ee75bd57132378abb324dc9bdb49e0f57563c
                        • Instruction Fuzzy Hash: D6011D7190030CABDB20DBE0CD89FFE777DEF44B01F508549BB199A180EB78A6488B65
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000), ref: 019B1B2D
                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 019B1B51
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 019B1B73
                        • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 019B1E7C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                        • String ID:
                        • API String ID: 572931308-0
                        • Opcode ID: 3d1e4b3f166ec283fe2d5bf78a98f7b519b979f5ada0f0792ca7e624af7e183c
                        • Instruction ID: 56d4f5de3e9ac1f83de0e743c8ef1378e0ada04718f5fadc7ab51fff6781409a
                        • Opcode Fuzzy Hash: 3d1e4b3f166ec283fe2d5bf78a98f7b519b979f5ada0f0792ca7e624af7e183c
                        • Instruction Fuzzy Hash: 6A12ED24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A4E77A5F81CF5A
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • IsThemeActive.UXTHEME ref: 00F94992
                          • Part of subcall function 00FB35AC: __lock.LIBCMT ref: 00FB35B2
                          • Part of subcall function 00FB35AC: DecodePointer.KERNEL32(00000001,?,00F949A7,00FE81BC), ref: 00FB35BE
                          • Part of subcall function 00FB35AC: EncodePointer.KERNEL32(?,?,00F949A7,00FE81BC), ref: 00FB35C9
                          • Part of subcall function 00F94A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00F94A73
                          • Part of subcall function 00F94A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F94A88
                          • Part of subcall function 00F93B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F93B7A
                          • Part of subcall function 00F93B4C: IsDebuggerPresent.KERNEL32 ref: 00F93B8C
                          • Part of subcall function 00F93B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,010562F8,010562E0,?,?), ref: 00F93BFD
                          • Part of subcall function 00F93B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00F93C81
                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F949D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                        • String ID:
                        • API String ID: 1438897964-0
                        • Opcode ID: d0c7d17597af3c2cfe12d861f902a63d569de3e8473c631a93441c22b9686723
                        • Instruction ID: 6cae0d43de16e6ba178f297d0277daab41048ce9fce4a2bdbd2f998e8c749781
                        • Opcode Fuzzy Hash: d0c7d17597af3c2cfe12d861f902a63d569de3e8473c631a93441c22b9686723
                        • Instruction Fuzzy Hash: 86119D719083119BD720EF29D80590BFFE8EF94750F40451EF085832A1DBBA9945EB96
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00F95981,?,?,?,?), ref: 00F95E27
                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00F95981,?,?,?,?), ref: 00FCE19C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 58d42f9fbd9c4228ff9d4f67d9eadd2c4ac0d8793b3bfbe353b93cf3e9a64160
                        • Instruction ID: d8854f1fe57e3887066480a204246d6f73b94bba54eacf8cb03b55ed36030c16
                        • Opcode Fuzzy Hash: 58d42f9fbd9c4228ff9d4f67d9eadd2c4ac0d8793b3bfbe353b93cf3e9a64160
                        • Instruction Fuzzy Hash: 5501B571684709BEF7351E24CC8AF763B9CEB01B78F108318BAE55A1D0C6B51E499B54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FB594C: __FF_MSGBANNER.LIBCMT ref: 00FB5963
                          • Part of subcall function 00FB594C: __NMSG_WRITE.LIBCMT ref: 00FB596A
                          • Part of subcall function 00FB594C: RtlAllocateHeap.NTDLL(019F0000,00000000,00000001,00000000,?,?,?,00FB1013,?), ref: 00FB598F
                        • std::exception::exception.LIBCMT ref: 00FB102C
                        • __CxxThrowException@8.LIBCMT ref: 00FB1041
                          • Part of subcall function 00FB87DB: RaiseException.KERNEL32(?,?,?,0104BAF8,00000000,?,?,?,?,00FB1046,?,0104BAF8,?,00000001), ref: 00FB8830
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                        • String ID:
                        • API String ID: 3902256705-0
                        • Opcode ID: ac9949fce0d8eeb0196f841316dee7180c2fefc01f991863c400ed550c80ad95
                        • Instruction ID: e36651bde352a5752cd4c063d1a8114c584557cda41e2064d72db84f17c5e819
                        • Opcode Fuzzy Hash: ac9949fce0d8eeb0196f841316dee7180c2fefc01f991863c400ed550c80ad95
                        • Instruction Fuzzy Hash: FAF0283560021DA7CB24BB9AEC159EF7BACAF003A0F600025F80496141DF748AC1EAD0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __lock_file_memset
                        • String ID:
                        • API String ID: 26237723-0
                        • Opcode ID: a0018593f3207123756c9f8984395f0dc1a699aed70cfc31ea47b7b4a11dd7d0
                        • Instruction ID: 8bb2ff675603c1fa2e5da9b8f1f21f4fdda7464129ef858cbeaba7ff5988fc3f
                        • Opcode Fuzzy Hash: a0018593f3207123756c9f8984395f0dc1a699aed70cfc31ea47b7b4a11dd7d0
                        • Instruction Fuzzy Hash: 17012171C41609EBCF12AF6B8C06ADE7B65AF847A0F148215B8245A161DB3DCA12FF91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FB8D68: __getptd_noexit.LIBCMT ref: 00FB8D68
                        • __lock_file.LIBCMT ref: 00FB561B
                          • Part of subcall function 00FB6E4E: __lock.LIBCMT ref: 00FB6E71
                        • __fclose_nolock.LIBCMT ref: 00FB5626
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                        • String ID:
                        • API String ID: 2800547568-0
                        • Opcode ID: b21e41c7f3f812b725b67e09d5b491655db1b476b3f175b7ef84da2e39e06b9c
                        • Instruction ID: dad6e17bede72c3b31c64de4b37a81565bd10fc2e49b86ef5bf2f28868f09fb3
                        • Opcode Fuzzy Hash: b21e41c7f3f812b725b67e09d5b491655db1b476b3f175b7ef84da2e39e06b9c
                        • Instruction Fuzzy Hash: 52F0BB71D01A059ADB206F778C427EE77965F80B74F598109E414AB1C1CF7C8902FF55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e2f0360fd6b5ce51ee145cfd5e6bca4795f1b895eab87aa817454bdb198c9661
                        • Instruction ID: b3b2e5db780df0463f0f8c475063f69cbd77eb88106343ebce0782f844ee132d
                        • Opcode Fuzzy Hash: e2f0360fd6b5ce51ee145cfd5e6bca4795f1b895eab87aa817454bdb198c9661
                        • Instruction Fuzzy Hash: A9519035B00604AFDF14EB58CD91B6E73A6AF85720F148069F906AB392CA38ED04AB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: ed94a90ccae69cae9cb555ecd5d7f51dcb5fee43a85c2cb21309b51c0c1bb69a
                        • Instruction ID: c499fd32dd85d315da6d2e99874b1699f1f4fc592ede6ba5b5a05cd448554c71
                        • Opcode Fuzzy Hash: ed94a90ccae69cae9cb555ecd5d7f51dcb5fee43a85c2cb21309b51c0c1bb69a
                        • Instruction Fuzzy Hash: 2131D679618B02DFDB24AF59C491A22F7A0FF08320714C56DE959CB365EB30E881EB41
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00F95CF6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: 12683ca949f027adae1fa558499ba7dd870208dddbb852fd6b2ca6382d319ba5
                        • Instruction ID: 83852b2c1e5e276de4b9917c54c35ec2ce61ab55703db58d515f9a8db03a9f5b
                        • Opcode Fuzzy Hash: 12683ca949f027adae1fa558499ba7dd870208dddbb852fd6b2ca6382d319ba5
                        • Instruction Fuzzy Hash: 5D315A71A00B0AABDF19CF69C484A6DB7B5FF48720F14862AE81993710D731B960EB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ClearVariant
                        • String ID:
                        • API String ID: 1473721057-0
                        • Opcode ID: dd43ac1229ba7beac26d7072dc3abc60932cbb81a469b1c21a8cba1118c525cf
                        • Instruction ID: c8e86c0b6aa896312b40046658791e0006bb01722085e0f53428cd75f55931b6
                        • Opcode Fuzzy Hash: dd43ac1229ba7beac26d7072dc3abc60932cbb81a469b1c21a8cba1118c525cf
                        • Instruction Fuzzy Hash: 7C411574908341CFEB24DF14C884B1ABBE1BF45318F19889DE8894B362C736EC85DB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: 69cdbe8ee7cb3e7b345037ed30cbed7a36d82b1038eedb6d1f3bebfa05318599
                        • Instruction ID: 57cae944b260298a390d3f85dc344890f13e5871f06168fb4134cb0668fcff4e
                        • Opcode Fuzzy Hash: 69cdbe8ee7cb3e7b345037ed30cbed7a36d82b1038eedb6d1f3bebfa05318599
                        • Instruction Fuzzy Hash: 7921E771A00A09EBEF205F51EA86B6A7FB8FF50750F21846DE4C5C1005EB7694E0FB45
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F94D13: FreeLibrary.KERNEL32(00000000,?), ref: 00F94D4D
                          • Part of subcall function 00FB548B: __wfsopen.LIBCMT ref: 00FB5496
                        • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,010562F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F94F6F
                          • Part of subcall function 00F94CC8: FreeLibrary.KERNEL32(00000000), ref: 00F94D02
                          • Part of subcall function 00F94DD0: _memmove.LIBCMT ref: 00F94E1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Library$Free$Load__wfsopen_memmove
                        • String ID:
                        • API String ID: 1396898556-0
                        • Opcode ID: 6e5eff033afcfd94d24c5fa457a34f083a0eaf3dc595e75379ff68d87594ad2f
                        • Instruction ID: 0085e556ccfea8d063800b5ee6e102c5612330ef8b77a1e33a34a68ff823f8ee
                        • Opcode Fuzzy Hash: 6e5eff033afcfd94d24c5fa457a34f083a0eaf3dc595e75379ff68d87594ad2f
                        • Instruction Fuzzy Hash: 24112B31A00607AADF10FF70CC02FAD77A49F50711F10842DF541A7181DA796A06BB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ClearVariant
                        • String ID:
                        • API String ID: 1473721057-0
                        • Opcode ID: 77eac14fbc186f66092349f6638d21e4f0d50ba810ca6294b2c8c5ba105515fa
                        • Instruction ID: c6fb382e35481d06c650a673ec428c6ed1b06ce58e69434db3bbc995703adb65
                        • Opcode Fuzzy Hash: 77eac14fbc186f66092349f6638d21e4f0d50ba810ca6294b2c8c5ba105515fa
                        • Instruction Fuzzy Hash: F92124B4908341CFDB24EF65C884B1ABBE1BF84314F05896CE88A47761D735E849EF92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FB09F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: LongNamePath
                        • String ID:
                        • API String ID: 82841172-0
                        • Opcode ID: 1eb2b5ce544e870d2ed84240686ca0ec49cb052191e25962b534fbff65ecc0c8
                        • Instruction ID: 7c5fcb934317c1e6863c57d806df12ff2a38cf48e5d4a444d8ae48b920384401
                        • Opcode Fuzzy Hash: 1eb2b5ce544e870d2ed84240686ca0ec49cb052191e25962b534fbff65ecc0c8
                        • Instruction Fuzzy Hash: BE019E3268E1C08FC713C7B089AA6C47FA6DE4302432C14DED8C69B123EC55140BEB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00F95807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00F95D76
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FileRead
                        • String ID:
                        • API String ID: 2738559852-0
                        • Opcode ID: 6709aa82a97015d6dddb7553274eaaca17731ea5463f2ae3fb08b6975f365d94
                        • Instruction ID: 93de67bf0319829e6e0ae9773d765562ac9d8d25b1d89805e40e0914563dcddb
                        • Opcode Fuzzy Hash: 6709aa82a97015d6dddb7553274eaaca17731ea5463f2ae3fb08b6975f365d94
                        • Instruction Fuzzy Hash: A7116A31608B019FEB328F05D884B62B7E4EF45B20F10C92EE8AA86A50D771E945DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: be6167496cc4740c6d9da7acf3f0c0ba068c2a6c1c8c658fa0631b0a7a007119
                        • Instruction ID: 8691449354179e59edae6a9656e22f6ebe84e5e3d127a4f020232e486ec11ad8
                        • Opcode Fuzzy Hash: be6167496cc4740c6d9da7acf3f0c0ba068c2a6c1c8c658fa0631b0a7a007119
                        • Instruction Fuzzy Hash: C4018FB9600542AFC706EB69C852E66FBA9FF9A3543148159F819C7702DB34EC21DBE0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: eeb64eb574f01b22aa695f3b50d3141ecae89211bb67cced2229092baaebf909
                        • Instruction ID: d0c0c5c967207647d1b5e11c8ebaf0ca757431002d255d3b230617bae6347746
                        • Opcode Fuzzy Hash: eeb64eb574f01b22aa695f3b50d3141ecae89211bb67cced2229092baaebf909
                        • Instruction Fuzzy Hash: BD01A9722012656BCB24DF2EDC919BBB7A9EFC5364724443EFD0ACB245E631E901D790
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __lock_file.LIBCMT ref: 00FB4AD6
                          • Part of subcall function 00FB8D68: __getptd_noexit.LIBCMT ref: 00FB8D68
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __getptd_noexit__lock_file
                        • String ID:
                        • API String ID: 2597487223-0
                        • Opcode ID: 16e3d55ee46d440212ef709604a2d73738f21f83e3f96012c8f5b4b82f94a68b
                        • Instruction ID: 07849e00a584724613e470a6bef59b551716b3c560099879a5f8d34b6be1b5db
                        • Opcode Fuzzy Hash: 16e3d55ee46d440212ef709604a2d73738f21f83e3f96012c8f5b4b82f94a68b
                        • Instruction Fuzzy Hash: D0F0FF31900209ABDF61AF76CD023EE36A8AF40365F088114B424AA1D3CB7CCA11FF40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FreeLibrary.KERNEL32(?,?,010562F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F94FDE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 95bd361b93a48c079a3259415c70b44f6acca154ec42e119f2f964b44343403a
                        • Instruction ID: 44c136c220bf559baa80e0262f52186a07a923833d568962fb772e44cf46182e
                        • Opcode Fuzzy Hash: 95bd361b93a48c079a3259415c70b44f6acca154ec42e119f2f964b44343403a
                        • Instruction Fuzzy Hash: 17F01572505712CFDB349F64E494D12BBE1BF2432E3248A2EE5DA83A10C776A845EF40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FB09F4
                          • Part of subcall function 00F97D2C: _memmove.LIBCMT ref: 00F97D66
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: LongNamePath_memmove
                        • String ID:
                        • API String ID: 2514874351-0
                        • Opcode ID: 3a553e4dac2bb3dbd2a3e69ef8c979e6a6260beb9118027fbbd0474e35caeda1
                        • Instruction ID: e9175e3910fa3ea0b8de205b8630211ae0426ff64a4cde0d83c4ca378c85117e
                        • Opcode Fuzzy Hash: 3a553e4dac2bb3dbd2a3e69ef8c979e6a6260beb9118027fbbd0474e35caeda1
                        • Instruction Fuzzy Hash: FDE0CD3690432957D720E5589C06FFA77EDDFC9790F0401B6FC4CD7209DD699C918690
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __fread_nolock
                        • String ID:
                        • API String ID: 2638373210-0
                        • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                        • Instruction ID: 6ab9962a4b96a5a3c42565abfc3452ae5a2a0d6acc18fb5912e7be12a7949b40
                        • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                        • Instruction Fuzzy Hash: 09E092B0508B045FDB348A24D810BE373E0AF06315F00091CF29A93351EBA2B841DB59
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00FCE16B,?,?,00000000), ref: 00F95DBF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: 28dc13e76146c9078118954fd5f62cbf370c5962ea87daf95d204fd68c577a00
                        • Instruction ID: a0e533a0df7a933d7e3bbfaf3cb2b4fb51510164fe1897608edcae2ec87acf1c
                        • Opcode Fuzzy Hash: 28dc13e76146c9078118954fd5f62cbf370c5962ea87daf95d204fd68c577a00
                        • Instruction Fuzzy Hash: 54D0C77464020CBFE710DB80DC46FA9777CD705710F100194FD0456290D6B27D548795
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __wfsopen
                        • String ID:
                        • API String ID: 197181222-0
                        • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                        • Instruction ID: 03206b46e76550dd62b3efd97d4ae563fc8873762e5a230b969af3f51e7303d7
                        • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                        • Instruction Fuzzy Hash: 8DB09B7544010C77DE011D82EC02B553B195740774F404010FB0C18161957795605585
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetLastError.KERNEL32(00000002,00000000), ref: 00FFD46A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID:
                        • API String ID: 1452528299-0
                        • Opcode ID: 091ddb4901c808cbdeb535e39f96d05982ea8869b4aa4334419906b1d2ad4d8b
                        • Instruction ID: e1b6bdf019cea051260fa0fd0c5db12bfd212e84ed9074c5f590351e975cbe72
                        • Opcode Fuzzy Hash: 091ddb4901c808cbdeb535e39f96d05982ea8869b4aa4334419906b1d2ad4d8b
                        • Instruction Fuzzy Hash: F27195306083058FDB14EF28C8D1A6EB7E1AF84714F08456DF5968B3A1DB78ED09EB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction ID: 6695df00e39c7207d91c62b2c47fb08095fbb0d4f686e9fba03818fedc5e620d
                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction Fuzzy Hash: 8031B571A00106DFD718DF5AD480AAAF7A6FF59310B648AA5E409CF651DB31EDC1EF80
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 019B2A67
                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FreeVirtual
                        • String ID:
                        • API String ID: 1263568516-0
                        • Opcode ID: a2f09042e8b8218b62577ab9939fd8ad4f1ab35591ca5a7ca790d0063d9bd37b
                        • Instruction ID: f127fd1bf5633adbcaf078fd0899f1e199ce1cc7996cf7d37b16bff0ec002a13
                        • Opcode Fuzzy Hash: a2f09042e8b8218b62577ab9939fd8ad4f1ab35591ca5a7ca790d0063d9bd37b
                        • Instruction Fuzzy Hash: 18010035E40208EFEB64CBA4CA94BDDBBB5EF44701F208199E605A72C1C775AE40DF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • Sleep.KERNELBASE(000007D0), ref: 019B2312
                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: dce1e67ee7a905aee1ad479c7a3e30644d0bd5a7b1fbfaf3e5e7a496efc26c57
                        • Instruction ID: 79e5459a163ea7634a3cbd2f27ace150dac760c8155b1f1c953cb1af8f77dc4e
                        • Opcode Fuzzy Hash: dce1e67ee7a905aee1ad479c7a3e30644d0bd5a7b1fbfaf3e5e7a496efc26c57
                        • Instruction Fuzzy Hash: EDF0C43194110EAFCF00EFA4CA89AEEBBB4FF04711F504555FA1AA2180DB30AA51CBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0101CE50
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0101CE91
                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0101CED6
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0101CF00
                        • SendMessageW.USER32 ref: 0101CF29
                        • _wcsncpy.LIBCMT ref: 0101CFA1
                        • GetKeyState.USER32(00000011), ref: 0101CFC2
                        • GetKeyState.USER32(00000009), ref: 0101CFCF
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0101CFE5
                        • GetKeyState.USER32(00000010), ref: 0101CFEF
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0101D018
                        • SendMessageW.USER32 ref: 0101D03F
                        • SendMessageW.USER32(?,00001030,?,0101B602), ref: 0101D145
                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0101D15B
                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0101D16E
                        • SetCapture.USER32(?), ref: 0101D177
                        • ClientToScreen.USER32(?,?), ref: 0101D1DC
                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0101D1E9
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0101D203
                        • ReleaseCapture.USER32 ref: 0101D20E
                        • GetCursorPos.USER32(?), ref: 0101D248
                        • ScreenToClient.USER32(?,?), ref: 0101D255
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0101D2B1
                        • SendMessageW.USER32 ref: 0101D2DF
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0101D31C
                        • SendMessageW.USER32 ref: 0101D34B
                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0101D36C
                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0101D37B
                        • GetCursorPos.USER32(?), ref: 0101D39B
                        • ScreenToClient.USER32(?,?), ref: 0101D3A8
                        • GetParent.USER32(?), ref: 0101D3C8
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 0101D431
                        • SendMessageW.USER32 ref: 0101D462
                        • ClientToScreen.USER32(?,?), ref: 0101D4C0
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0101D4F0
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0101D51A
                        • SendMessageW.USER32 ref: 0101D53D
                        • ClientToScreen.USER32(?,?), ref: 0101D58F
                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0101D5C3
                          • Part of subcall function 00F925DB: GetWindowLongW.USER32(?,000000EB), ref: 00F925EC
                        • GetWindowLongW.USER32(?,000000F0), ref: 0101D65F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                        • String ID: @GUI_DRAGID$F
                        • API String ID: 3977979337-4164748364
                        • Opcode ID: c94c95665696870461306824d335959c7f57b08b15dc4a841d301e7e6c8f6831
                        • Instruction ID: b7ce96e1d8a27d62fdb393db986e90fe98c35801a99ecd9f2c8cb10d0e2b0be7
                        • Opcode Fuzzy Hash: c94c95665696870461306824d335959c7f57b08b15dc4a841d301e7e6c8f6831
                        • Instruction Fuzzy Hash: 5642BE74244341AFEB25CF68C948AAABFE5FF48314F040A5DF6D5872A5C73AD844CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0101873F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: %d/%02d/%02d
                        • API String ID: 3850602802-328681919
                        • Opcode ID: bbefc9eab1b8285252dee1e78423b200679b89fc98e0d47c02e6ab86ab8a8b5c
                        • Instruction ID: 1ccd7231ae5c3a8c49360ea5304775726cfad1496bf3f93bfa1a19d03b43ddba
                        • Opcode Fuzzy Hash: bbefc9eab1b8285252dee1e78423b200679b89fc98e0d47c02e6ab86ab8a8b5c
                        • Instruction Fuzzy Hash: 1112E371500204AFEB258F68CC49FAF7BF8FF49350F10855AFA95EA299DB788641CB10
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memmove$_memset
                        • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                        • API String ID: 1357608183-1798697756
                        • Opcode ID: 593d3c5c36ede660b12b9c33add000d16db523cb06c572b563d9803b5c8d1764
                        • Instruction ID: 1b3d63a0f4ead1bc8f8546725f7bb58897225d369729454e89b9b8e324cbe604
                        • Opcode Fuzzy Hash: 593d3c5c36ede660b12b9c33add000d16db523cb06c572b563d9803b5c8d1764
                        • Instruction Fuzzy Hash: 7E93A272E00255DFDB24DF59C885BADB7B1FF48320F25816AE945EB280E7749E81EB40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetForegroundWindow.USER32(00000000,?), ref: 00F94A3D
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FCDA8E
                        • IsIconic.USER32(?), ref: 00FCDA97
                        • ShowWindow.USER32(?,00000009), ref: 00FCDAA4
                        • SetForegroundWindow.USER32(?), ref: 00FCDAAE
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FCDAC4
                        • GetCurrentThreadId.KERNEL32 ref: 00FCDACB
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FCDAD7
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FCDAE8
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FCDAF0
                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 00FCDAF8
                        • SetForegroundWindow.USER32(?), ref: 00FCDAFB
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FCDB10
                        • keybd_event.USER32(00000012,00000000), ref: 00FCDB1B
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FCDB25
                        • keybd_event.USER32(00000012,00000000), ref: 00FCDB2A
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FCDB33
                        • keybd_event.USER32(00000012,00000000), ref: 00FCDB38
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FCDB42
                        • keybd_event.USER32(00000012,00000000), ref: 00FCDB47
                        • SetForegroundWindow.USER32(?), ref: 00FCDB4A
                        • AttachThreadInput.USER32(?,?,00000000), ref: 00FCDB71
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                        • String ID: Shell_TrayWnd
                        • API String ID: 4125248594-2988720461
                        • Opcode ID: e0bcff19e90f735fa9ea117b5fec24141f0b9e07fecc071bcea7dcada998524e
                        • Instruction ID: 108335eb75f8ec30ff7f5013709016ed56062b08438bb76f5d35973007523ac9
                        • Opcode Fuzzy Hash: e0bcff19e90f735fa9ea117b5fec24141f0b9e07fecc071bcea7dcada998524e
                        • Instruction Fuzzy Hash: 1A316771A40319BBEB315FA19D4AF7F7E6CEB44B60F114029FA04E61C1C6795D01ABA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FE8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE8D0D
                          • Part of subcall function 00FE8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE8D3A
                          • Part of subcall function 00FE8CC3: GetLastError.KERNEL32 ref: 00FE8D47
                        • _memset.LIBCMT ref: 00FE889B
                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00FE88ED
                        • CloseHandle.KERNEL32(?), ref: 00FE88FE
                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00FE8915
                        • GetProcessWindowStation.USER32 ref: 00FE892E
                        • SetProcessWindowStation.USER32(00000000), ref: 00FE8938
                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00FE8952
                          • Part of subcall function 00FE8713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FE8851), ref: 00FE8728
                          • Part of subcall function 00FE8713: CloseHandle.KERNEL32(?,?,00FE8851), ref: 00FE873A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                        • String ID: $default$winsta0
                        • API String ID: 2063423040-1027155976
                        • Opcode ID: e4d6a72952a04a191f1620f3006b298c5243440e4c2fd6295df3b8f8e5e535e8
                        • Instruction ID: fa96b8369571c478a7751b580a57d2eb449ed87278fda2c75619017e8913a0da
                        • Opcode Fuzzy Hash: e4d6a72952a04a191f1620f3006b298c5243440e4c2fd6295df3b8f8e5e535e8
                        • Instruction Fuzzy Hash: CC817071D00249BFDF21EFA5CC44AEE7B78EF04754F14412AF914B6160DB398E06AB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • OpenClipboard.USER32(0101F910), ref: 01004284
                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 01004292
                        • GetClipboardData.USER32(0000000D), ref: 0100429A
                        • CloseClipboard.USER32 ref: 010042A6
                        • GlobalLock.KERNEL32(00000000), ref: 010042C2
                        • CloseClipboard.USER32 ref: 010042CC
                        • GlobalUnlock.KERNEL32(00000000,00000000), ref: 010042E1
                        • IsClipboardFormatAvailable.USER32(00000001), ref: 010042EE
                        • GetClipboardData.USER32(00000001), ref: 010042F6
                        • GlobalLock.KERNEL32(00000000), ref: 01004303
                        • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 01004337
                        • CloseClipboard.USER32 ref: 01004447
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                        • String ID:
                        • API String ID: 3222323430-0
                        • Opcode ID: 2f76fa389e1e9e3a85a0f38696c35fc43d5cd20a45257a3dc3c0b626feefe6c1
                        • Instruction ID: c9564272aed8b30c10702d57c5e9ceb1985e30b31e7038359803bedc5f1cdd02
                        • Opcode Fuzzy Hash: 2f76fa389e1e9e3a85a0f38696c35fc43d5cd20a45257a3dc3c0b626feefe6c1
                        • Instruction Fuzzy Hash: A7519E31304302ABE712FF64EC85FAE77A8AB84B00F004519F6D6D21E1DF79D9088B66
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00FFC9F8
                        • FindClose.KERNEL32(00000000), ref: 00FFCA4C
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FFCA71
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FFCA88
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FFCAAF
                        • __swprintf.LIBCMT ref: 00FFCAFB
                        • __swprintf.LIBCMT ref: 00FFCB3E
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                        • __swprintf.LIBCMT ref: 00FFCB92
                          • Part of subcall function 00FB38D8: __woutput_l.LIBCMT ref: 00FB3931
                        • __swprintf.LIBCMT ref: 00FFCBE0
                          • Part of subcall function 00FB38D8: __flsbuf.LIBCMT ref: 00FB3953
                          • Part of subcall function 00FB38D8: __flsbuf.LIBCMT ref: 00FB396B
                        • __swprintf.LIBCMT ref: 00FFCC2F
                        • __swprintf.LIBCMT ref: 00FFCC7E
                        • __swprintf.LIBCMT ref: 00FFCCCD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                        • API String ID: 3953360268-2428617273
                        • Opcode ID: 41185cffbf69f36d31ed59cf7e63a1d764bac5ae3e92b5690793348f28b74201
                        • Instruction ID: c3696a3dd54ab0814bbcec692c50e7bfa2c849061bb6794786b0939162642b93
                        • Opcode Fuzzy Hash: 41185cffbf69f36d31ed59cf7e63a1d764bac5ae3e92b5690793348f28b74201
                        • Instruction Fuzzy Hash: 16A14FB2508305ABDB10EB65CD85DAFB7ECEF94700F40091DF586C3191EA78EA08DB62
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00FFF221
                        • _wcscmp.LIBCMT ref: 00FFF236
                        • _wcscmp.LIBCMT ref: 00FFF24D
                        • GetFileAttributesW.KERNEL32(?), ref: 00FFF25F
                        • SetFileAttributesW.KERNEL32(?,?), ref: 00FFF279
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00FFF291
                        • FindClose.KERNEL32(00000000), ref: 00FFF29C
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00FFF2B8
                        • _wcscmp.LIBCMT ref: 00FFF2DF
                        • _wcscmp.LIBCMT ref: 00FFF2F6
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFF308
                        • SetCurrentDirectoryW.KERNEL32(0104A5A0), ref: 00FFF326
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FFF330
                        • FindClose.KERNEL32(00000000), ref: 00FFF33D
                        • FindClose.KERNEL32(00000000), ref: 00FFF34F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                        • String ID: *.*
                        • API String ID: 1803514871-438819550
                        • Opcode ID: 39d44c63e3884f4940c1635ef0d1049e524987c94f650f9600c9d81fca68a5dd
                        • Instruction ID: b4ff948312c6ed3bfa64e325febbd8a434ae5d805305afddaa0b463a601e9bf1
                        • Opcode Fuzzy Hash: 39d44c63e3884f4940c1635ef0d1049e524987c94f650f9600c9d81fca68a5dd
                        • Instruction Fuzzy Hash: CB31D876A0021E6BDB20DEB5DC88AEE77AC9F08370F104165F944D30A0DB79DA49DB54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01010BDE
                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,0101F910,00000000,?,00000000,?,?), ref: 01010C4C
                        • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 01010C94
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 01010D1D
                        • RegCloseKey.ADVAPI32(?), ref: 0101103D
                        • RegCloseKey.ADVAPI32(00000000), ref: 0101104A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Close$ConnectCreateRegistryValue
                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                        • API String ID: 536824911-966354055
                        • Opcode ID: cd5294bfa9dc5907ccf88c028f5b20bb58ea15ca9d907468cd6ae799a0c74df1
                        • Instruction ID: faf376b396994fb2b7664c091567be305a1c63dc731f8ce9437762a9a4bd3e9f
                        • Opcode Fuzzy Hash: cd5294bfa9dc5907ccf88c028f5b20bb58ea15ca9d907468cd6ae799a0c74df1
                        • Instruction Fuzzy Hash: CB02BF756046019FDB15EF29C881E2ABBE5FF88710F05845DF98A9B362CB78EC40CB81
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00FFF37E
                        • _wcscmp.LIBCMT ref: 00FFF393
                        • _wcscmp.LIBCMT ref: 00FFF3AA
                          • Part of subcall function 00FF45C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00FF45DC
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00FFF3D9
                        • FindClose.KERNEL32(00000000), ref: 00FFF3E4
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00FFF400
                        • _wcscmp.LIBCMT ref: 00FFF427
                        • _wcscmp.LIBCMT ref: 00FFF43E
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00FFF450
                        • SetCurrentDirectoryW.KERNEL32(0104A5A0), ref: 00FFF46E
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FFF478
                        • FindClose.KERNEL32(00000000), ref: 00FFF485
                        • FindClose.KERNEL32(00000000), ref: 00FFF497
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                        • String ID: *.*
                        • API String ID: 1824444939-438819550
                        • Opcode ID: ae071eb06d600341f226a32924ba87b577783de5bc3706a7d841390f0281494f
                        • Instruction ID: e31bfe8ddb41ecf212f6b25984e2f68e5f47d10f68668566954023c4d84e1c66
                        • Opcode Fuzzy Hash: ae071eb06d600341f226a32924ba87b577783de5bc3706a7d841390f0281494f
                        • Instruction Fuzzy Hash: FD31E97290111E6BDB20DE65DC88AEF77AC9F05370F144165E940E31A0DB79DE4CDB54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FE874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE8766
                          • Part of subcall function 00FE874A: GetLastError.KERNEL32(?,00FE822A,?,?,?), ref: 00FE8770
                          • Part of subcall function 00FE874A: GetProcessHeap.KERNEL32(00000008,?,?,00FE822A,?,?,?), ref: 00FE877F
                          • Part of subcall function 00FE874A: HeapAlloc.KERNEL32(00000000,?,00FE822A,?,?,?), ref: 00FE8786
                          • Part of subcall function 00FE874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE879D
                          • Part of subcall function 00FE87E7: GetProcessHeap.KERNEL32(00000008,00FE8240,00000000,00000000,?,00FE8240,?), ref: 00FE87F3
                          • Part of subcall function 00FE87E7: HeapAlloc.KERNEL32(00000000,?,00FE8240,?), ref: 00FE87FA
                          • Part of subcall function 00FE87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FE8240,?), ref: 00FE880B
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FE825B
                        • _memset.LIBCMT ref: 00FE8270
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FE828F
                        • GetLengthSid.ADVAPI32(?), ref: 00FE82A0
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00FE82DD
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FE82F9
                        • GetLengthSid.ADVAPI32(?), ref: 00FE8316
                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FE8325
                        • HeapAlloc.KERNEL32(00000000), ref: 00FE832C
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FE834D
                        • CopySid.ADVAPI32(00000000), ref: 00FE8354
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FE8385
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FE83AB
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FE83BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                        • String ID:
                        • API String ID: 3996160137-0
                        • Opcode ID: edb737e2ed0da32b0bc0797554059b38d4ee1e292fbeb538035bd8ee71b5d69d
                        • Instruction ID: 2436af4f256162d0d01efc2b481cbf3753e5dd842ee25a84bef9bb128c6a68cb
                        • Opcode Fuzzy Hash: edb737e2ed0da32b0bc0797554059b38d4ee1e292fbeb538035bd8ee71b5d69d
                        • Instruction Fuzzy Hash: D2617E7190024AEFDF11EFA1DC44AEEBBB9FF04750F148119F919A7290DB399A06DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                        • API String ID: 0-4052911093
                        • Opcode ID: 5de03b4691d64512eb609b7a2c1787f236cc095f1d30eef75d725f46a2973583
                        • Instruction ID: 1827bab72eb94aa0d078de478e3c102efdb0495fa159e2dfd2ecff3502a08bc7
                        • Opcode Fuzzy Hash: 5de03b4691d64512eb609b7a2c1787f236cc095f1d30eef75d725f46a2973583
                        • Instruction Fuzzy Hash: 677282B5E002599BDF24CF5AC8807EEB7B5FF49720F14816AE845EB280D7749D81EB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 010110A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,01010038,?,?), ref: 010110BC
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01010737
                          • Part of subcall function 00F99997: __itow.LIBCMT ref: 00F999C2
                          • Part of subcall function 00F99997: __swprintf.LIBCMT ref: 00F99A0C
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 010107D6
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0101086E
                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 01010AAD
                        • RegCloseKey.ADVAPI32(00000000), ref: 01010ABA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                        • String ID:
                        • API String ID: 1240663315-0
                        • Opcode ID: c166ebeeaa909230acd4b9a2d2701e07e9f0bf58d04e95c791f63414f00daf7a
                        • Instruction ID: 00069a52bd20a7f5a3d377848d07c5847ff3784e3ee9465994bd8d35df6bbfe1
                        • Opcode Fuzzy Hash: c166ebeeaa909230acd4b9a2d2701e07e9f0bf58d04e95c791f63414f00daf7a
                        • Instruction Fuzzy Hash: 1FE19D31604200AFDB14DF28C880E2EBBE9FF89714F04896DF48ADB265DB38E945CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetKeyboardState.USER32(?), ref: 00FF0241
                        • GetAsyncKeyState.USER32(000000A0), ref: 00FF02C2
                        • GetKeyState.USER32(000000A0), ref: 00FF02DD
                        • GetAsyncKeyState.USER32(000000A1), ref: 00FF02F7
                        • GetKeyState.USER32(000000A1), ref: 00FF030C
                        • GetAsyncKeyState.USER32(00000011), ref: 00FF0324
                        • GetKeyState.USER32(00000011), ref: 00FF0336
                        • GetAsyncKeyState.USER32(00000012), ref: 00FF034E
                        • GetKeyState.USER32(00000012), ref: 00FF0360
                        • GetAsyncKeyState.USER32(0000005B), ref: 00FF0378
                        • GetKeyState.USER32(0000005B), ref: 00FF038A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: 872a2677f3f2e9f6d6cbb263e067f61067d5fe39c30304f8cfa037c1ac1370c0
                        • Instruction ID: 253e24929577fb5dcca2d563ec67344cf074986b4edd7904414fc2633858f16c
                        • Opcode Fuzzy Hash: 872a2677f3f2e9f6d6cbb263e067f61067d5fe39c30304f8cfa037c1ac1370c0
                        • Instruction Fuzzy Hash: 5841AA34D047CE6EFF319A6484087B5BEA06F12364F48409EDBC6461D3EFD959C8A7A2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                        • String ID:
                        • API String ID: 1737998785-0
                        • Opcode ID: ff31eab0fc0b51e187179ed955f2cb6992696beef994530ae293fdb48c882499
                        • Instruction ID: 080374d97f8eb661ae6ccbe7d1416ebd80d1a6e9b4d42c7b2154b29da622f89a
                        • Opcode Fuzzy Hash: ff31eab0fc0b51e187179ed955f2cb6992696beef994530ae293fdb48c882499
                        • Instruction Fuzzy Hash: C921F9353002119FEB219F64EC09B6D77A8EF04751F01805AF9C6D72A2CB7EAD00DB48
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F948AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F948A1,?,?,00F937C0,?), ref: 00F948CE
                          • Part of subcall function 00FF4CD3: GetFileAttributesW.KERNEL32(?,00FF3947), ref: 00FF4CD4
                        • FindFirstFileW.KERNEL32(?,?), ref: 00FF3ADF
                        • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00FF3B87
                        • MoveFileW.KERNEL32(?,?), ref: 00FF3B9A
                        • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00FF3BB7
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FF3BD9
                        • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00FF3BF5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                        • String ID: \*.*
                        • API String ID: 4002782344-1173974218
                        • Opcode ID: bd8e7ead44660f7e53923dbdc373a5b03d2b6f718a8a1819c60c0863a5db3dd4
                        • Instruction ID: 75c61db80325afd65a624959dcaba6c324302575f4d46214f8f31482905d2dcc
                        • Opcode Fuzzy Hash: bd8e7ead44660f7e53923dbdc373a5b03d2b6f718a8a1819c60c0863a5db3dd4
                        • Instruction Fuzzy Hash: 57517E31C0524DAADF15FBA0CD929FDB778AF54300F2441A9E542771A1EF296F09EBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                        • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00FFF6AB
                        • Sleep.KERNEL32(0000000A), ref: 00FFF6DB
                        • _wcscmp.LIBCMT ref: 00FFF6EF
                        • _wcscmp.LIBCMT ref: 00FFF70A
                        • FindNextFileW.KERNEL32(?,?), ref: 00FFF7A8
                        • FindClose.KERNEL32(00000000), ref: 00FFF7BE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                        • String ID: *.*
                        • API String ID: 713712311-438819550
                        • Opcode ID: aa376a3b43b43b5c18f35242be0b76f56bde3e55478efcd96ac36beea7fd7f5a
                        • Instruction ID: 52f1825c6a6ec245169c5132677b59c30d2e879854fcf84770afd4ca7a657508
                        • Opcode Fuzzy Hash: aa376a3b43b43b5c18f35242be0b76f56bde3e55478efcd96ac36beea7fd7f5a
                        • Instruction Fuzzy Hash: 5C417F7290420E9BDF21EF64CC85AEEBBB4FF05310F144566E915A71A1EB349E48DF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                        • API String ID: 0-1546025612
                        • Opcode ID: 19ef9540a2708d081aadf0c17fc2060332cd3e6571dbcd30d6e3cb5da20c38f0
                        • Instruction ID: 6907d630284fe4f979585e1332a93f201ce34f5b48944ad6e192471ef909ff45
                        • Opcode Fuzzy Hash: 19ef9540a2708d081aadf0c17fc2060332cd3e6571dbcd30d6e3cb5da20c38f0
                        • Instruction Fuzzy Hash: 9FA293B1D0421ACBDF24DF58C9407ADB7B2BF95324F1481AAD855AB380E774AD81EF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: 68d73a07f09205da6a9975495170bc877aa1d000bfd62c24a09a58f0f55cb215
                        • Instruction ID: c8ad63f6acc098d873c5c46d5842d18d9964a5f4e5652eb5ed918575545a1fb4
                        • Opcode Fuzzy Hash: 68d73a07f09205da6a9975495170bc877aa1d000bfd62c24a09a58f0f55cb215
                        • Instruction Fuzzy Hash: 9C129BB0A00609DFDF14DFA5D981AEEB7B5FF48700F104129E446E7251EB3AAD51EB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FE8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE8D0D
                          • Part of subcall function 00FE8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE8D3A
                          • Part of subcall function 00FE8CC3: GetLastError.KERNEL32 ref: 00FE8D47
                        • ExitWindowsEx.USER32(?,00000000), ref: 00FF549B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                        • String ID: $@$SeShutdownPrivilege
                        • API String ID: 2234035333-194228
                        • Opcode ID: e7e0d75e0aa74017c1d4a14f5a6ff9fd3de9f94587ae0f64a6bc070791035f26
                        • Instruction ID: e38435cc0221a69907075f22a8d3c763a5483f6c47ac23d0af497cfd6568fb11
                        • Opcode Fuzzy Hash: e7e0d75e0aa74017c1d4a14f5a6ff9fd3de9f94587ae0f64a6bc070791035f26
                        • Instruction Fuzzy Hash: 64014C72E54E196AE738E674DC5ABB67258EF01B63F300021FF47D60F3E5990C80A290
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 010065EF
                        • WSAGetLastError.WSOCK32(00000000), ref: 010065FE
                        • bind.WSOCK32(00000000,?,00000010), ref: 0100661A
                        • listen.WSOCK32(00000000,00000005), ref: 01006629
                        • WSAGetLastError.WSOCK32(00000000), ref: 01006643
                        • closesocket.WSOCK32(00000000,00000000), ref: 01006657
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorLast$bindclosesocketlistensocket
                        • String ID:
                        • API String ID: 1279440585-0
                        • Opcode ID: 3a964970f70987c2c80456e7326d2a6131ddb50a9836c6c91a2f0058ae244d93
                        • Instruction ID: 6fceb01cc516e409e91882843a0801fd947fabd9810bef292b6d5c68e09cb0f8
                        • Opcode Fuzzy Hash: 3a964970f70987c2c80456e7326d2a6131ddb50a9836c6c91a2f0058ae244d93
                        • Instruction Fuzzy Hash: 4821EC306002119FEB10EF28CC85A2EB7EAEF48320F118199F996E73C1CB79AC059B51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FB0FF6: std::exception::exception.LIBCMT ref: 00FB102C
                          • Part of subcall function 00FB0FF6: __CxxThrowException@8.LIBCMT ref: 00FB1041
                        • _memmove.LIBCMT ref: 00FE062F
                        • _memmove.LIBCMT ref: 00FE0744
                        • _memmove.LIBCMT ref: 00FE07EB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memmove$Exception@8Throwstd::exception::exception
                        • String ID:
                        • API String ID: 1300846289-0
                        • Opcode ID: 625c528c684bd45d8da5599c83e5723b1d0692638941387e226123bf269fba9e
                        • Instruction ID: eea9d1a999499ae80be691bf816b774b09426bdc4d91fa07ef336cc674613b0a
                        • Opcode Fuzzy Hash: 625c528c684bd45d8da5599c83e5723b1d0692638941387e226123bf269fba9e
                        • Instruction Fuzzy Hash: 9B02DFB0E00209DFDF04DF65D981AAEBBB5FF45300F148069E806DB295EB39DA51EB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F919FA
                        • GetSysColor.USER32(0000000F), ref: 00F91A4E
                        • SetBkColor.GDI32(?,00000000), ref: 00F91A61
                          • Part of subcall function 00F91290: DefDlgProcW.USER32(?,00000020,?), ref: 00F912D8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ColorProc$LongWindow
                        • String ID:
                        • API String ID: 3744519093-0
                        • Opcode ID: 285276841f87d92f990423768825cd98deed278033fcd39a98ff69207f6e5a13
                        • Instruction ID: fccf95b9248f1e2e869d25b98919bcf4b8dd0adbd7488dd484836668e87b99ec
                        • Opcode Fuzzy Hash: 285276841f87d92f990423768825cd98deed278033fcd39a98ff69207f6e5a13
                        • Instruction Fuzzy Hash: BCA14772505547BAFF38AA294D46FBF365DFB82361F140129F442D6185CA2ECC01F675
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 010080A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 010080CB
                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 01006AB1
                        • WSAGetLastError.WSOCK32(00000000), ref: 01006ADA
                        • bind.WSOCK32(00000000,?,00000010), ref: 01006B13
                        • WSAGetLastError.WSOCK32(00000000), ref: 01006B20
                        • closesocket.WSOCK32(00000000,00000000), ref: 01006B34
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorLast$bindclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 99427753-0
                        • Opcode ID: b0eef3280bc5ef9ee5bfd93cde901b47facdfe894ca5c8ce65be1fc786f50498
                        • Instruction ID: 4fbb8eecf96e130b96a42ca23011f56684eb2c7f57073c56d4d2092e55740b2c
                        • Opcode Fuzzy Hash: b0eef3280bc5ef9ee5bfd93cde901b47facdfe894ca5c8ce65be1fc786f50498
                        • Instruction Fuzzy Hash: D941D475A00610AFFF10BF68DC86F6E77A9EB45710F01805CFA5AAB3C2CA799D019791
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                        • String ID:
                        • API String ID: 292994002-0
                        • Opcode ID: 311e1c367294e3c485c1f4ec893f17fa2254f0ccef533b9321dd0bab3b08f740
                        • Instruction ID: 1ba7deae7734fb2d455d73d1a98b37c0ede52b1d5bf3982b8cb10fadf9823130
                        • Opcode Fuzzy Hash: 311e1c367294e3c485c1f4ec893f17fa2254f0ccef533b9321dd0bab3b08f740
                        • Instruction Fuzzy Hash: AA11C4317006116FEB211F2AEC44A2F7BD8FF89761B014829F986DB245CB7D99018AE4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CoInitialize.OLE32(00000000), ref: 00FFC69D
                        • CoCreateInstance.OLE32(01022D6C,00000000,00000001,01022BDC,?), ref: 00FFC6B5
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                        • CoUninitialize.OLE32 ref: 00FFC922
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CreateInitializeInstanceUninitialize_memmove
                        • String ID: .lnk
                        • API String ID: 2683427295-24824748
                        • Opcode ID: abd5fef2d979905f30d4417154f9bc337dbb5f3cd8a08d8b86c94feeba464985
                        • Instruction ID: e3c2b0176a0339dc4f160d9ff9cdfa087c2409b809f692fc076a978335117000
                        • Opcode Fuzzy Hash: abd5fef2d979905f30d4417154f9bc337dbb5f3cd8a08d8b86c94feeba464985
                        • Instruction Fuzzy Hash: 14A12B71108305AFE700EF64CC81EABB7E8EF94714F00491CF196971A1EBB5AA49DB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00FD1D88,?), ref: 0100C312
                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0100C324
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                        • API String ID: 2574300362-1816364905
                        • Opcode ID: c0b34dae0001c83b3ee345021912cfb1d58d0496323b9b7f3e7225cedd58058a
                        • Instruction ID: 2ec5af9c7e59e8f48eee8ecead8390b3e2a3901051ec542ad23908bbe29b5c19
                        • Opcode Fuzzy Hash: c0b34dae0001c83b3ee345021912cfb1d58d0496323b9b7f3e7225cedd58058a
                        • Instruction Fuzzy Hash: 79E08C746107038FFB324E2ED554A4677D4EF09205F8084ADE8C5C6240E778D440CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __itow__swprintf
                        • String ID:
                        • API String ID: 674341424-0
                        • Opcode ID: 3d83d1848baa2dbe14701456fccb0e8a69cd3d9227a8677a50e1a09a9df06460
                        • Instruction ID: 008ffdbd531b9d2361591e580cb3614fc2778c52f8e1912584eb043eb81fadc2
                        • Opcode Fuzzy Hash: 3d83d1848baa2dbe14701456fccb0e8a69cd3d9227a8677a50e1a09a9df06460
                        • Instruction Fuzzy Hash: B822BDB19083019FD724EF18C881B6FB7E5AF85710F04491DF8969B391EB75EA04EB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0100F151
                        • Process32FirstW.KERNEL32(00000000,?), ref: 0100F15F
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                        • Process32NextW.KERNEL32(00000000,?), ref: 0100F21F
                        • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0100F22E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                        • String ID:
                        • API String ID: 2576544623-0
                        • Opcode ID: 8d79dcd0bb9693a40281949594643d8a078aec2e0543def6bf206fae4cfc9ecc
                        • Instruction ID: 6c12df11b6f8f1a61d3f36b3fc1e3f30cbac84a9ba36071fbd639f6052d06c06
                        • Opcode Fuzzy Hash: 8d79dcd0bb9693a40281949594643d8a078aec2e0543def6bf206fae4cfc9ecc
                        • Instruction Fuzzy Hash: C0519D71508301AFE721EF24DC81E6BBBE8FF85710F10481DF595972A1EB78A908DB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00FF40D1
                        • _memset.LIBCMT ref: 00FF40F2
                        • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00FF4144
                        • CloseHandle.KERNEL32(00000000), ref: 00FF414D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CloseControlCreateDeviceFileHandle_memset
                        • String ID:
                        • API String ID: 1157408455-0
                        • Opcode ID: 7b873fed798cf4bea9b83b7629de174c2cfbd12212c9f53b7948fba5ccf0d41a
                        • Instruction ID: 1bb60fa58475e1d5adbdb6a580253ef6090214259fd107fe6652732f44a7547b
                        • Opcode Fuzzy Hash: 7b873fed798cf4bea9b83b7629de174c2cfbd12212c9f53b7948fba5ccf0d41a
                        • Instruction Fuzzy Hash: 2411E775D0122C7AE7309AA5AC4DFEBBB7CEF44760F10429AF908D7190D6784E848BA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00FEEB19
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: lstrlen
                        • String ID: ($|
                        • API String ID: 1659193697-1631851259
                        • Opcode ID: 15f8b260d9bb4b2628c4ada953300dc661916b01cea707a425cf9ab5ac35f8b6
                        • Instruction ID: e09b76aa3e6080976b237e5f3db2e1a5cd2ffc025faa780a032abf65123e1172
                        • Opcode Fuzzy Hash: 15f8b260d9bb4b2628c4ada953300dc661916b01cea707a425cf9ab5ac35f8b6
                        • Instruction Fuzzy Hash: 40324775A007459FC728CF1AD481A6AB7F1FF48320B15C56EE89ADB3A1E770E941CB40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 010026D5
                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0100270C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Internet$AvailableDataFileQueryRead
                        • String ID:
                        • API String ID: 599397726-0
                        • Opcode ID: 80dccd7e9b2cafe0cff79a8b640ab7f21275c069ba2f81021f31aaa904227ed1
                        • Instruction ID: 4462a7f8a8c6e72b4456f5caa56c54ffb44825bf7f6cee8d778b1e905f6c268e
                        • Opcode Fuzzy Hash: 80dccd7e9b2cafe0cff79a8b640ab7f21275c069ba2f81021f31aaa904227ed1
                        • Instruction Fuzzy Hash: 8141F671500609FFFB22DA59CC88EBFB7FCEB44714F0040AAF685A6181DB759E419A50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00FFB5AE
                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00FFB608
                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00FFB655
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorMode$DiskFreeSpace
                        • String ID:
                        • API String ID: 1682464887-0
                        • Opcode ID: 298588dfd0ed562936f8ff5104af66d1d68a00445ec5db3a1ec7d7c3a7a25442
                        • Instruction ID: 654941f5d11d3708eb052dacff3aa36e59c930c6ce73997f36d8d70be8c3e8c9
                        • Opcode Fuzzy Hash: 298588dfd0ed562936f8ff5104af66d1d68a00445ec5db3a1ec7d7c3a7a25442
                        • Instruction Fuzzy Hash: 27219D35A00108EFCB00EFA5D880AAEBBB8FF48310F0480A9E945EB351CB39A915DB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FB0FF6: std::exception::exception.LIBCMT ref: 00FB102C
                          • Part of subcall function 00FB0FF6: __CxxThrowException@8.LIBCMT ref: 00FB1041
                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FE8D0D
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FE8D3A
                        • GetLastError.KERNEL32 ref: 00FE8D47
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                        • String ID:
                        • API String ID: 1922334811-0
                        • Opcode ID: 4b82bcf702adb484939875c1326a2808015b78e7166be07ae4dda77578b38986
                        • Instruction ID: bbfbf994787a7dfd785027023711c04180fb5ce4d4243da4f0096742e312e4d3
                        • Opcode Fuzzy Hash: 4b82bcf702adb484939875c1326a2808015b78e7166be07ae4dda77578b38986
                        • Instruction Fuzzy Hash: 1F11C1B1914209AFD728EF55DC85DABB7FCFB44750B20852EF45A83240EF34AC419B20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00FF4C2C
                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00FF4C43
                        • FreeSid.ADVAPI32(?), ref: 00FF4C53
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AllocateCheckFreeInitializeMembershipToken
                        • String ID:
                        • API String ID: 3429775523-0
                        • Opcode ID: 8365464a8d7a7fd15046fc547af38ff733adb4d19bb012596f78d40a73cc6997
                        • Instruction ID: 694715e3465b00ad1c6b8488604ba6e43175cc4b160e4acfccc8619fa3e17728
                        • Opcode Fuzzy Hash: 8365464a8d7a7fd15046fc547af38ff733adb4d19bb012596f78d40a73cc6997
                        • Instruction Fuzzy Hash: CFF04F7591130DBFDF04DFF0D889ABEB7BCEF08211F004469A601E2180D6796A048B50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c79de08e5ce3b88bba44337a78b1862ea9ab14b0756b51f0599c28ff907a6d38
                        • Instruction ID: 6a4962e04173f67df10e201675ce645dc89caaa3e61a4391e6c746966aa41512
                        • Opcode Fuzzy Hash: c79de08e5ce3b88bba44337a78b1862ea9ab14b0756b51f0599c28ff907a6d38
                        • Instruction Fuzzy Hash: 3422AD75E00215DFEF24DF58C880BAEBBB1FF04310F18816AE9569B351E734A985EB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00FFC966
                        • FindClose.KERNEL32(00000000), ref: 00FFC996
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: c27a806db113b19a196103b106d32eb8eb13ecb0705a59203ffea20e0518b442
                        • Instruction ID: 25a98630bfa76b61f1ddae41fc7e5e49c0cda573e93cc404d795b2b0f546deda
                        • Opcode Fuzzy Hash: c27a806db113b19a196103b106d32eb8eb13ecb0705a59203ffea20e0518b442
                        • Instruction Fuzzy Hash: BD11C4326046149FDB10EF29C845A2EF7E9FF84320F01851EF9A9D72A1DB78AC04DB81
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0100977D,?,0101FB84,?), ref: 00FFA302
                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0100977D,?,0101FB84,?), ref: 00FFA314
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorFormatLastMessage
                        • String ID:
                        • API String ID: 3479602957-0
                        • Opcode ID: d21861763a156f821cb7f9919595cad1dbb9ddf57144bbfadd9d0d760c3eeabf
                        • Instruction ID: ded9bc1df7d962d6248da2e12909bd69d611f39ea3648cc6dd54f0e29192b91b
                        • Opcode Fuzzy Hash: d21861763a156f821cb7f9919595cad1dbb9ddf57144bbfadd9d0d760c3eeabf
                        • Instruction Fuzzy Hash: CBF0E23150432EABEB20AFA4CC48FEA736CBF08361F008155F908D3281D6359914DBE1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FE8851), ref: 00FE8728
                        • CloseHandle.KERNEL32(?,?,00FE8851), ref: 00FE873A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AdjustCloseHandlePrivilegesToken
                        • String ID:
                        • API String ID: 81990902-0
                        • Opcode ID: 11eec700a9f6c4f23e7a0d910454317a9e351a9491a5985504d24f502c6199b9
                        • Instruction ID: 0ddf76e24885efd47b21966c15e373b62e8353ac1971a34ffe3079653ccd5d2b
                        • Opcode Fuzzy Hash: 11eec700a9f6c4f23e7a0d910454317a9e351a9491a5985504d24f502c6199b9
                        • Instruction Fuzzy Hash: 05E0EC76010651EFE7363B61EC09DB77BE9FF043A0724892DF49A80474DB6AAC91EB10
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00FB8F97,?,?,?,00000001), ref: 00FBA39A
                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00FBA3A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: cdacae2c5618557d1393d2f88768d501b482cd304f78aa070c0cc4cfa65fee63
                        • Instruction ID: e0f05faf073ad3a3923c5e5fa775d51f840c21a8a3cee4904f5e6a61fdcae2c1
                        • Opcode Fuzzy Hash: cdacae2c5618557d1393d2f88768d501b482cd304f78aa070c0cc4cfa65fee63
                        • Instruction Fuzzy Hash: 71B0923105420AEBCA102B91E809B883F68FB44BAAF408010F64D84054CBEB54548B91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1b0babee5e4072b4fd2a1c4b026fe22e7e3e261562fc52b9663738700668724c
                        • Instruction ID: c454718569b389f06fa0bfcc4839e8e442df3dd204e6db7b72577f49ce4ea495
                        • Opcode Fuzzy Hash: 1b0babee5e4072b4fd2a1c4b026fe22e7e3e261562fc52b9663738700668724c
                        • Instruction Fuzzy Hash: 32321272D29F014DD7339939D832336A648AFB73D4F25D737E819B5A9AEB29C4831600
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 63d1a90634b24f20aa23999167c806d474d8e57c4cfc750f350ffe12c6186785
                        • Instruction ID: 34ed988b36c7b3b49046c0822d4e8a3d74f2b87f62e5e76dfd2cf10b0173b2fd
                        • Opcode Fuzzy Hash: 63d1a90634b24f20aa23999167c806d474d8e57c4cfc750f350ffe12c6186785
                        • Instruction Fuzzy Hash: CAB1F030E2AF418DD6339A398931336B64CAFBB2D5F61D71BFC6671D16EB2685834240
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __time64.LIBCMT ref: 00FF8B25
                          • Part of subcall function 00FB543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00FF91F8,00000000,?,?,?,?,00FF93A9,00000000,?), ref: 00FB5443
                          • Part of subcall function 00FB543A: __aulldiv.LIBCMT ref: 00FB5463
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Time$FileSystem__aulldiv__time64
                        • String ID:
                        • API String ID: 2893107130-0
                        • Opcode ID: f9a76402f950b4868e70ec1c06bdcbd64b397fd2fb7c88d428da6df9924e2e63
                        • Instruction ID: 14e271cf5e8967dc84ff276ea745c39c4ccaec5ce5622957a710da42ac9ada58
                        • Opcode Fuzzy Hash: f9a76402f950b4868e70ec1c06bdcbd64b397fd2fb7c88d428da6df9924e2e63
                        • Instruction Fuzzy Hash: 8521E472635610CBC729CF25D441B62B3E1EFA4321B688E2CD1E5CB2D0CA79B905DB94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • BlockInput.USER32(00000001), ref: 01004218
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: BlockInput
                        • String ID:
                        • API String ID: 3456056419-0
                        • Opcode ID: 26dee1069e760096566d984d34d5e7d5cbd92ec5f6eedd3fa14d7f6f99ef9f55
                        • Instruction ID: 69f0179aa5088342ffd3a1ef3d8411f965fe5b63fb364020b49e87cbde4645cb
                        • Opcode Fuzzy Hash: 26dee1069e760096566d984d34d5e7d5cbd92ec5f6eedd3fa14d7f6f99ef9f55
                        • Instruction Fuzzy Hash: 9AE048313441155FD710EF5DD844A5AF7D8EF54760F018419FD89C7352DAB5E8408B94
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00FF4F18
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: mouse_event
                        • String ID:
                        • API String ID: 2434400541-0
                        • Opcode ID: e99614c121e532248e2783650fa7912c6ed92cb2fdda1fbe7dca4f2ba6b5523a
                        • Instruction ID: 7b060473d9b8b6f94ae7a3a35399a9200b252e46f492d0d0652d70cddf837d13
                        • Opcode Fuzzy Hash: e99614c121e532248e2783650fa7912c6ed92cb2fdda1fbe7dca4f2ba6b5523a
                        • Instruction Fuzzy Hash: A6D05EB156420D78FE284B24AC0FF771108FB807A1F844989330A876E1D9E97800B434
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00FE88D1), ref: 00FE8CB3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: LogonUser
                        • String ID:
                        • API String ID: 1244722697-0
                        • Opcode ID: 84ebcd8fb24b9595508431e855afdfcd50c115fcc2541c820480c2dcfbb79701
                        • Instruction ID: 122744b433ebcb08f95c47114d23e6face2e78a2f6a847968da9b02631f7128f
                        • Opcode Fuzzy Hash: 84ebcd8fb24b9595508431e855afdfcd50c115fcc2541c820480c2dcfbb79701
                        • Instruction Fuzzy Hash: F6D05E3226050EABEF018EA4DC01EAE3B69EB04B01F408111FE15C50A0C77AD835AF60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetUserNameW.ADVAPI32(?,?), ref: 00FD2242
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID:
                        • API String ID: 2645101109-0
                        • Opcode ID: 51bda89da2352eba1b9d9f8c0f9953770ae11aac059ec9e7621c11783e8b181a
                        • Instruction ID: 45b09728b96073c8c2e6cbab15b63057738c14712bceb8db4af61f926f50a98a
                        • Opcode Fuzzy Hash: 51bda89da2352eba1b9d9f8c0f9953770ae11aac059ec9e7621c11783e8b181a
                        • Instruction Fuzzy Hash: F3C04CF1800109DBDB15DB90D588DEE77BCBB04304F144156A141F2100D7789B449B71
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00FBA36A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: a4a9e3b56d92bbaa17f589da26803c894000140f5d4cb01504f2205dbd686e55
                        • Instruction ID: 6f706cf793e105f839add71619735bbf3e003852f542974d1f45facf7aef3522
                        • Opcode Fuzzy Hash: a4a9e3b56d92bbaa17f589da26803c894000140f5d4cb01504f2205dbd686e55
                        • Instruction Fuzzy Hash: F4A0113000020EAB8A002A82E808888BFACEA002A8B008020F80C80022CBBBA8208A80
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8db3dede2492997226aad41791063291b97dc5e8d8309622fedc853ba727331c
                        • Instruction ID: d24e0246a8e795f3d6bdcd0af1df9568d6c87ec41c7977cc2bfb17b017f331ed
                        • Opcode Fuzzy Hash: 8db3dede2492997226aad41791063291b97dc5e8d8309622fedc853ba727331c
                        • Instruction Fuzzy Hash: 452246F1D01656CBDF288E15C0C077D77A1EF427A8F28446AD8468B291DBB49E92FF60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                        • Instruction ID: 79ce5b8ce149ea66b0c18f1393d53afae3fa37aacad2ba5e402c0732192dbff0
                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                        • Instruction Fuzzy Hash: BDC1943260505309DF6D863BD4341BEBBE16AA27B136A075DE4B3CB9C5EF20D524FA20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                        • Instruction ID: 83dc0a52ab10e2fbfd1928095501dcaaf77e9ea145fa2637c32db0b653e437d7
                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                        • Instruction Fuzzy Hash: 6EC1B43360519309DF6D463B94341BEBBE16BA27B135A076DE4B2DB4D4EF20D524FA20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                        • Instruction ID: bf1b6e01f8c337dcab567efe98938933882e991beefc086d842c2fc38c1fd001
                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                        • Instruction Fuzzy Hash: C6C1653260519309DF6D463B94341BEBBE17AA27B139A076DE4B3CB5D4EF20D524FA20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                        • Instruction ID: 6576c37216f2c47909824e019f3166769cd3015db2156ad97ec74030ae8bb671
                        • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                        • Instruction Fuzzy Hash: 3D41D371D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                        • Instruction ID: debd5da060aea29c13ffe85859cc8ccbde3b7c0a40177c60a00117c21d512fc5
                        • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                        • Instruction Fuzzy Hash: 6D019278A01109EFCB44DF98C6919AEF7B5FB88310F208599D809A7301E730AF41DB80
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                        • Instruction ID: de28c5ade2b7b7b5c4c800b199922627b01b9095fb93459342c3ae958dd3a980
                        • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                        • Instruction Fuzzy Hash: 40019278A01109EFCB48DF98C6919AEF7B5FB48310F208599D809A7301E730AF41DB80
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1689324764.00000000019B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019B0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_19b0000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                        • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                        • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                        • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DeleteObject.GDI32(00000000), ref: 01007B70
                        • DeleteObject.GDI32(00000000), ref: 01007B82
                        • DestroyWindow.USER32 ref: 01007B90
                        • GetDesktopWindow.USER32 ref: 01007BAA
                        • GetWindowRect.USER32(00000000), ref: 01007BB1
                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 01007CF2
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 01007D02
                        • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007D4A
                        • GetClientRect.USER32(00000000,?), ref: 01007D56
                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 01007D90
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007DB2
                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007DC5
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007DD0
                        • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007DD9
                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007DE8
                        • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007DF1
                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007DF8
                        • GlobalFree.KERNEL32(00000000), ref: 01007E03
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007E15
                        • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,01022CAC,00000000), ref: 01007E2B
                        • GlobalFree.KERNEL32(00000000), ref: 01007E3B
                        • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 01007E61
                        • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 01007E80
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01007EA2
                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0100808F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                        • String ID: $AutoIt v3$DISPLAY$static
                        • API String ID: 2211948467-2373415609
                        • Opcode ID: dad2968178a91009f0a9b7cfd43245f67d3f67208a9d45fbcc7d3f7f9446abf4
                        • Instruction ID: aadd03dd8c2479971c8ba8df0f1ba15fd4b45ac4890ec0acff68e5d287d8b11c
                        • Opcode Fuzzy Hash: dad2968178a91009f0a9b7cfd43245f67d3f67208a9d45fbcc7d3f7f9446abf4
                        • Instruction Fuzzy Hash: 5F028271900109EFEB15DFA8CC89EAE7BB9FF48310F048558F9859B295CB79AD00CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharUpperBuffW.USER32(?,?,0101F910), ref: 010138AF
                        • IsWindowVisible.USER32(?), ref: 010138D3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: BuffCharUpperVisibleWindow
                        • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                        • API String ID: 4105515805-45149045
                        • Opcode ID: ef6dc5af72fe4957e4822c6d66b508be9f44b8d6eb6641851d9c7187b5863155
                        • Instruction ID: 7fd4e6ff57b8e64f1d3c58436f35ac59ebbb8265a006d4b3930a0e62ff9bcc01
                        • Opcode Fuzzy Hash: ef6dc5af72fe4957e4822c6d66b508be9f44b8d6eb6641851d9c7187b5863155
                        • Instruction Fuzzy Hash: B0D160702083069BDB14EF25C891AAE7BE5BF94354F00845CB9C65F2E6CF69E90ADF41
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetTextColor.GDI32(?,00000000), ref: 0101A89F
                        • GetSysColorBrush.USER32(0000000F), ref: 0101A8D0
                        • GetSysColor.USER32(0000000F), ref: 0101A8DC
                        • SetBkColor.GDI32(?,000000FF), ref: 0101A8F6
                        • SelectObject.GDI32(?,?), ref: 0101A905
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 0101A930
                        • GetSysColor.USER32(00000010), ref: 0101A938
                        • CreateSolidBrush.GDI32(00000000), ref: 0101A93F
                        • FrameRect.USER32(?,?,00000000), ref: 0101A94E
                        • DeleteObject.GDI32(00000000), ref: 0101A955
                        • InflateRect.USER32(?,000000FE,000000FE), ref: 0101A9A0
                        • FillRect.USER32(?,?,?), ref: 0101A9D2
                        • GetWindowLongW.USER32(?,000000F0), ref: 0101A9FD
                          • Part of subcall function 0101AB60: GetSysColor.USER32(00000012), ref: 0101AB99
                          • Part of subcall function 0101AB60: SetTextColor.GDI32(?,?), ref: 0101AB9D
                          • Part of subcall function 0101AB60: GetSysColorBrush.USER32(0000000F), ref: 0101ABB3
                          • Part of subcall function 0101AB60: GetSysColor.USER32(0000000F), ref: 0101ABBE
                          • Part of subcall function 0101AB60: GetSysColor.USER32(00000011), ref: 0101ABDB
                          • Part of subcall function 0101AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0101ABE9
                          • Part of subcall function 0101AB60: SelectObject.GDI32(?,00000000), ref: 0101ABFA
                          • Part of subcall function 0101AB60: SetBkColor.GDI32(?,00000000), ref: 0101AC03
                          • Part of subcall function 0101AB60: SelectObject.GDI32(?,?), ref: 0101AC10
                          • Part of subcall function 0101AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 0101AC2F
                          • Part of subcall function 0101AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0101AC46
                          • Part of subcall function 0101AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 0101AC5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                        • String ID:
                        • API String ID: 4124339563-0
                        • Opcode ID: 44da9c20ccced51113b5f5c7a7ec999eebd2aba99f0e9572f68043be5dc7261c
                        • Instruction ID: e65518167bcd3dceff700e3e203d6c903e9eaec1af14e65ea033b48efe2f287b
                        • Opcode Fuzzy Hash: 44da9c20ccced51113b5f5c7a7ec999eebd2aba99f0e9572f68043be5dc7261c
                        • Instruction Fuzzy Hash: 29A1AE72109342EFD7219F64DC08A6B7BE9FF89321F100A19FAA297195D73ED848CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DestroyWindow.USER32(?,?,?), ref: 00F92CA2
                        • DeleteObject.GDI32(00000000), ref: 00F92CE8
                        • DeleteObject.GDI32(00000000), ref: 00F92CF3
                        • DestroyIcon.USER32(00000000,?,?,?), ref: 00F92CFE
                        • DestroyWindow.USER32(00000000,?,?,?), ref: 00F92D09
                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00FCC68B
                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00FCC6C4
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00FCCAED
                          • Part of subcall function 00F91B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F92036,?,00000000,?,?,?,?,00F916CB,00000000,?), ref: 00F91B9A
                        • SendMessageW.USER32(?,00001053), ref: 00FCCB2A
                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00FCCB41
                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00FCCB57
                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00FCCB62
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                        • String ID: 0
                        • API String ID: 464785882-4108050209
                        • Opcode ID: 8417b8b9c80a48cd027eece272b2251d7ddfbc2744826c9fc47924c8b8c787c9
                        • Instruction ID: d7b590f186efc4abfcae3feb354da245d4db083e070126bee3431c18c97fa5a4
                        • Opcode Fuzzy Hash: 8417b8b9c80a48cd027eece272b2251d7ddfbc2744826c9fc47924c8b8c787c9
                        • Instruction Fuzzy Hash: 7812AC30A00202AFDB65CF24C989FA9BBE5FF44320F54456DE589DB652C735EC45EB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DestroyWindow.USER32(00000000), ref: 010077F1
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 010078B0
                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 010078EE
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 01007900
                        • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 01007946
                        • GetClientRect.USER32(00000000,?), ref: 01007952
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 01007996
                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 010079A5
                        • GetStockObject.GDI32(00000011), ref: 010079B5
                        • SelectObject.GDI32(00000000,00000000), ref: 010079B9
                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 010079C9
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 010079D2
                        • DeleteDC.GDI32(00000000), ref: 010079DB
                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 01007A07
                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 01007A1E
                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 01007A59
                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 01007A6D
                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 01007A7E
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 01007AAE
                        • GetStockObject.GDI32(00000011), ref: 01007AB9
                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 01007AC4
                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 01007ACE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                        • API String ID: 2910397461-517079104
                        • Opcode ID: 51aafd0bba76ed73060b72f135f7c0ceec6aad2bca05f50c8c30e35376320add
                        • Instruction ID: c4b6bda5995e3090c9582da280ddbbf71dc5e7074906281d83ed33599912d442
                        • Opcode Fuzzy Hash: 51aafd0bba76ed73060b72f135f7c0ceec6aad2bca05f50c8c30e35376320add
                        • Instruction Fuzzy Hash: 94A17171A40605BFEB24DBA8DC4AFAF7BB9EB44710F004118FA55A72D0D7B9AD44CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00FFAF89
                        • GetDriveTypeW.KERNEL32(?,0101FAC0,?,\\.\,0101F910), ref: 00FFB066
                        • SetErrorMode.KERNEL32(00000000,0101FAC0,?,\\.\,0101F910), ref: 00FFB1C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorMode$DriveType
                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                        • API String ID: 2907320926-4222207086
                        • Opcode ID: 431b6dd99346c0120097e38257b49bedbea0b8d05b964f629c149e0b8a6b600f
                        • Instruction ID: 704cf5c590c5248adc4a2634f8c2f383256024c6050e42b6881ae63e165e2852
                        • Opcode Fuzzy Hash: 431b6dd99346c0120097e38257b49bedbea0b8d05b964f629c149e0b8a6b600f
                        • Instruction Fuzzy Hash: 35518D71BC430EEB9B14EF11CD92AB973B0BF547557204029E64BAB270CB69AD41FB41
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __wcsnicmp
                        • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                        • API String ID: 1038674560-86951937
                        • Opcode ID: d27931bcf598941a0fb2fc2b073649533849c86fdc8864b96fd1ce9081580b07
                        • Instruction ID: b5108b49dee36b119da2b2ce2c65159754775287825dfc1c0844dc989220ce81
                        • Opcode Fuzzy Hash: d27931bcf598941a0fb2fc2b073649533849c86fdc8864b96fd1ce9081580b07
                        • Instruction Fuzzy Hash: 178139B1A40316ABEF21BF61CD93FAE7758AF14710F044028FD45EA192EB68DA45F690
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetSysColor.USER32(00000012), ref: 0101AB99
                        • SetTextColor.GDI32(?,?), ref: 0101AB9D
                        • GetSysColorBrush.USER32(0000000F), ref: 0101ABB3
                        • GetSysColor.USER32(0000000F), ref: 0101ABBE
                        • CreateSolidBrush.GDI32(?), ref: 0101ABC3
                        • GetSysColor.USER32(00000011), ref: 0101ABDB
                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0101ABE9
                        • SelectObject.GDI32(?,00000000), ref: 0101ABFA
                        • SetBkColor.GDI32(?,00000000), ref: 0101AC03
                        • SelectObject.GDI32(?,?), ref: 0101AC10
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 0101AC2F
                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0101AC46
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 0101AC5B
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0101ACA7
                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0101ACCE
                        • InflateRect.USER32(?,000000FD,000000FD), ref: 0101ACEC
                        • DrawFocusRect.USER32(?,?), ref: 0101ACF7
                        • GetSysColor.USER32(00000011), ref: 0101AD05
                        • SetTextColor.GDI32(?,00000000), ref: 0101AD0D
                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0101AD21
                        • SelectObject.GDI32(?,0101A869), ref: 0101AD38
                        • DeleteObject.GDI32(?), ref: 0101AD43
                        • SelectObject.GDI32(?,?), ref: 0101AD49
                        • DeleteObject.GDI32(?), ref: 0101AD4E
                        • SetTextColor.GDI32(?,?), ref: 0101AD54
                        • SetBkColor.GDI32(?,?), ref: 0101AD5E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                        • String ID:
                        • API String ID: 1996641542-0
                        • Opcode ID: 05ad0975739cbf988ed14fd8edcfd113301d49b00ebc0681f4a1a8f3f1baece6
                        • Instruction ID: d4f909597d13e4ab68079fa561ffee068a328cc8b499b2a2c9d568364a54a6b4
                        • Opcode Fuzzy Hash: 05ad0975739cbf988ed14fd8edcfd113301d49b00ebc0681f4a1a8f3f1baece6
                        • Instruction Fuzzy Hash: F6619D71901209EFDF219FA8DC48EAE7BB9FB08320F104515FA55AB295D77A9940CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 01018D34
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01018D45
                        • CharNextW.USER32(0000014E), ref: 01018D74
                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 01018DB5
                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 01018DCB
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01018DDC
                        • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 01018DF9
                        • SetWindowTextW.USER32(?,0000014E), ref: 01018E45
                        • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 01018E5B
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 01018E8C
                        • _memset.LIBCMT ref: 01018EB1
                        • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 01018EFA
                        • _memset.LIBCMT ref: 01018F59
                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 01018F83
                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 01018FDB
                        • SendMessageW.USER32(?,0000133D,?,?), ref: 01019088
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 010190AA
                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 010190F4
                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01019121
                        • DrawMenuBar.USER32(?), ref: 01019130
                        • SetWindowTextW.USER32(?,0000014E), ref: 01019158
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                        • String ID: 0
                        • API String ID: 1073566785-4108050209
                        • Opcode ID: 12576055ccb0abb2689d778daa5bbe17b163bcba4ff9421928e2aa8b257ba8e3
                        • Instruction ID: 003078d70a87999e72ae6308af7dc1d2fbba57684a7e9b8843a6e77b1774e389
                        • Opcode Fuzzy Hash: 12576055ccb0abb2689d778daa5bbe17b163bcba4ff9421928e2aa8b257ba8e3
                        • Instruction Fuzzy Hash: A0E1C370900209ABDF20DF65CC84EEE7BB9FF05714F40819AFA959A298D7798A85CF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCursorPos.USER32(?), ref: 01014C51
                        • GetDesktopWindow.USER32 ref: 01014C66
                        • GetWindowRect.USER32(00000000), ref: 01014C6D
                        • GetWindowLongW.USER32(?,000000F0), ref: 01014CCF
                        • DestroyWindow.USER32(?), ref: 01014CFB
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 01014D24
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 01014D42
                        • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 01014D68
                        • SendMessageW.USER32(?,00000421,?,?), ref: 01014D7D
                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 01014D90
                        • IsWindowVisible.USER32(?), ref: 01014DB0
                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 01014DCB
                        • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 01014DDF
                        • GetWindowRect.USER32(?,?), ref: 01014DF7
                        • MonitorFromPoint.USER32(?,?,00000002), ref: 01014E1D
                        • GetMonitorInfoW.USER32(00000000,?), ref: 01014E37
                        • CopyRect.USER32(?,?), ref: 01014E4E
                        • SendMessageW.USER32(?,00000412,00000000), ref: 01014EB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                        • String ID: ($0$tooltips_class32
                        • API String ID: 698492251-4156429822
                        • Opcode ID: 51286fa271a0fb5f10d686d57e9fcae958113efe36ec509585da129d4d78e8d2
                        • Instruction ID: 1ac0527cadc228f7d4fe6d218f477480a6a91eef28e9e46a71d4abd572c113de
                        • Opcode Fuzzy Hash: 51286fa271a0fb5f10d686d57e9fcae958113efe36ec509585da129d4d78e8d2
                        • Instruction Fuzzy Hash: 0CB17A71608341AFDB54DF68C884B6ABBE4BF88314F00891DF5D9DB2A5D779E804CB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F928BC
                        • GetSystemMetrics.USER32(00000007), ref: 00F928C4
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F928EF
                        • GetSystemMetrics.USER32(00000008), ref: 00F928F7
                        • GetSystemMetrics.USER32(00000004), ref: 00F9291C
                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F92939
                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F92949
                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F9297C
                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F92990
                        • GetClientRect.USER32(00000000,000000FF), ref: 00F929AE
                        • GetStockObject.GDI32(00000011), ref: 00F929CA
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F929D5
                          • Part of subcall function 00F92344: GetCursorPos.USER32(?), ref: 00F92357
                          • Part of subcall function 00F92344: ScreenToClient.USER32(010567B0,?), ref: 00F92374
                          • Part of subcall function 00F92344: GetAsyncKeyState.USER32(00000001), ref: 00F92399
                          • Part of subcall function 00F92344: GetAsyncKeyState.USER32(00000002), ref: 00F923A7
                        • SetTimer.USER32(00000000,00000000,00000028,00F91256), ref: 00F929FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                        • String ID: AutoIt v3 GUI
                        • API String ID: 1458621304-248962490
                        • Opcode ID: 3b1c5a51be25ddf01b76c5834d751da671dd26e7da318cca8a2b92fabb73eeab
                        • Instruction ID: 38e5ac7abb32f04b89374ebb2c822fcfdd15d59c14defb6a922aa7610c08eee9
                        • Opcode Fuzzy Hash: 3b1c5a51be25ddf01b76c5834d751da671dd26e7da318cca8a2b92fabb73eeab
                        • Instruction Fuzzy Hash: 71B16071A0020AEFEF24DFA8D945FAE7BB4FB48310F108219FA55E7294DB799841DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 010140F6
                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 010141B6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: BuffCharMessageSendUpper
                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                        • API String ID: 3974292440-719923060
                        • Opcode ID: 48a36d26e4996f54a37be41864bf9f82900d2fceb6db51025a0d8f37a0deba33
                        • Instruction ID: b765a54ad2fc42f8eae9eeef3ca7224c3bd94e142c234d42a0baf4827ad742de
                        • Opcode Fuzzy Hash: 48a36d26e4996f54a37be41864bf9f82900d2fceb6db51025a0d8f37a0deba33
                        • Instruction Fuzzy Hash: 9DA19F702143029BDB14EF24CC91A6EB7E5BF84314F04896CB8D69B2E6DB78E805DB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadCursorW.USER32(00000000,00007F89), ref: 01005309
                        • LoadCursorW.USER32(00000000,00007F8A), ref: 01005314
                        • LoadCursorW.USER32(00000000,00007F00), ref: 0100531F
                        • LoadCursorW.USER32(00000000,00007F03), ref: 0100532A
                        • LoadCursorW.USER32(00000000,00007F8B), ref: 01005335
                        • LoadCursorW.USER32(00000000,00007F01), ref: 01005340
                        • LoadCursorW.USER32(00000000,00007F81), ref: 0100534B
                        • LoadCursorW.USER32(00000000,00007F88), ref: 01005356
                        • LoadCursorW.USER32(00000000,00007F80), ref: 01005361
                        • LoadCursorW.USER32(00000000,00007F86), ref: 0100536C
                        • LoadCursorW.USER32(00000000,00007F83), ref: 01005377
                        • LoadCursorW.USER32(00000000,00007F85), ref: 01005382
                        • LoadCursorW.USER32(00000000,00007F82), ref: 0100538D
                        • LoadCursorW.USER32(00000000,00007F84), ref: 01005398
                        • LoadCursorW.USER32(00000000,00007F04), ref: 010053A3
                        • LoadCursorW.USER32(00000000,00007F02), ref: 010053AE
                        • GetCursorInfo.USER32(?), ref: 010053BE
                        • GetLastError.KERNEL32(00000001,00000000), ref: 010053E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Cursor$Load$ErrorInfoLast
                        • String ID:
                        • API String ID: 3215588206-0
                        • Opcode ID: e00e9f20b711be2ea56a1d315d1b352ca7afb61c059346f1ffc5d05fc4b92a9c
                        • Instruction ID: ca86a2d71d50dd5500dec43f68510de5010750b9532ec653ec9ff88c7142e0c7
                        • Opcode Fuzzy Hash: e00e9f20b711be2ea56a1d315d1b352ca7afb61c059346f1ffc5d05fc4b92a9c
                        • Instruction Fuzzy Hash: 46415370E083196ADB109FBA8C4996EFFF8EF51B50F10452FA549E72D0DAB894018F51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetClassNameW.USER32(?,?,00000100), ref: 00FEAAA5
                        • __swprintf.LIBCMT ref: 00FEAB46
                        • _wcscmp.LIBCMT ref: 00FEAB59
                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00FEABAE
                        • _wcscmp.LIBCMT ref: 00FEABEA
                        • GetClassNameW.USER32(?,?,00000400), ref: 00FEAC21
                        • GetDlgCtrlID.USER32(?), ref: 00FEAC73
                        • GetWindowRect.USER32(?,?), ref: 00FEACA9
                        • GetParent.USER32(?), ref: 00FEACC7
                        • ScreenToClient.USER32(00000000), ref: 00FEACCE
                        • GetClassNameW.USER32(?,?,00000100), ref: 00FEAD48
                        • _wcscmp.LIBCMT ref: 00FEAD5C
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00FEAD82
                        • _wcscmp.LIBCMT ref: 00FEAD96
                          • Part of subcall function 00FB386C: _iswctype.LIBCMT ref: 00FB3874
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                        • String ID: %s%u
                        • API String ID: 3744389584-679674701
                        • Opcode ID: 6e7cb93c4fd1250f970daa7224b61fea36aa6b99d764a3cbf37d1612fafd1905
                        • Instruction ID: 0002e074404243230761cafd52bfa6e0a1a80f8b82ebdecd2f8f2638930f7a7a
                        • Opcode Fuzzy Hash: 6e7cb93c4fd1250f970daa7224b61fea36aa6b99d764a3cbf37d1612fafd1905
                        • Instruction Fuzzy Hash: CEA1E371604386AFD724DE26CC84BEAB7E8FF44325F104629F9A9C2190D734F945EB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetClassNameW.USER32(00000008,?,00000400), ref: 00FEB3DB
                        • _wcscmp.LIBCMT ref: 00FEB3EC
                        • GetWindowTextW.USER32(00000001,?,00000400), ref: 00FEB414
                        • CharUpperBuffW.USER32(?,00000000), ref: 00FEB431
                        • _wcscmp.LIBCMT ref: 00FEB44F
                        • _wcsstr.LIBCMT ref: 00FEB460
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00FEB498
                        • _wcscmp.LIBCMT ref: 00FEB4A8
                        • GetWindowTextW.USER32(00000002,?,00000400), ref: 00FEB4CF
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00FEB518
                        • _wcscmp.LIBCMT ref: 00FEB528
                        • GetClassNameW.USER32(00000010,?,00000400), ref: 00FEB550
                        • GetWindowRect.USER32(00000004,?), ref: 00FEB5B9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                        • String ID: @$ThumbnailClass
                        • API String ID: 1788623398-1539354611
                        • Opcode ID: a77cd90bee835fe8d6f9cd9f15f1f8c7608108989c71f46cd3543ca75d1b6dd5
                        • Instruction ID: 85e8babdbc84ba8e29706989378274f1135885333574febf61c0bd7b0c35f3eb
                        • Opcode Fuzzy Hash: a77cd90bee835fe8d6f9cd9f15f1f8c7608108989c71f46cd3543ca75d1b6dd5
                        • Instruction Fuzzy Hash: 7981C0714083859BDB10DF12C885FAB7BE8FF44324F088569FD859A096DB38DD49EB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __wcsnicmp
                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                        • API String ID: 1038674560-1810252412
                        • Opcode ID: 71133cace0d6eea5668a2b84e8e2f9f4f15b5efe25544e4fa638fd189f4e9b80
                        • Instruction ID: 895796a47b16bdb71a50d9b6c3b82ef0ad6647f797e51d8fec103a0cf3723895
                        • Opcode Fuzzy Hash: 71133cace0d6eea5668a2b84e8e2f9f4f15b5efe25544e4fa638fd189f4e9b80
                        • Instruction Fuzzy Hash: 0131C371A44345A7EF11FA62CD83EEF77A8AF18B50F600039B581750D2EF696E04EA51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadIconW.USER32(00000063), ref: 00FEC4D4
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00FEC4E6
                        • SetWindowTextW.USER32(?,?), ref: 00FEC4FD
                        • GetDlgItem.USER32(?,000003EA), ref: 00FEC512
                        • SetWindowTextW.USER32(00000000,?), ref: 00FEC518
                        • GetDlgItem.USER32(?,000003E9), ref: 00FEC528
                        • SetWindowTextW.USER32(00000000,?), ref: 00FEC52E
                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00FEC54F
                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00FEC569
                        • GetWindowRect.USER32(?,?), ref: 00FEC572
                        • SetWindowTextW.USER32(?,?), ref: 00FEC5DD
                        • GetDesktopWindow.USER32 ref: 00FEC5E3
                        • GetWindowRect.USER32(00000000), ref: 00FEC5EA
                        • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00FEC636
                        • GetClientRect.USER32(?,?), ref: 00FEC643
                        • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00FEC668
                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00FEC693
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                        • String ID:
                        • API String ID: 3869813825-0
                        • Opcode ID: 5ffb7d038e1a9b283a8a84cf1438648fcc3328e618f9c0b2448d027963d129fb
                        • Instruction ID: ef63b20b714a54d45c19e1c6b1fc5facd7d6b03bb08e682d48a8ea6c3b7303ed
                        • Opcode Fuzzy Hash: 5ffb7d038e1a9b283a8a84cf1438648fcc3328e618f9c0b2448d027963d129fb
                        • Instruction Fuzzy Hash: 60518D3190070AAFDB20DFA9DD89B6FBBB5FF04704F004918F686A25A0C779A905DB40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 0101A4C8
                        • DestroyWindow.USER32(?,?), ref: 0101A542
                          • Part of subcall function 00F97D2C: _memmove.LIBCMT ref: 00F97D66
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0101A5BC
                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0101A5DE
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0101A5F1
                        • DestroyWindow.USER32(00000000), ref: 0101A613
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F90000,00000000), ref: 0101A64A
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0101A663
                        • GetDesktopWindow.USER32 ref: 0101A67C
                        • GetWindowRect.USER32(00000000), ref: 0101A683
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0101A69B
                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0101A6B3
                          • Part of subcall function 00F925DB: GetWindowLongW.USER32(?,000000EB), ref: 00F925EC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                        • String ID: 0$tooltips_class32
                        • API String ID: 1297703922-3619404913
                        • Opcode ID: a9cb111720452f0d9ed2e93e8199c23ba75181a1fc6610932843a0ac87704a9b
                        • Instruction ID: 5302dfd76f99c7755b90955b3cfff4b02a5e1ff50e89a5f1e98be634b44266f5
                        • Opcode Fuzzy Hash: a9cb111720452f0d9ed2e93e8199c23ba75181a1fc6610932843a0ac87704a9b
                        • Instruction Fuzzy Hash: DD718A70240345AFE720DF28C849F6A7BE5FB88300F444A1DF985872A5D77AE906CB21
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                        • DragQueryPoint.SHELL32(?,?), ref: 0101C917
                          • Part of subcall function 0101ADF1: ClientToScreen.USER32(?,?), ref: 0101AE1A
                          • Part of subcall function 0101ADF1: GetWindowRect.USER32(?,?), ref: 0101AE90
                          • Part of subcall function 0101ADF1: PtInRect.USER32(?,?,0101C304), ref: 0101AEA0
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0101C980
                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0101C98B
                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0101C9AE
                        • _wcscat.LIBCMT ref: 0101C9DE
                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0101C9F5
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0101CA0E
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0101CA25
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 0101CA47
                        • DragFinish.SHELL32(?), ref: 0101CA4E
                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0101CB41
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                        • API String ID: 169749273-3440237614
                        • Opcode ID: 4aaad98042f2eeda8bb81fa6f746f5f17ff3b040c503a1f25c7a43c9dad27602
                        • Instruction ID: 75bbbf8426d5d052a5148df7c17cd9d5e6186fb4d188e8105bf27aadf7280cfa
                        • Opcode Fuzzy Hash: 4aaad98042f2eeda8bb81fa6f746f5f17ff3b040c503a1f25c7a43c9dad27602
                        • Instruction Fuzzy Hash: D4618A71108301AFEB11EF64DC85D9FBBE8FF89750F000A1EF592961A1DB799A09CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 010146AB
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 010146F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: BuffCharMessageSendUpper
                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                        • API String ID: 3974292440-4258414348
                        • Opcode ID: 961bc93b967189265556d6b9fe0ecc7ef5428443e2c857f2a8e0535d83d586c5
                        • Instruction ID: 770265d0fe3bc7a40df3fcfc4adb14ac4bfd73272dfec784e0e45e082e80f4f4
                        • Opcode Fuzzy Hash: 961bc93b967189265556d6b9fe0ecc7ef5428443e2c857f2a8e0535d83d586c5
                        • Instruction Fuzzy Hash: 259172742043029BDB14EF25C851A6EB7E1BF98314F04845CB8D69B3A6CB7DED09DB41
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F99997: __itow.LIBCMT ref: 00F999C2
                          • Part of subcall function 00F99997: __swprintf.LIBCMT ref: 00F99A0C
                        • CharLowerBuffW.USER32(?,?), ref: 00FFA636
                        • GetDriveTypeW.KERNEL32 ref: 00FFA683
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFA6CB
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFA702
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FFA730
                          • Part of subcall function 00F97D2C: _memmove.LIBCMT ref: 00F97D66
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                        • API String ID: 2698844021-4113822522
                        • Opcode ID: 244078654f522526a708ffe2f18d92f3b1cb1cf2c0f7e6a730f8d06d10c6e07d
                        • Instruction ID: 5db2098a81f99591c9389f3221f2aa3299fbacc8e583c232c8034bf7afa3642e
                        • Opcode Fuzzy Hash: 244078654f522526a708ffe2f18d92f3b1cb1cf2c0f7e6a730f8d06d10c6e07d
                        • Instruction Fuzzy Hash: 6E514CB15083059FDB00EF25CC8196AB7F4FF88718F00496DF89A97261DB39AE09DB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00FFA47A
                        • __swprintf.LIBCMT ref: 00FFA49C
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FFA4D9
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00FFA4FE
                        • _memset.LIBCMT ref: 00FFA51D
                        • _wcsncpy.LIBCMT ref: 00FFA559
                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00FFA58E
                        • CloseHandle.KERNEL32(00000000), ref: 00FFA599
                        • RemoveDirectoryW.KERNEL32(?), ref: 00FFA5A2
                        • CloseHandle.KERNEL32(00000000), ref: 00FFA5AC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                        • String ID: :$\$\??\%s
                        • API String ID: 2733774712-3457252023
                        • Opcode ID: 8974ce09400d4138be0becc9dba19347dab0b310fb9f9d5ae4ae5f1a344fc8bf
                        • Instruction ID: a602ee4572391441a00e05e4a7a2431d5348934b546552a36ceb365d2b9fb5ee
                        • Opcode Fuzzy Hash: 8974ce09400d4138be0becc9dba19347dab0b310fb9f9d5ae4ae5f1a344fc8bf
                        • Instruction Fuzzy Hash: 7731A2B190010AABDB21DFA1DC49FFB73BCEF88711F1441A6F608D6164E77896449B25
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                        • String ID:
                        • API String ID: 884005220-0
                        • Opcode ID: 94298d275bf3ae9417357ae7ed977c6de27b793c89bd7614d906b475653d32e0
                        • Instruction ID: 8e39a0bd86aec17fb7657fd92bcb455e33286af71000a94f8c0b8b96c5c191c6
                        • Opcode Fuzzy Hash: 94298d275bf3ae9417357ae7ed977c6de27b793c89bd7614d906b475653d32e0
                        • Instruction Fuzzy Hash: E361E57290020BAFDB209F24EE43FA977A9EB51379F10415DE801DB185EB39EC41EB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0101C4EC
                        • GetFocus.USER32 ref: 0101C4FC
                        • GetDlgCtrlID.USER32(00000000), ref: 0101C507
                        • _memset.LIBCMT ref: 0101C632
                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0101C65D
                        • GetMenuItemCount.USER32(?), ref: 0101C67D
                        • GetMenuItemID.USER32(?,00000000), ref: 0101C690
                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0101C6C4
                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0101C70C
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0101C744
                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0101C779
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                        • String ID: 0
                        • API String ID: 1296962147-4108050209
                        • Opcode ID: 5999fd40e570fa86874899b8d7f94bb521abcc0a6974e67634eaee8607e59e31
                        • Instruction ID: 0e612ace392e15ce87ae75dd348a12428ef8ab02573781e2a56d101f237c35fd
                        • Opcode Fuzzy Hash: 5999fd40e570fa86874899b8d7f94bb521abcc0a6974e67634eaee8607e59e31
                        • Instruction Fuzzy Hash: B281A0702483019FE761DF28CA84AAFBBE8FB88354F00095DF9D593295D779D905CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FE874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE8766
                          • Part of subcall function 00FE874A: GetLastError.KERNEL32(?,00FE822A,?,?,?), ref: 00FE8770
                          • Part of subcall function 00FE874A: GetProcessHeap.KERNEL32(00000008,?,?,00FE822A,?,?,?), ref: 00FE877F
                          • Part of subcall function 00FE874A: HeapAlloc.KERNEL32(00000000,?,00FE822A,?,?,?), ref: 00FE8786
                          • Part of subcall function 00FE874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE879D
                          • Part of subcall function 00FE87E7: GetProcessHeap.KERNEL32(00000008,00FE8240,00000000,00000000,?,00FE8240,?), ref: 00FE87F3
                          • Part of subcall function 00FE87E7: HeapAlloc.KERNEL32(00000000,?,00FE8240,?), ref: 00FE87FA
                          • Part of subcall function 00FE87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FE8240,?), ref: 00FE880B
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FE8458
                        • _memset.LIBCMT ref: 00FE846D
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FE848C
                        • GetLengthSid.ADVAPI32(?), ref: 00FE849D
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00FE84DA
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FE84F6
                        • GetLengthSid.ADVAPI32(?), ref: 00FE8513
                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FE8522
                        • HeapAlloc.KERNEL32(00000000), ref: 00FE8529
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FE854A
                        • CopySid.ADVAPI32(00000000), ref: 00FE8551
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FE8582
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FE85A8
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FE85BC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                        • String ID:
                        • API String ID: 3996160137-0
                        • Opcode ID: 2189fea2c4a506958c8b23fceaa25bca836137d6890dcb1574a5723d1fe1a70c
                        • Instruction ID: 17eceb4570aa3e8f5578aded05c9fc031fd04c7454700571caf46e563af1f0b5
                        • Opcode Fuzzy Hash: 2189fea2c4a506958c8b23fceaa25bca836137d6890dcb1574a5723d1fe1a70c
                        • Instruction Fuzzy Hash: 6E615D7190024AAFDF11EF91DC44AEEBBB9FF04360F048119F919A7290DB399A05DF60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetDC.USER32(00000000), ref: 010076A2
                        • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 010076AE
                        • CreateCompatibleDC.GDI32(?), ref: 010076BA
                        • SelectObject.GDI32(00000000,?), ref: 010076C7
                        • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 0100771B
                        • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 01007757
                        • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 0100777B
                        • SelectObject.GDI32(00000006,?), ref: 01007783
                        • DeleteObject.GDI32(?), ref: 0100778C
                        • DeleteDC.GDI32(00000006), ref: 01007793
                        • ReleaseDC.USER32(00000000,?), ref: 0100779E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                        • String ID: (
                        • API String ID: 2598888154-3887548279
                        • Opcode ID: 8c9fb87585a71efb97db370bb7f4047eaf36dd802fe216921f154f9d50d98179
                        • Instruction ID: 5e894a71c42d284159b8f0045c63d06affce7c4fb32e6f9d13d92aa61d23ca80
                        • Opcode Fuzzy Hash: 8c9fb87585a71efb97db370bb7f4047eaf36dd802fe216921f154f9d50d98179
                        • Instruction Fuzzy Hash: A9514D75900209EFDB25CFA8CC84EAEBBB9FF48710F14851DF99A97250D739A944CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,0101FB78), ref: 00FFA0FC
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                        • LoadStringW.USER32(?,?,00000FFF,?), ref: 00FFA11E
                        • __swprintf.LIBCMT ref: 00FFA177
                        • __swprintf.LIBCMT ref: 00FFA190
                        • _wprintf.LIBCMT ref: 00FFA246
                        • _wprintf.LIBCMT ref: 00FFA264
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: LoadString__swprintf_wprintf$_memmove
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                        • API String ID: 311963372-2391861430
                        • Opcode ID: 465bbd44a61bd13669cde06ad42d84ec85591a9750e0f849ca8044c481d0edbf
                        • Instruction ID: e35d344e2c6c0acbca4db39e6021f0101d19fab0b934e8e2d4b4d768e3975a16
                        • Opcode Fuzzy Hash: 465bbd44a61bd13669cde06ad42d84ec85591a9750e0f849ca8044c481d0edbf
                        • Instruction Fuzzy Hash: 6B516C72904309ABDF15FBE1CD86EEEB778AF08700F500165B505721A1EB3A6F58EB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FB0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00F96C6C,?,00008000), ref: 00FB0BB7
                          • Part of subcall function 00F948AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F948A1,?,?,00F937C0,?), ref: 00F948CE
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F96D0D
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F96E5A
                          • Part of subcall function 00F959CD: _wcscpy.LIBCMT ref: 00F95A05
                          • Part of subcall function 00FB387D: _iswctype.LIBCMT ref: 00FB3885
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                        • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                        • API String ID: 537147316-1018226102
                        • Opcode ID: 2b4b4aae95376d8b385fa09ef9d269241cd91a6c62e1e039ee0b9262950bfc25
                        • Instruction ID: a92e1f9d739e5d9b34cd82840d16bbecb458e5a32e976751569519d0af0fce36
                        • Opcode Fuzzy Hash: 2b4b4aae95376d8b385fa09ef9d269241cd91a6c62e1e039ee0b9262950bfc25
                        • Instruction Fuzzy Hash: DC02BE315083419FDB24EF24C881EAFBBE5BF98714F14091DF486972A1DB38D949EB42
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00F945F9
                        • GetMenuItemCount.USER32(01056890), ref: 00FCD7CD
                        • GetMenuItemCount.USER32(01056890), ref: 00FCD87D
                        • GetCursorPos.USER32(?), ref: 00FCD8C1
                        • SetForegroundWindow.USER32(00000000), ref: 00FCD8CA
                        • TrackPopupMenuEx.USER32(01056890,00000000,?,00000000,00000000,00000000), ref: 00FCD8DD
                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00FCD8E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                        • String ID:
                        • API String ID: 2751501086-0
                        • Opcode ID: f4537785e72ca69a083cd15917cbae6ea839056fdd5d317123a48963e7418c8e
                        • Instruction ID: 5f50d03ee9cf5c2369b5009477d26da6cf2c4a6772a89289d17882e3bb98eb09
                        • Opcode Fuzzy Hash: f4537785e72ca69a083cd15917cbae6ea839056fdd5d317123a48963e7418c8e
                        • Instruction Fuzzy Hash: 7F71E571A4020ABAFB219F54DD86FAEBF65FF05364F10022AF618A61D1C7B56814EB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,01010038,?,?), ref: 010110BC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: BuffCharUpper
                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                        • API String ID: 3964851224-909552448
                        • Opcode ID: 9af12d63d28acb5e7b648c1b7910d6e7c766a0d4becce1f770b8dd7b199bfbbd
                        • Instruction ID: f5a0e669cb9551b8a94996324133db14ec2372f9db55bc5e14e41cfeb0b3d7f0
                        • Opcode Fuzzy Hash: 9af12d63d28acb5e7b648c1b7910d6e7c766a0d4becce1f770b8dd7b199bfbbd
                        • Instruction Fuzzy Hash: F0414AB011024A9BDF19EEA4DC81AEE3764BF09300F404454FDD15B29ADB78E91ADB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97D2C: _memmove.LIBCMT ref: 00F97D66
                          • Part of subcall function 00F97A84: _memmove.LIBCMT ref: 00F97B0D
                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00FF55D2
                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00FF55E8
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FF55F9
                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00FF560B
                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00FF561C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: SendString$_memmove
                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                        • API String ID: 2279737902-1007645807
                        • Opcode ID: 6784220ff4b693e4f037bea77d15297ced341120cbd738a2266b9ddad130b2f1
                        • Instruction ID: b6cc5aec95ed518538a2e486f014d1f6350455c19134a9095542bc1a5807275c
                        • Opcode Fuzzy Hash: 6784220ff4b693e4f037bea77d15297ced341120cbd738a2266b9ddad130b2f1
                        • Instruction Fuzzy Hash: 1911CB71AA026DBAEB20B762CC85DFF7B7CEF91F00F4044297551970A1EEA41D05D5A0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                        • String ID: 0.0.0.0
                        • API String ID: 208665112-3771769585
                        • Opcode ID: 987f5f7ede1f1d2be1c703cd11213a08aeefa380bed733b0cc0cd2c5762efab2
                        • Instruction ID: c3a1c9663dd94a8ac9ca0c63491155168795e3e6c0627fcce4f7325686b5af4b
                        • Opcode Fuzzy Hash: 987f5f7ede1f1d2be1c703cd11213a08aeefa380bed733b0cc0cd2c5762efab2
                        • Instruction Fuzzy Hash: 23112B31A04119AFCB30EB25DC45EFB77BCDF00720F0401B5F55496065EFB9AA85AB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • timeGetTime.WINMM ref: 00FF521C
                          • Part of subcall function 00FB0719: timeGetTime.WINMM(?,75C0B400,00FA0FF9), ref: 00FB071D
                        • Sleep.KERNEL32(0000000A), ref: 00FF5248
                        • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00FF526C
                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00FF528E
                        • SetActiveWindow.USER32 ref: 00FF52AD
                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00FF52BB
                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00FF52DA
                        • Sleep.KERNEL32(000000FA), ref: 00FF52E5
                        • IsWindow.USER32 ref: 00FF52F1
                        • EndDialog.USER32(00000000), ref: 00FF5302
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                        • String ID: BUTTON
                        • API String ID: 1194449130-3405671355
                        • Opcode ID: 65764c963acf1f94ada60a00aeecb419e0b12645a6b52a008f389baf3d055e8a
                        • Instruction ID: 8cc7278e545a5acbf515532d23cbfc809e105a926c94f9b8adbd22f75335dafb
                        • Opcode Fuzzy Hash: 65764c963acf1f94ada60a00aeecb419e0b12645a6b52a008f389baf3d055e8a
                        • Instruction Fuzzy Hash: E3219571200B49AFE7215B34ED88B363B69EF4579AF900514F38182165DBAF9C08F721
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F99997: __itow.LIBCMT ref: 00F999C2
                          • Part of subcall function 00F99997: __swprintf.LIBCMT ref: 00F99A0C
                        • CoInitialize.OLE32(00000000), ref: 00FFD855
                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00FFD8E8
                        • SHGetDesktopFolder.SHELL32(?), ref: 00FFD8FC
                        • CoCreateInstance.OLE32(01022D7C,00000000,00000001,0104A89C,?), ref: 00FFD948
                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00FFD9B7
                        • CoTaskMemFree.OLE32(?,?), ref: 00FFDA0F
                        • _memset.LIBCMT ref: 00FFDA4C
                        • SHBrowseForFolderW.SHELL32(?), ref: 00FFDA88
                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00FFDAAB
                        • CoTaskMemFree.OLE32(00000000), ref: 00FFDAB2
                        • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00FFDAE9
                        • CoUninitialize.OLE32(00000001,00000000), ref: 00FFDAEB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                        • String ID:
                        • API String ID: 1246142700-0
                        • Opcode ID: b63dc86106c62ced8a90224d9bf2c63921b17466dff5e333d723823be4d6fee2
                        • Instruction ID: c636cfd98bc8072afe455ee5c83314e87d00b6bb46b96efb7df11f11473bd3b3
                        • Opcode Fuzzy Hash: b63dc86106c62ced8a90224d9bf2c63921b17466dff5e333d723823be4d6fee2
                        • Instruction Fuzzy Hash: 9FB12C75A00109AFDB14DFA5CC88DAEBBB9FF48314B048459F90AEB261DB34EE45DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetKeyboardState.USER32(?), ref: 00FF05A7
                        • SetKeyboardState.USER32(?), ref: 00FF0612
                        • GetAsyncKeyState.USER32(000000A0), ref: 00FF0632
                        • GetKeyState.USER32(000000A0), ref: 00FF0649
                        • GetAsyncKeyState.USER32(000000A1), ref: 00FF0678
                        • GetKeyState.USER32(000000A1), ref: 00FF0689
                        • GetAsyncKeyState.USER32(00000011), ref: 00FF06B5
                        • GetKeyState.USER32(00000011), ref: 00FF06C3
                        • GetAsyncKeyState.USER32(00000012), ref: 00FF06EC
                        • GetKeyState.USER32(00000012), ref: 00FF06FA
                        • GetAsyncKeyState.USER32(0000005B), ref: 00FF0723
                        • GetKeyState.USER32(0000005B), ref: 00FF0731
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: 4787bbd232433c33e3c2f0353a27ba10bd313d8dc4233f1ba8680c90875dcf39
                        • Instruction ID: 2f97e8ce6578da148a056612e8f132202c47b6eed9289eb0672580083eb0a62f
                        • Opcode Fuzzy Hash: 4787bbd232433c33e3c2f0353a27ba10bd313d8dc4233f1ba8680c90875dcf39
                        • Instruction Fuzzy Hash: 4851FA20E0478C69FB34EBA089547FABFB49F01390F0C4599D7C2561D3DEA89A4CDB55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetDlgItem.USER32(?,00000001), ref: 00FEC746
                        • GetWindowRect.USER32(00000000,?), ref: 00FEC758
                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00FEC7B6
                        • GetDlgItem.USER32(?,00000002), ref: 00FEC7C1
                        • GetWindowRect.USER32(00000000,?), ref: 00FEC7D3
                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00FEC827
                        • GetDlgItem.USER32(?,000003E9), ref: 00FEC835
                        • GetWindowRect.USER32(00000000,?), ref: 00FEC846
                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00FEC889
                        • GetDlgItem.USER32(?,000003EA), ref: 00FEC897
                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00FEC8B4
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00FEC8C1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$ItemMoveRect$Invalidate
                        • String ID:
                        • API String ID: 3096461208-0
                        • Opcode ID: 7d61141c51695465c4f07af38fea566dc85e0cf1e6ef7cf6287c8bf3f3375314
                        • Instruction ID: 656478a94819a66318f8ade48c5bbb52b9a68db46bc8d284a5b5763dc164bf53
                        • Opcode Fuzzy Hash: 7d61141c51695465c4f07af38fea566dc85e0cf1e6ef7cf6287c8bf3f3375314
                        • Instruction Fuzzy Hash: 44516E71B00205AFDB18CFB9DD89AAEBBBAFB88310F14812DF515D6290D7759D048B50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F91B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F92036,?,00000000,?,?,?,?,00F916CB,00000000,?), ref: 00F91B9A
                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00F920D3
                        • KillTimer.USER32(-00000001,?,?,?,?,00F916CB,00000000,?,?,00F91AE2,?,?), ref: 00F9216E
                        • DestroyAcceleratorTable.USER32(00000000), ref: 00FCBEF6
                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F916CB,00000000,?,?,00F91AE2,?,?), ref: 00FCBF27
                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F916CB,00000000,?,?,00F91AE2,?,?), ref: 00FCBF3E
                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F916CB,00000000,?,?,00F91AE2,?,?), ref: 00FCBF5A
                        • DeleteObject.GDI32(00000000), ref: 00FCBF6C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                        • String ID:
                        • API String ID: 641708696-0
                        • Opcode ID: 6aadbdabfdd01402f3533ca6ec9122d8be2bcef494e6259e7db2b667aadf16c0
                        • Instruction ID: 0775fe898875a0a4e57785621f9a503dfdcb4649ded768e308ad09883c2d1d09
                        • Opcode Fuzzy Hash: 6aadbdabfdd01402f3533ca6ec9122d8be2bcef494e6259e7db2b667aadf16c0
                        • Instruction Fuzzy Hash: E561BE35900712EFEB759F14D94AB2AB7F1FF40322F50461CE18286668C73BA895EF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F925DB: GetWindowLongW.USER32(?,000000EB), ref: 00F925EC
                        • GetSysColor.USER32(0000000F), ref: 00F921D3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ColorLongWindow
                        • String ID:
                        • API String ID: 259745315-0
                        • Opcode ID: 4276bdde8ec6839a6fdf9ffd3c399a9776d979185386f086de2b33ed48b035eb
                        • Instruction ID: 11b13ab07ca27c9a08f1d00b9c57fba1f92d1ecf9134d7c1d82a2a9ae6c6d91a
                        • Opcode Fuzzy Hash: 4276bdde8ec6839a6fdf9ffd3c399a9776d979185386f086de2b33ed48b035eb
                        • Instruction Fuzzy Hash: 4641E431404141AFFF655F28EC88BB93B65EB06331F184355FEA58A1E6C7368C82EB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharLowerBuffW.USER32(?,?,0101F910), ref: 00FFAB76
                        • GetDriveTypeW.KERNEL32(00000061,0104A620,00000061), ref: 00FFAC40
                        • _wcscpy.LIBCMT ref: 00FFAC6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: BuffCharDriveLowerType_wcscpy
                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                        • API String ID: 2820617543-1000479233
                        • Opcode ID: 5a2e54fb78095d65b874a6e31f705efbb4c135cb4646f94ed27a3f58ed7a0f18
                        • Instruction ID: 8cdc19d91e05fd369fed6c2066ace16a85ad0ec7be798eee6134f464df819d07
                        • Opcode Fuzzy Hash: 5a2e54fb78095d65b874a6e31f705efbb4c135cb4646f94ed27a3f58ed7a0f18
                        • Instruction Fuzzy Hash: 1551D0716083059BD710EF18CC81ABEB7A5FF84710F10881DF69A572B2DB75D909EB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __i64tow__itow__swprintf
                        • String ID: %.15g$0x%p$False$True
                        • API String ID: 421087845-2263619337
                        • Opcode ID: 869ad86c0e31815b4763d31ddf83d098d777bfdb8add4932952c98dd05e308c7
                        • Instruction ID: e2328394541e8917717c889129bef46af40fc7267113890a35eaec8a568ef611
                        • Opcode Fuzzy Hash: 869ad86c0e31815b4763d31ddf83d098d777bfdb8add4932952c98dd05e308c7
                        • Instruction Fuzzy Hash: D7413772A08206AFEF24AF39DC42F7AB3E8EB44310F20046EE549D7251EE759901AB11
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 010173D9
                        • CreateMenu.USER32 ref: 010173F4
                        • SetMenu.USER32(?,00000000), ref: 01017403
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01017490
                        • IsMenu.USER32(?), ref: 010174A6
                        • CreatePopupMenu.USER32 ref: 010174B0
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 010174DD
                        • DrawMenuBar.USER32 ref: 010174E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                        • String ID: 0$F
                        • API String ID: 176399719-3044882817
                        • Opcode ID: 858d8b72bea7f01b3f68282677bb5cfcdff05b3b29782e9be89d44e13b352b37
                        • Instruction ID: e0009fe307e8b0f8ad35f973fb7525459f3f2fb6d9de6c94ebdd7126369b9296
                        • Opcode Fuzzy Hash: 858d8b72bea7f01b3f68282677bb5cfcdff05b3b29782e9be89d44e13b352b37
                        • Instruction Fuzzy Hash: E9415874A00209EFDB20DF68D884A9ABBF5FF49310F144168FA9597354DB3AA914CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 010177CD
                        • CreateCompatibleDC.GDI32(00000000), ref: 010177D4
                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 010177E7
                        • SelectObject.GDI32(00000000,00000000), ref: 010177EF
                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 010177FA
                        • DeleteDC.GDI32(00000000), ref: 01017803
                        • GetWindowLongW.USER32(?,000000EC), ref: 0101780D
                        • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 01017821
                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0101782D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                        • String ID: static
                        • API String ID: 2559357485-2160076837
                        • Opcode ID: f62e7b06079286871aa7a9e88be2f07ca8a5a3a9c1178ecc64aa053f7b544875
                        • Instruction ID: 3b6b195006760a87f7bd2b25120ddc7063a34134966df9d10ad238349a04ef6d
                        • Opcode Fuzzy Hash: f62e7b06079286871aa7a9e88be2f07ca8a5a3a9c1178ecc64aa053f7b544875
                        • Instruction Fuzzy Hash: 40316D31101216ABDF229F78DC08FDA3BA9FF0D760F110215FA95A61A4DB3AD815DBA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00FB707B
                          • Part of subcall function 00FB8D68: __getptd_noexit.LIBCMT ref: 00FB8D68
                        • __gmtime64_s.LIBCMT ref: 00FB7114
                        • __gmtime64_s.LIBCMT ref: 00FB714A
                        • __gmtime64_s.LIBCMT ref: 00FB7167
                        • __allrem.LIBCMT ref: 00FB71BD
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB71D9
                        • __allrem.LIBCMT ref: 00FB71F0
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB720E
                        • __allrem.LIBCMT ref: 00FB7225
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FB7243
                        • __invoke_watson.LIBCMT ref: 00FB72B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                        • String ID:
                        • API String ID: 384356119-0
                        • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                        • Instruction ID: 5e8c52fa4917958314f9f8df0be3d032faeaa5af4f8563facff0ba31357e92e5
                        • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                        • Instruction Fuzzy Hash: 1271D771E04717ABD714BE7ACC42BDBB3B8AF94360F14422AF514E6281E774E940AF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00FF2A31
                        • GetMenuItemInfoW.USER32(01056890,000000FF,00000000,00000030), ref: 00FF2A92
                        • SetMenuItemInfoW.USER32(01056890,00000004,00000000,00000030), ref: 00FF2AC8
                        • Sleep.KERNEL32(000001F4), ref: 00FF2ADA
                        • GetMenuItemCount.USER32(?), ref: 00FF2B1E
                        • GetMenuItemID.USER32(?,00000000), ref: 00FF2B3A
                        • GetMenuItemID.USER32(?,-00000001), ref: 00FF2B64
                        • GetMenuItemID.USER32(?,?), ref: 00FF2BA9
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FF2BEF
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2C03
                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2C24
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                        • String ID:
                        • API String ID: 4176008265-0
                        • Opcode ID: 9eee58b6b21d02b89ef3d0c5989409641a489283e95774de895b9018be6ef402
                        • Instruction ID: 41a3f49ef4cd21164d997727d9c925b7bade01fc82f41af0f2447a9b195e72a5
                        • Opcode Fuzzy Hash: 9eee58b6b21d02b89ef3d0c5989409641a489283e95774de895b9018be6ef402
                        • Instruction Fuzzy Hash: FA61B3B090034DAFDB61CF64C888EBE7BB8EF41364F140559EA41A7261D73AAD45EB21
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 01017214
                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 01017217
                        • GetWindowLongW.USER32(?,000000F0), ref: 0101723B
                        • _memset.LIBCMT ref: 0101724C
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0101725E
                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 010172D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow_memset
                        • String ID:
                        • API String ID: 830647256-0
                        • Opcode ID: 582a8c88983125d11406f52b932760d7b7010a89774e8d234d5174e98f3df537
                        • Instruction ID: c760e5815b89165ffe73bfe387e8e4b8397da3927cb7ce2d8d050fae56303772
                        • Opcode Fuzzy Hash: 582a8c88983125d11406f52b932760d7b7010a89774e8d234d5174e98f3df537
                        • Instruction Fuzzy Hash: 7E617CB5A00208AFDB20DFA8CC81EEE77F8EB09710F144199FA54A7391D779A945DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00FE7135
                        • SafeArrayAllocData.OLEAUT32(?), ref: 00FE718E
                        • VariantInit.OLEAUT32(?), ref: 00FE71A0
                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00FE71C0
                        • VariantCopy.OLEAUT32(?,?), ref: 00FE7213
                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00FE7227
                        • VariantClear.OLEAUT32(?), ref: 00FE723C
                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00FE7249
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FE7252
                        • VariantClear.OLEAUT32(?), ref: 00FE7264
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FE726F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                        • String ID:
                        • API String ID: 2706829360-0
                        • Opcode ID: e5f64446305f3f5db4e469bbd5a2f3439930b04ca0db038bc0c99d6ee4b0fdfe
                        • Instruction ID: 778ca95aeb77a09c8261fe30f1558d72d4341ed065c2742cf8f601a0469b98f0
                        • Opcode Fuzzy Hash: e5f64446305f3f5db4e469bbd5a2f3439930b04ca0db038bc0c99d6ee4b0fdfe
                        • Instruction Fuzzy Hash: E8417035A04219AFCF10EFA9D844DADBBB8FF08354F008069FA45E7251CB39A949DF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F99997: __itow.LIBCMT ref: 00F999C2
                          • Part of subcall function 00F99997: __swprintf.LIBCMT ref: 00F99A0C
                        • CoInitialize.OLE32 ref: 01008718
                        • CoUninitialize.OLE32 ref: 01008723
                        • CoCreateInstance.OLE32(?,00000000,00000017,01022BEC,?), ref: 01008783
                        • IIDFromString.OLE32(?,?), ref: 010087F6
                        • VariantInit.OLEAUT32(?), ref: 01008890
                        • VariantClear.OLEAUT32(?), ref: 010088F1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                        • API String ID: 834269672-1287834457
                        • Opcode ID: 92ef8bdf68bb0898525baad98157bba21ac4c135e7d613cd4d63f5cc164940d2
                        • Instruction ID: e627e0b53b9d85aece01e7cf2da45468f4bdb2412e63f1b12057aca53639b328
                        • Opcode Fuzzy Hash: 92ef8bdf68bb0898525baad98157bba21ac4c135e7d613cd4d63f5cc164940d2
                        • Instruction Fuzzy Hash: 84618170A087119FE712DF69D844B5EBBE8BF44714F00885EF9C59B291CB74E948CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00FFB73B
                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00FFB7B1
                        • GetLastError.KERNEL32 ref: 00FFB7BB
                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00FFB828
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Error$Mode$DiskFreeLastSpace
                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                        • API String ID: 4194297153-14809454
                        • Opcode ID: 95053a34765e52c4bc76f20977c8980a64eb38e7ddfae44cc47a41bcc81b161a
                        • Instruction ID: 7c955444c7758a164c41085619a9a458c985cafeaff1ba4f8c4008dbcd619444
                        • Opcode Fuzzy Hash: 95053a34765e52c4bc76f20977c8980a64eb38e7ddfae44cc47a41bcc81b161a
                        • Instruction Fuzzy Hash: DA31A676E4020D9FEB10FF64CC85ABEB7B4EF84750F104029E606DB2A1DB799946E750
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                          • Part of subcall function 00FEB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB0E7
                        • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00FE94F6
                        • GetDlgCtrlID.USER32 ref: 00FE9501
                        • GetParent.USER32 ref: 00FE951D
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FE9520
                        • GetDlgCtrlID.USER32(?), ref: 00FE9529
                        • GetParent.USER32(?), ref: 00FE9545
                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FE9548
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 1536045017-1403004172
                        • Opcode ID: 5f959b75a5dc6900de1d7f7b58c6dc16d89c75d48ab880ff59474755869064bc
                        • Instruction ID: 40c3722ad69a859351307ee31e1699d0f38bfafdc32fe002feb72699f3379554
                        • Opcode Fuzzy Hash: 5f959b75a5dc6900de1d7f7b58c6dc16d89c75d48ab880ff59474755869064bc
                        • Instruction Fuzzy Hash: 1421F174D04204BBDF00EBA2CC85EFEBBB4EF49310F104119B961972A2DB7D5919EB20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                          • Part of subcall function 00FEB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB0E7
                        • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00FE95DF
                        • GetDlgCtrlID.USER32 ref: 00FE95EA
                        • GetParent.USER32 ref: 00FE9606
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FE9609
                        • GetDlgCtrlID.USER32(?), ref: 00FE9612
                        • GetParent.USER32(?), ref: 00FE962E
                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FE9631
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 1536045017-1403004172
                        • Opcode ID: 52faa716478d194c6f7db93e560f4f73bca89ec886c137d19156aa3496d81fc9
                        • Instruction ID: 627c69faa0f015cd6d9a1688e38b83a19e9eacbd7674c5ec1e251158c270467e
                        • Opcode Fuzzy Hash: 52faa716478d194c6f7db93e560f4f73bca89ec886c137d19156aa3496d81fc9
                        • Instruction Fuzzy Hash: EB21C170D00204BBDF00AB61CC85EFEBBA8EF48300F10001AB961971A5DB7D9919AB20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetParent.USER32 ref: 00FE9651
                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00FE9666
                        • _wcscmp.LIBCMT ref: 00FE9678
                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00FE96F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ClassMessageNameParentSend_wcscmp
                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                        • API String ID: 1704125052-3381328864
                        • Opcode ID: f7dfe553da31e6740ac13ebf0b34041497ddf0e840e1cb077f169a624dc4a89e
                        • Instruction ID: cecb665bddb934d00624a810b3dea5f7a5687de15a401d72a772b5e0b2d4d5a8
                        • Opcode Fuzzy Hash: f7dfe553da31e6740ac13ebf0b34041497ddf0e840e1cb077f169a624dc4a89e
                        • Instruction Fuzzy Hash: DA110A7768C347BBF7102527DC46DE7779C9B08374B30003BF900A5091FEE669146AA8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • VariantInit.OLEAUT32(?), ref: 01008BEC
                        • CoInitialize.OLE32(00000000), ref: 01008C19
                        • CoUninitialize.OLE32 ref: 01008C23
                        • GetRunningObjectTable.OLE32(00000000,?), ref: 01008D23
                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 01008E50
                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,01022C0C), ref: 01008E84
                        • CoGetObject.OLE32(?,00000000,01022C0C,?), ref: 01008EA7
                        • SetErrorMode.KERNEL32(00000000), ref: 01008EBA
                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 01008F3A
                        • VariantClear.OLEAUT32(?), ref: 01008F4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                        • String ID:
                        • API String ID: 2395222682-0
                        • Opcode ID: de2784a95407b4010c8b48d86086938aaccf0e24bb61672bc611cfd7cae4d7d3
                        • Instruction ID: c32869888ae1786f881cb438966bb8b9c8e7d1b2552ff41cc36a7a26f2a6c1f6
                        • Opcode Fuzzy Hash: de2784a95407b4010c8b48d86086938aaccf0e24bb61672bc611cfd7cae4d7d3
                        • Instruction Fuzzy Hash: B8C12871608305AFE701EF68C88492BBBE9FF88748F00495EF5899B291DB75ED05CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __swprintf.LIBCMT ref: 00FF419D
                        • __swprintf.LIBCMT ref: 00FF41AA
                          • Part of subcall function 00FB38D8: __woutput_l.LIBCMT ref: 00FB3931
                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 00FF41D4
                        • LoadResource.KERNEL32(?,00000000), ref: 00FF41E0
                        • LockResource.KERNEL32(00000000), ref: 00FF41ED
                        • FindResourceW.KERNEL32(?,?,00000003), ref: 00FF420D
                        • LoadResource.KERNEL32(?,00000000), ref: 00FF421F
                        • SizeofResource.KERNEL32(?,00000000), ref: 00FF422E
                        • LockResource.KERNEL32(?), ref: 00FF423A
                        • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00FF429B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                        • String ID:
                        • API String ID: 1433390588-0
                        • Opcode ID: 094cd80ee4f81b8b1ac5465494d145f877084c06c9c4206472457834c3eff3b5
                        • Instruction ID: c651fd9a200f11ad29e6dd233477b66643dcf08d98bbccabff52e49726d08a89
                        • Opcode Fuzzy Hash: 094cd80ee4f81b8b1ac5465494d145f877084c06c9c4206472457834c3eff3b5
                        • Instruction Fuzzy Hash: 79319071A0121AABDB219F61DC48EFF7BACFF08301F004525FA45D2150E779EA51EBA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00FF1700
                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00FF0778,?,00000001), ref: 00FF1714
                        • GetWindowThreadProcessId.USER32(00000000), ref: 00FF171B
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0778,?,00000001), ref: 00FF172A
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FF173C
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0778,?,00000001), ref: 00FF1755
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FF0778,?,00000001), ref: 00FF1767
                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00FF0778,?,00000001), ref: 00FF17AC
                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FF0778,?,00000001), ref: 00FF17C1
                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FF0778,?,00000001), ref: 00FF17CC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                        • String ID:
                        • API String ID: 2156557900-0
                        • Opcode ID: 6f969d0d416a8c3003223165303ab2ab719d7a66ac0df39a64194f5471804379
                        • Instruction ID: c2204c8985f4945458f2de5df9819acc168e7e380c88fad16907405103b50ace
                        • Opcode Fuzzy Hash: 6f969d0d416a8c3003223165303ab2ab719d7a66ac0df39a64194f5471804379
                        • Instruction Fuzzy Hash: 9331B176A00308FBDB31EF24E888F7A77A9BF19721F104014FA49D6294D77E9D44AB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F9FC06
                        • OleUninitialize.OLE32(?,00000000), ref: 00F9FCA5
                        • UnregisterHotKey.USER32(?), ref: 00F9FDFC
                        • DestroyWindow.USER32(?), ref: 00FD4A00
                        • FreeLibrary.KERNEL32(?), ref: 00FD4A65
                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00FD4A92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                        • String ID: close all
                        • API String ID: 469580280-3243417748
                        • Opcode ID: 839de33d0b969e457c449442a51a6317141a5f432c2af5abab2b64ef8cb95cd0
                        • Instruction ID: e9932442dad6de5d55150d420763b0bf5fd4c22f6b295500fc4810a9b21744b4
                        • Opcode Fuzzy Hash: 839de33d0b969e457c449442a51a6317141a5f432c2af5abab2b64ef8cb95cd0
                        • Instruction Fuzzy Hash: 54A17131B01212CFDB29EF14C895B69F765BF05710F1842AEE80AAB251CB38ED16EF54
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • EnumChildWindows.USER32(?,00FEAA64), ref: 00FEA9A2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ChildEnumWindows
                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                        • API String ID: 3555792229-1603158881
                        • Opcode ID: 74a669a3c4f00625634290e6a33fa79e772678cc930f67608dea77ff3fa11be3
                        • Instruction ID: 0c9b34e35ca3fab7f3452dd1d1430425d070b9023aea18f9486f46923b2d36f4
                        • Opcode Fuzzy Hash: 74a669a3c4f00625634290e6a33fa79e772678cc930f67608dea77ff3fa11be3
                        • Instruction Fuzzy Hash: DF91B771A00246EBDB18EF71C881BEEF774BF08314F508129D89AA7152DF347A59EB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetWindowLongW.USER32(?,000000EB), ref: 00F92EAE
                          • Part of subcall function 00F91DB3: GetClientRect.USER32(?,?), ref: 00F91DDC
                          • Part of subcall function 00F91DB3: GetWindowRect.USER32(?,?), ref: 00F91E1D
                          • Part of subcall function 00F91DB3: ScreenToClient.USER32(?,?), ref: 00F91E45
                        • GetDC.USER32 ref: 00FCCF82
                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00FCCF95
                        • SelectObject.GDI32(00000000,00000000), ref: 00FCCFA3
                        • SelectObject.GDI32(00000000,00000000), ref: 00FCCFB8
                        • ReleaseDC.USER32(?,00000000), ref: 00FCCFC0
                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00FCD04B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                        • String ID: U
                        • API String ID: 4009187628-3372436214
                        • Opcode ID: f478e6b9c3d46810983e491bbf31378f23dd4f58d40c63ac1a047f4098313661
                        • Instruction ID: e722fa74164344f76abc58aa1e357ca34678802212036d2d47051e60cef34f51
                        • Opcode Fuzzy Hash: f478e6b9c3d46810983e491bbf31378f23dd4f58d40c63ac1a047f4098313661
                        • Instruction Fuzzy Hash: 0971D331800206EFDF21DF68C982FAA3BB6FF49360F14426EED955A159D7368841EB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                          • Part of subcall function 00F92344: GetCursorPos.USER32(?), ref: 00F92357
                          • Part of subcall function 00F92344: ScreenToClient.USER32(010567B0,?), ref: 00F92374
                          • Part of subcall function 00F92344: GetAsyncKeyState.USER32(00000001), ref: 00F92399
                          • Part of subcall function 00F92344: GetAsyncKeyState.USER32(00000002), ref: 00F923A7
                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0101C2E4
                        • ImageList_EndDrag.COMCTL32 ref: 0101C2EA
                        • ReleaseCapture.USER32 ref: 0101C2F0
                        • SetWindowTextW.USER32(?,00000000), ref: 0101C39A
                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0101C3AD
                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0101C48F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                        • API String ID: 1924731296-2107944366
                        • Opcode ID: e8390277728e81561711213a97bdfc1d9779a6d2e69382c34cd46a2d0dd9dcd9
                        • Instruction ID: e1ecf022af0dfdf585fca0b95af5adbbd9224ab4f64b3a429aa394462d933537
                        • Opcode Fuzzy Hash: e8390277728e81561711213a97bdfc1d9779a6d2e69382c34cd46a2d0dd9dcd9
                        • Instruction Fuzzy Hash: 1B51AE70208305AFEB10EF24C855FAA7BE1FB88310F40461DF5958B2A5DB7A9948DB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0101F910), ref: 0100903D
                        • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0101F910), ref: 01009071
                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 010091EB
                        • SysFreeString.OLEAUT32(?), ref: 01009215
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Free$FileLibraryModuleNamePathQueryStringType
                        • String ID:
                        • API String ID: 560350794-0
                        • Opcode ID: 884896fb9c504fb0c3bf58ac7918b2b38807751de2f7bfd3c8636958c1c2b8ad
                        • Instruction ID: 312bf3310998504924ccf736fc817d3af084226c97ab70f732f0b1577285552c
                        • Opcode Fuzzy Hash: 884896fb9c504fb0c3bf58ac7918b2b38807751de2f7bfd3c8636958c1c2b8ad
                        • Instruction Fuzzy Hash: EAF12C71A00109EFEF15DF98C888EAEB7B9FF49314F108099F559AB291CB35AE45CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 0100F9C9
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0100FB5C
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0100FB80
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0100FBC0
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0100FBE2
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0100FD5E
                        • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0100FD90
                        • CloseHandle.KERNEL32(?), ref: 0100FDBF
                        • CloseHandle.KERNEL32(?), ref: 0100FE36
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                        • String ID:
                        • API String ID: 4090791747-0
                        • Opcode ID: adcc4cdd4f5543b41c28a27d57267e57fee69f8fd1cdd2029f5ca68d97d29a95
                        • Instruction ID: c58b374e4874dfba00bb1109bc1d05d1aa895c8763f43ea92128ddbe06a8f037
                        • Opcode Fuzzy Hash: adcc4cdd4f5543b41c28a27d57267e57fee69f8fd1cdd2029f5ca68d97d29a95
                        • Instruction Fuzzy Hash: 9CE1E431204342DFEB25EF28C881A6ABBE1BF85350F04845DF9998B2A2CB35DC45DF52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FF48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FF38D3,?), ref: 00FF48C7
                          • Part of subcall function 00FF48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FF38D3,?), ref: 00FF48E0
                          • Part of subcall function 00FF4CD3: GetFileAttributesW.KERNEL32(?,00FF3947), ref: 00FF4CD4
                        • lstrcmpiW.KERNEL32(?,?), ref: 00FF4FE2
                        • _wcscmp.LIBCMT ref: 00FF4FFC
                        • MoveFileW.KERNEL32(?,?), ref: 00FF5017
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                        • String ID:
                        • API String ID: 793581249-0
                        • Opcode ID: c6269b3dbc634dd360c298bb563bc0959a8664b395f7ce91609d1554be1d9d12
                        • Instruction ID: 9e74b41cc786806b3fbc8a352d3b680b853cf7d4d4944c9804f84626377e51ea
                        • Opcode Fuzzy Hash: c6269b3dbc634dd360c298bb563bc0959a8664b395f7ce91609d1554be1d9d12
                        • Instruction Fuzzy Hash: 3E5186B24087855BC720DB50DC859EFB3ECAF84750F10091EF289D3161EF78B1889B66
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0101896E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: InvalidateRect
                        • String ID:
                        • API String ID: 634782764-0
                        • Opcode ID: 2815eaf1c8732f7bb2c333efa786885062c83132a5a42a5c5daf1677e79c9353
                        • Instruction ID: 570259d7e2b7ce67f7d91a90e1359823670ac542d136d2ebc68c9fac3e64ea6c
                        • Opcode Fuzzy Hash: 2815eaf1c8732f7bb2c333efa786885062c83132a5a42a5c5daf1677e79c9353
                        • Instruction Fuzzy Hash: B051C131600209BBFF309E68DC85B993BA5BB05354F548253FA90E61E9D77EAB80CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00FCC547
                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FCC569
                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00FCC581
                        • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00FCC59F
                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00FCC5C0
                        • DestroyIcon.USER32(00000000), ref: 00FCC5CF
                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00FCC5EC
                        • DestroyIcon.USER32(?), ref: 00FCC5FB
                          • Part of subcall function 0101A71E: DeleteObject.GDI32(00000000), ref: 0101A757
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                        • String ID:
                        • API String ID: 2819616528-0
                        • Opcode ID: cce663f59b0a5abf084be0c65226007cd0ae1b1ab6f75a7177b9111a817e43cd
                        • Instruction ID: 072e2c009e28a4302c98ace3afe6d1f0468b5132c1526ea20298bc772c825ec0
                        • Opcode Fuzzy Hash: cce663f59b0a5abf084be0c65226007cd0ae1b1ab6f75a7177b9111a817e43cd
                        • Instruction Fuzzy Hash: AE515971A0020AAFEF24DF24DD45FAA37E5FB58360F100518F94697290DB79ED90EB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00FE8A84,00000B00,?,?), ref: 00FE8E0C
                        • HeapAlloc.KERNEL32(00000000,?,00FE8A84,00000B00,?,?), ref: 00FE8E13
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00FE8A84,00000B00,?,?), ref: 00FE8E28
                        • GetCurrentProcess.KERNEL32(?,00000000,?,00FE8A84,00000B00,?,?), ref: 00FE8E30
                        • DuplicateHandle.KERNEL32(00000000,?,00FE8A84,00000B00,?,?), ref: 00FE8E33
                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00FE8A84,00000B00,?,?), ref: 00FE8E43
                        • GetCurrentProcess.KERNEL32(00FE8A84,00000000,?,00FE8A84,00000B00,?,?), ref: 00FE8E4B
                        • DuplicateHandle.KERNEL32(00000000,?,00FE8A84,00000B00,?,?), ref: 00FE8E4E
                        • CreateThread.KERNEL32(00000000,00000000,00FE8E74,00000000,00000000,00000000), ref: 00FE8E68
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                        • String ID:
                        • API String ID: 1957940570-0
                        • Opcode ID: 9ba918ed23571ae260265af0c94906f5346ccdb771f1c34074f8748ae00d8762
                        • Instruction ID: 144f1fdb35228679c72bd56c7c9271e9ebcfa853de875106f5bba5dba182c788
                        • Opcode Fuzzy Hash: 9ba918ed23571ae260265af0c94906f5346ccdb771f1c34074f8748ae00d8762
                        • Instruction Fuzzy Hash: 9601BBB5240349BFE720ABA5DC4DF6B3BACEB89711F004511FA45DB195CAB99804CB20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$_memset
                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                        • API String ID: 2862541840-625585964
                        • Opcode ID: 65cc46a2c9e75a6932e15deea7cb9ef583f0c7f52ebd98839801d55ec91181b1
                        • Instruction ID: c7410dc27df9925195617ddf7088f83954d9abc1534846713973c2793c7be11e
                        • Opcode Fuzzy Hash: 65cc46a2c9e75a6932e15deea7cb9ef583f0c7f52ebd98839801d55ec91181b1
                        • Instruction Fuzzy Hash: 7991C571A00205AFEF25DFA5CC44FAEBBB8EF49314F008559F559AB282D7749904CFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 01017093
                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 010170A7
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 010170C1
                        • _wcscat.LIBCMT ref: 0101711C
                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 01017133
                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 01017161
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$Window_wcscat
                        • String ID: SysListView32
                        • API String ID: 307300125-78025650
                        • Opcode ID: 9c2cc6cee8f2040cf49dfe0a41ce9f665505514f4468ddcae462bdcd1b70767e
                        • Instruction ID: 95d4630a386211629fd17274c8ef9b334ff25bf9a96d8d2be285ebf3e4131788
                        • Opcode Fuzzy Hash: 9c2cc6cee8f2040cf49dfe0a41ce9f665505514f4468ddcae462bdcd1b70767e
                        • Instruction Fuzzy Hash: 0541A475A00309EFEB22DF68CC85BEE77E9EF08350F10056AF584A7196D67A99848B50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FF3E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00FF3EB6
                          • Part of subcall function 00FF3E91: Process32FirstW.KERNEL32(00000000,?), ref: 00FF3EC4
                          • Part of subcall function 00FF3E91: CloseHandle.KERNEL32(00000000), ref: 00FF3F8E
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0100ECB8
                        • GetLastError.KERNEL32 ref: 0100ECCB
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0100ECFA
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0100ED77
                        • GetLastError.KERNEL32(00000000), ref: 0100ED82
                        • CloseHandle.KERNEL32(00000000), ref: 0100EDB7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                        • String ID: SeDebugPrivilege
                        • API String ID: 2533919879-2896544425
                        • Opcode ID: ecf36767eaf55ae30e955f1147e23307adf7af84ac150bfc71c2f2e7d380c6bb
                        • Instruction ID: a3636fec865ffbc56b8243d01468a55994114dfd2587caaf404ffbc91fa5e77d
                        • Opcode Fuzzy Hash: ecf36767eaf55ae30e955f1147e23307adf7af84ac150bfc71c2f2e7d380c6bb
                        • Instruction Fuzzy Hash: E641A0712042019FEB11EF28CC95F6DB7A4EF40714F088459F9869B2D2DBBDA805DB55
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadIconW.USER32(00000000,00007F03), ref: 00FF32C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: IconLoad
                        • String ID: blank$info$question$stop$warning
                        • API String ID: 2457776203-404129466
                        • Opcode ID: 7605b1774289463ed8a4cef57d18bf93bef07929e711dd1dbd3b2475ba01e761
                        • Instruction ID: 25b81e2df4a1c6eec964eb970a35d9b5a8a8ae7ca2f76c9b125a69f24a0128ef
                        • Opcode Fuzzy Hash: 7605b1774289463ed8a4cef57d18bf93bef07929e711dd1dbd3b2475ba01e761
                        • Instruction Fuzzy Hash: E6110D32B8835ABBE7015A59DC83DBAB39CEF19374F10002EF60196191D6795B407AA4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00FF454E
                        • LoadStringW.USER32(00000000), ref: 00FF4555
                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00FF456B
                        • LoadStringW.USER32(00000000), ref: 00FF4572
                        • _wprintf.LIBCMT ref: 00FF4598
                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FF45B6
                        Strings
                        • %s (%d) : ==> %s: %s %s, xrefs: 00FF4593
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message_wprintf
                        • String ID: %s (%d) : ==> %s: %s %s
                        • API String ID: 3648134473-3128320259
                        • Opcode ID: 88ee4e4e373b4f56c74fed132b87ae1f5ea52520e7397a73590e45a687a6280b
                        • Instruction ID: 39369e478fed20bd68d45bbb0e02c90dd4982a0661e7c0a1d8df35e0991d69c5
                        • Opcode Fuzzy Hash: 88ee4e4e373b4f56c74fed132b87ae1f5ea52520e7397a73590e45a687a6280b
                        • Instruction Fuzzy Hash: E00167F29002097FE720E7A1DD89EF7776CDB08311F400595BB85D2005EA7D9E894B70
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                        • GetSystemMetrics.USER32(0000000F), ref: 0101D78A
                        • GetSystemMetrics.USER32(0000000F), ref: 0101D7AA
                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0101D9E5
                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0101DA03
                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0101DA24
                        • ShowWindow.USER32(00000003,00000000), ref: 0101DA43
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0101DA68
                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 0101DA8B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                        • String ID:
                        • API String ID: 1211466189-0
                        • Opcode ID: b3ae58ae8bdc6a568b8b84fecde1d89a2de2c4ebcd70dc828639ac6a8aaa51dd
                        • Instruction ID: 9f6dea653d3dd5a80f06f3977e7e8ca05396bc00fc71ae539307704bdb9f9f60
                        • Opcode Fuzzy Hash: b3ae58ae8bdc6a568b8b84fecde1d89a2de2c4ebcd70dc828639ac6a8aaa51dd
                        • Instruction Fuzzy Hash: FEB17A71600216EBDF14CFA8C9897BD7BF2BF44711F0881A9ED889B299D739A950CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FCC417,00000004,00000000,00000000,00000000), ref: 00F92ACF
                        • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00FCC417,00000004,00000000,00000000,00000000,000000FF), ref: 00F92B17
                        • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00FCC417,00000004,00000000,00000000,00000000), ref: 00FCC46A
                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FCC417,00000004,00000000,00000000,00000000), ref: 00FCC4D6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ShowWindow
                        • String ID:
                        • API String ID: 1268545403-0
                        • Opcode ID: 56dad9334cf33421dc52ee0ffc2e9b3b9b2902490d4ec37770935c4c239d87ec
                        • Instruction ID: 170542df8a2b09f5c896f3134d17d2fae972fe405c91099c09b8b6d7c59b2b0e
                        • Opcode Fuzzy Hash: 56dad9334cf33421dc52ee0ffc2e9b3b9b2902490d4ec37770935c4c239d87ec
                        • Instruction Fuzzy Hash: 81411E33A04681BAEFBADB288D98B777B91AB95320F54C80DE08786551C63D9845F750
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00FF737F
                          • Part of subcall function 00FB0FF6: std::exception::exception.LIBCMT ref: 00FB102C
                          • Part of subcall function 00FB0FF6: __CxxThrowException@8.LIBCMT ref: 00FB1041
                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00FF73B6
                        • EnterCriticalSection.KERNEL32(?), ref: 00FF73D2
                        • _memmove.LIBCMT ref: 00FF7420
                        • _memmove.LIBCMT ref: 00FF743D
                        • LeaveCriticalSection.KERNEL32(?), ref: 00FF744C
                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00FF7461
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FF7480
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                        • String ID:
                        • API String ID: 256516436-0
                        • Opcode ID: 93cd8c7c7781c20359c77bf21e295a2aeb8169a19c18cb652336b6f4b0d92abc
                        • Instruction ID: 02b305ace0830c01488ced8b1bdaa26539be1a73150caaa12ebfa5a6a1f47fa1
                        • Opcode Fuzzy Hash: 93cd8c7c7781c20359c77bf21e295a2aeb8169a19c18cb652336b6f4b0d92abc
                        • Instruction Fuzzy Hash: B831C131900205EBCF10EF55DC85AAFBB78FF45310B1441A5FD04EB24ADB399A14EBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DeleteObject.GDI32(00000000), ref: 0101645A
                        • GetDC.USER32(00000000), ref: 01016462
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0101646D
                        • ReleaseDC.USER32(00000000,00000000), ref: 01016479
                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 010164B5
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 010164C6
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,01019299,?,?,000000FF,00000000,?,000000FF,?), ref: 01016500
                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 01016520
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                        • String ID:
                        • API String ID: 3864802216-0
                        • Opcode ID: fdef45002537a9232ee5ddabf408e5890a5569fff97d98208659c97ce16f8506
                        • Instruction ID: d8bcb4fc67a31174ea6262da32cc2d84c260cefb8eac89d7060a25e00f01dfc7
                        • Opcode Fuzzy Hash: fdef45002537a9232ee5ddabf408e5890a5569fff97d98208659c97ce16f8506
                        • Instruction Fuzzy Hash: 2D318072201214BFEB218F64DC49FEB3FA9EF09761F044055FE48DA199D6BA9841CB74
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: 6357048c0aad9b982f850112bf493a4562c953d96fa76ded5ac20d6c8086d64a
                        • Instruction ID: 23d111f2192e8d6a02a8aefee82983187a8034c91cf82207396d3820e6341b13
                        • Opcode Fuzzy Hash: 6357048c0aad9b982f850112bf493a4562c953d96fa76ded5ac20d6c8086d64a
                        • Instruction Fuzzy Hash: F5212672A00255BBD610A5238C52FFF339DAF503A4F440024FE05DB652E719DE22B5E1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F99997: __itow.LIBCMT ref: 00F999C2
                          • Part of subcall function 00F99997: __swprintf.LIBCMT ref: 00F99A0C
                          • Part of subcall function 00FAFEC6: _wcscpy.LIBCMT ref: 00FAFEE9
                        • _wcstok.LIBCMT ref: 00FFEEFF
                        • _wcscpy.LIBCMT ref: 00FFEF8E
                        • _memset.LIBCMT ref: 00FFEFC1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                        • String ID: X
                        • API String ID: 774024439-3081909835
                        • Opcode ID: 8002885a6e6122f5cb0bbe4637423d3efed5fe835c44b634f24355550b6557c7
                        • Instruction ID: 4314be78d1e2b2fc2575fc3221c730a423b06fbf69ea964e90f643babfef6eff
                        • Opcode Fuzzy Hash: 8002885a6e6122f5cb0bbe4637423d3efed5fe835c44b634f24355550b6557c7
                        • Instruction Fuzzy Hash: EFC17E715083019FDB24EF24CC81AAAB7E4BF84714F04492DF9999B2B2DB74ED45DB82
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2e2aa0bb859fcca3ebc82895491b995ebb111b6f29d0b4b62784b504001f294b
                        • Instruction ID: 739b2cc389552b0461aad118b432b8feb4758c99ebdc470910dd2ea246023e95
                        • Opcode Fuzzy Hash: 2e2aa0bb859fcca3ebc82895491b995ebb111b6f29d0b4b62784b504001f294b
                        • Instruction Fuzzy Hash: 33718E3590010AEFDF14DF98CC49EBEBB78FF8A320F248159F915AA251C734AA51DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c3a0f6d11a4addd693aca4ea8420b49c542766f43d37aa07334ff9254c6485c7
                        • Instruction ID: cea88c3be4ed7bf68b19a026ee7e068a42996e4bfc19fcf064ab0f08fed4eb60
                        • Opcode Fuzzy Hash: c3a0f6d11a4addd693aca4ea8420b49c542766f43d37aa07334ff9254c6485c7
                        • Instruction Fuzzy Hash: 7A61C071508300ABEB11EF28CC81E6FB7E9AF84B14F004A1DF685972D2DB79AD05C792
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • IsWindow.USER32(01A048B8), ref: 0101B6A5
                        • IsWindowEnabled.USER32(01A048B8), ref: 0101B6B1
                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0101B795
                        • SendMessageW.USER32(01A048B8,000000B0,?,?), ref: 0101B7CC
                        • IsDlgButtonChecked.USER32(?,?), ref: 0101B809
                        • GetWindowLongW.USER32(01A048B8,000000EC), ref: 0101B82B
                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0101B843
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                        • String ID:
                        • API String ID: 4072528602-0
                        • Opcode ID: 938fde7fe6c52a2082e237f4066c1eae4082b02f813162f19ecfc4e562640129
                        • Instruction ID: 477265a2ddc8ee3a34f086df7a14fbb22a88a3e9af8d1bd1daeb89b4e9c65456
                        • Opcode Fuzzy Hash: 938fde7fe6c52a2082e237f4066c1eae4082b02f813162f19ecfc4e562640129
                        • Instruction Fuzzy Hash: 74717C34600205AFEB61DF68C8D4FAA7BF9FF5D340F084499EAC597269C73AA941CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 0100F75C
                        • _memset.LIBCMT ref: 0100F825
                        • ShellExecuteExW.SHELL32(?), ref: 0100F86A
                          • Part of subcall function 00F99997: __itow.LIBCMT ref: 00F999C2
                          • Part of subcall function 00F99997: __swprintf.LIBCMT ref: 00F99A0C
                          • Part of subcall function 00FAFEC6: _wcscpy.LIBCMT ref: 00FAFEE9
                        • GetProcessId.KERNEL32(00000000), ref: 0100F8E1
                        • CloseHandle.KERNEL32(00000000), ref: 0100F910
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                        • String ID: @
                        • API String ID: 3522835683-2766056989
                        • Opcode ID: 4aee3f35734deef0cf53d9e2e7f0e60fbc9f0fa4e64b297e79afb8de0efed42b
                        • Instruction ID: 67a3677c41e063d5023be1f3cf22a8f89a024ce840bf752f22d6badf0539c225
                        • Opcode Fuzzy Hash: 4aee3f35734deef0cf53d9e2e7f0e60fbc9f0fa4e64b297e79afb8de0efed42b
                        • Instruction Fuzzy Hash: 1A61A075A0061A9FEF15EF58C8809ADBBF4FF48310F15805DE889AB391CB34AE41DB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetParent.USER32(?), ref: 00FF149C
                        • GetKeyboardState.USER32(?), ref: 00FF14B1
                        • SetKeyboardState.USER32(?), ref: 00FF1512
                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00FF1540
                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00FF155F
                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00FF15A5
                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00FF15C8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: bc26d0540ade0397344de82f8a3f63548dd921ec503e34c12320858fb46a9ff4
                        • Instruction ID: 02db668c7732717056bd2d48276181ac88949c7f7fe78604c7f92b22e9789fb8
                        • Opcode Fuzzy Hash: bc26d0540ade0397344de82f8a3f63548dd921ec503e34c12320858fb46a9ff4
                        • Instruction Fuzzy Hash: 8451F3A0A043D9BDFB3286348C45BBA7EA97F46324F0C4589E2D5868E2D3D99C94E750
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetParent.USER32(00000000), ref: 00FF12B5
                        • GetKeyboardState.USER32(?), ref: 00FF12CA
                        • SetKeyboardState.USER32(?), ref: 00FF132B
                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00FF1357
                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00FF1374
                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00FF13B8
                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00FF13D9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: f6b01f71218f41de5cbbfdf04c530f3e299022719e1e012cdcb232cca6e8b654
                        • Instruction ID: 69cbbe0541c7a52f05b41a541b416f38b77c2c45998b035486d6690c4c6ee4e6
                        • Opcode Fuzzy Hash: f6b01f71218f41de5cbbfdf04c530f3e299022719e1e012cdcb232cca6e8b654
                        • Instruction Fuzzy Hash: DD51F6A0D047DDBDFB3686248C45B7A7FA97F06310F088589E2D8568E2D395AC98F750
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _wcsncpy$LocalTime
                        • String ID:
                        • API String ID: 2945705084-0
                        • Opcode ID: 2b9678052e52ea3bae26ba26149e06249d1fb1322aefe3014fe29b0a89468981
                        • Instruction ID: d258043c56f9633abc6577883df687d6cf1efe859a9cf5e0c2455fb8cfb03b46
                        • Opcode Fuzzy Hash: 2b9678052e52ea3bae26ba26149e06249d1fb1322aefe3014fe29b0a89468981
                        • Instruction Fuzzy Hash: 0A41D665C2011876CB11EBB6CC869DFB3A8AF04710F508556F618E3522FB38E715EBA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FF48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FF38D3,?), ref: 00FF48C7
                          • Part of subcall function 00FF48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FF38D3,?), ref: 00FF48E0
                        • lstrcmpiW.KERNEL32(?,?), ref: 00FF38F3
                        • _wcscmp.LIBCMT ref: 00FF390F
                        • MoveFileW.KERNEL32(?,?), ref: 00FF3927
                        • _wcscat.LIBCMT ref: 00FF396F
                        • SHFileOperationW.SHELL32(?), ref: 00FF39DB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                        • String ID: \*.*
                        • API String ID: 1377345388-1173974218
                        • Opcode ID: 2ef75c12e2e575da17d2e73b6ee1cac85d52d246a14d9934bf04f29960d3dbdd
                        • Instruction ID: 9577fa9d8d4660012b251f92f78681656adc10cf077048400fee85a557ff6144
                        • Opcode Fuzzy Hash: 2ef75c12e2e575da17d2e73b6ee1cac85d52d246a14d9934bf04f29960d3dbdd
                        • Instruction Fuzzy Hash: 4F41967150C3489EC761EF64C881AEFB7ECAF84350F00192EF599D3161EA79D648DB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 01017519
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 010175C0
                        • IsMenu.USER32(?), ref: 010175D8
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 01017620
                        • DrawMenuBar.USER32 ref: 01017633
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Menu$Item$DrawInfoInsert_memset
                        • String ID: 0
                        • API String ID: 3866635326-4108050209
                        • Opcode ID: 207085c389e27ddd073be0f0285610c57df25b1efe52c42d6a46212e8fbcc813
                        • Instruction ID: 03db8445625895953048a139cbdebf4e2b7e5ca4913f5cdbfc54bb6f8fd43548
                        • Opcode Fuzzy Hash: 207085c389e27ddd073be0f0285610c57df25b1efe52c42d6a46212e8fbcc813
                        • Instruction Fuzzy Hash: 8C416C75A00209EFDB20DF58D884EAABBF8FF08350F048569FA9997254D739E954CF90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 0101125C
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 01011286
                        • FreeLibrary.KERNEL32(00000000), ref: 0101133D
                          • Part of subcall function 0101122D: RegCloseKey.ADVAPI32(?), ref: 010112A3
                          • Part of subcall function 0101122D: FreeLibrary.KERNEL32(?), ref: 010112F5
                          • Part of subcall function 0101122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 01011318
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 010112E0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                        • String ID:
                        • API String ID: 395352322-0
                        • Opcode ID: 014a0458e2e112a7cbd977604a63f89d49cbea38eb86d592690bdf711b96a954
                        • Instruction ID: ac709839298722c8c5dad70bf91dc79cf85fccf7187072d23f260fe69c275379
                        • Opcode Fuzzy Hash: 014a0458e2e112a7cbd977604a63f89d49cbea38eb86d592690bdf711b96a954
                        • Instruction Fuzzy Hash: CF3134B1901119BFEB19DBA4D885DFF77BCEF08340F004169F681E2144D7799E499BA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 0101655B
                        • GetWindowLongW.USER32(01A048B8,000000F0), ref: 0101658E
                        • GetWindowLongW.USER32(01A048B8,000000F0), ref: 010165C3
                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 010165F5
                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 0101661F
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 01016630
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0101664A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: LongWindow$MessageSend
                        • String ID:
                        • API String ID: 2178440468-0
                        • Opcode ID: 22a6cc911f76168c349dcd50088499b880f073c86628f7e4e7133a002d7e0d41
                        • Instruction ID: 32afaf7bb60fe48eeaa2f4320c81ef8a0fcec66680dc84a7645ba77901795973
                        • Opcode Fuzzy Hash: 22a6cc911f76168c349dcd50088499b880f073c86628f7e4e7133a002d7e0d41
                        • Instruction Fuzzy Hash: 51312874604211AFDB31CF68DC84F653BE1FB49750F1902A8F5818B2AECBBBA844CB41
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 010080A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 010080CB
                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 010064D9
                        • WSAGetLastError.WSOCK32(00000000), ref: 010064E8
                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 01006521
                        • connect.WSOCK32(00000000,?,00000010), ref: 0100652A
                        • WSAGetLastError.WSOCK32 ref: 01006534
                        • closesocket.WSOCK32(00000000), ref: 0100655D
                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 01006576
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                        • String ID:
                        • API String ID: 910771015-0
                        • Opcode ID: 4112e6a8c25d8c7919edca9e18f7d1717d89b01e72689131927e73b443e90da9
                        • Instruction ID: c3803b2d9f8b51171908c6db6c57d3a0667c63ec04485639eedcbe0943ccd830
                        • Opcode Fuzzy Hash: 4112e6a8c25d8c7919edca9e18f7d1717d89b01e72689131927e73b443e90da9
                        • Instruction Fuzzy Hash: BE319431600119ABEB119F18CC84BBD7BAAEB44711F014069FD85972C1CB7A9918CB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEE0FA
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FEE120
                        • SysAllocString.OLEAUT32(00000000), ref: 00FEE123
                        • SysAllocString.OLEAUT32 ref: 00FEE144
                        • SysFreeString.OLEAUT32 ref: 00FEE14D
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00FEE167
                        • SysAllocString.OLEAUT32(?), ref: 00FEE175
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: 78a7db062e0c1ba34bcf7f8a4138ca0f5a54894db4a9f472ae69f6f2e534d33f
                        • Instruction ID: 509d3cb7f9225dfa17a6bcf92a5ba2dcb08b8271309e4d56583bb7abc368d199
                        • Opcode Fuzzy Hash: 78a7db062e0c1ba34bcf7f8a4138ca0f5a54894db4a9f472ae69f6f2e534d33f
                        • Instruction Fuzzy Hash: CA21C832605109AFDB20EFA9DC88DAB77ECEB09770B008125F954CB255DB79DC85DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F91D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F91D73
                          • Part of subcall function 00F91D35: GetStockObject.GDI32(00000011), ref: 00F91D87
                          • Part of subcall function 00F91D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F91D91
                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 010178A1
                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 010178AE
                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 010178B9
                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 010178C8
                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 010178D4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$CreateObjectStockWindow
                        • String ID: Msctls_Progress32
                        • API String ID: 1025951953-3636473452
                        • Opcode ID: 5d670452494142c22cfd119df3a21e2f8fcd37134ba6c35e51ecd5a33e66d772
                        • Instruction ID: 0b2cc0cb6e4cd29aba97a0eefc58df4e655728b06a9c3c18e1ea592e6e2ae253
                        • Opcode Fuzzy Hash: 5d670452494142c22cfd119df3a21e2f8fcd37134ba6c35e51ecd5a33e66d772
                        • Instruction Fuzzy Hash: 9711B2B215021ABFEF159E64CC85EEB7F6DEF08798F014115FA44A6094CB769C21DBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00FB4292,?), ref: 00FB41E3
                        • GetProcAddress.KERNEL32(00000000), ref: 00FB41EA
                        • EncodePointer.KERNEL32(00000000), ref: 00FB41F6
                        • DecodePointer.KERNEL32(00000001,00FB4292,?), ref: 00FB4213
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                        • String ID: RoInitialize$combase.dll
                        • API String ID: 3489934621-340411864
                        • Opcode ID: e8a6cd27458f12216a2750175fd60dc19dfb385c82f1abbe7395e79531180ddb
                        • Instruction ID: 7fd99d3096cf19579bd558039cd645cc012a12cf69ed63ff6f7355a442930670
                        • Opcode Fuzzy Hash: e8a6cd27458f12216a2750175fd60dc19dfb385c82f1abbe7395e79531180ddb
                        • Instruction Fuzzy Hash: E3E012B4E90301AEDB306BB2EC09B8535A5B721702F508414F491DA088EBBF50959F04
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00FB41B8), ref: 00FB42B8
                        • GetProcAddress.KERNEL32(00000000), ref: 00FB42BF
                        • EncodePointer.KERNEL32(00000000), ref: 00FB42CA
                        • DecodePointer.KERNEL32(00FB41B8), ref: 00FB42E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                        • String ID: RoUninitialize$combase.dll
                        • API String ID: 3489934621-2819208100
                        • Opcode ID: 53bc816bf58dec2afd55ef5d69911f4dbc3475dd6307f959f4ede5de2ff0e5b9
                        • Instruction ID: 0ef76ac7732dbcbc0b9ac107c499949acb1747def8a74611c6eed9827fbde31a
                        • Opcode Fuzzy Hash: 53bc816bf58dec2afd55ef5d69911f4dbc3475dd6307f959f4ede5de2ff0e5b9
                        • Instruction Fuzzy Hash: A3E0BF78681311ABDB30AB71ED0DB853EA8B724752F504018F881D5048DB7E5554EB18
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memmove$__itow__swprintf
                        • String ID:
                        • API String ID: 3253778849-0
                        • Opcode ID: 2bac77bd924f1e60215469b8f8b5039679a19164115d0391ecead73dde7c98c6
                        • Instruction ID: d0e6beca44531bf738afe95173b8c5c71bcdcf40d57351dd69386d9822e40833
                        • Opcode Fuzzy Hash: 2bac77bd924f1e60215469b8f8b5039679a19164115d0391ecead73dde7c98c6
                        • Instruction Fuzzy Hash: 1961BE3150425E9BDF11FF64CC82EFE37A8AF44348F054519FA559B2A2DF789901EB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                          • Part of subcall function 010110A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,01010038,?,?), ref: 010110BC
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01010548
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 01010588
                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 010105AB
                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 010105D4
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 01010617
                        • RegCloseKey.ADVAPI32(00000000), ref: 01010624
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                        • String ID:
                        • API String ID: 4046560759-0
                        • Opcode ID: 0d3806a95d9181c40c857031a29003a86e416d45c9929f9017126e6fcf67761a
                        • Instruction ID: 101957780ec1d2066f05305d955c720d9a408ac78051623976e87fa9a1096e27
                        • Opcode Fuzzy Hash: 0d3806a95d9181c40c857031a29003a86e416d45c9929f9017126e6fcf67761a
                        • Instruction Fuzzy Hash: 42514331608200AFDB15EB68CC85E6BBBE8EF88714F04491DF5858B2A5DB39E944DB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetMenu.USER32(?), ref: 01015A82
                        • GetMenuItemCount.USER32(00000000), ref: 01015AB9
                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 01015AE1
                        • GetMenuItemID.USER32(?,?), ref: 01015B50
                        • GetSubMenu.USER32(?,?), ref: 01015B5E
                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 01015BAF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Menu$Item$CountMessagePostString
                        • String ID:
                        • API String ID: 650687236-0
                        • Opcode ID: 7c2b04536da7589255c3144519e518b5048d4b074d0a9f56c54caec0b677c03f
                        • Instruction ID: 433ccb66998a43cef279d791550e3eaa878d0baeea70d6d4f73def84208be079
                        • Opcode Fuzzy Hash: 7c2b04536da7589255c3144519e518b5048d4b074d0a9f56c54caec0b677c03f
                        • Instruction Fuzzy Hash: 49518F35A00215AFDF11DF68CC85AAEB7B4FF49310F104499E941BB355CB79AE419F90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00FEF3F7
                        • VariantClear.OLEAUT32(00000013), ref: 00FEF469
                        • VariantClear.OLEAUT32(00000000), ref: 00FEF4C4
                        • _memmove.LIBCMT ref: 00FEF4EE
                        • VariantClear.OLEAUT32(?), ref: 00FEF53B
                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00FEF569
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Variant$Clear$ChangeInitType_memmove
                        • String ID:
                        • API String ID: 1101466143-0
                        • Opcode ID: 2b036a81e8c6bef6197368823c703412a4ac6de58ab1dfa0210b954fae59e29d
                        • Instruction ID: b801822a8468be50e671971fad91c1e3c5efabee0f75cb2f7584c80e34e88b2f
                        • Opcode Fuzzy Hash: 2b036a81e8c6bef6197368823c703412a4ac6de58ab1dfa0210b954fae59e29d
                        • Instruction Fuzzy Hash: 8A5168B5A0024AEFCB10CF58D880AAAB7B8FF4C354B158169E959DB344D734E915CFA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00FF2747
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FF2792
                        • IsMenu.USER32(00000000), ref: 00FF27B2
                        • CreatePopupMenu.USER32 ref: 00FF27E6
                        • GetMenuItemCount.USER32(000000FF), ref: 00FF2844
                        • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00FF2875
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                        • String ID:
                        • API String ID: 3311875123-0
                        • Opcode ID: 8f7a16c3d73acf118566bbc5ff6b43ba2e3a5dc6cbd93349d97b68d862d87a1e
                        • Instruction ID: a2732477f5886874d6c7ecb850592c489ef82a7e35f299a0ed1205a873f19612
                        • Opcode Fuzzy Hash: 8f7a16c3d73acf118566bbc5ff6b43ba2e3a5dc6cbd93349d97b68d862d87a1e
                        • Instruction Fuzzy Hash: 5A51AE70A0024EEBDF64CFA8C888BBEBBF5BF44364F10415AEA159B2A0D7759904DB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                        • BeginPaint.USER32(?,?,?,?,?,?), ref: 00F9179A
                        • GetWindowRect.USER32(?,?), ref: 00F917FE
                        • ScreenToClient.USER32(?,?), ref: 00F9181B
                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F9182C
                        • EndPaint.USER32(?,?), ref: 00F91876
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: PaintWindow$BeginClientLongRectScreenViewport
                        • String ID:
                        • API String ID: 1827037458-0
                        • Opcode ID: 3066dab6ac8d7df4634cac797bd28bb49877278e6b03d288917c648c222ca6a4
                        • Instruction ID: 8f4b47f8a949e1e7423d9bc588f019612b34edbd387ed0eaa4d18c583f728b6d
                        • Opcode Fuzzy Hash: 3066dab6ac8d7df4634cac797bd28bb49877278e6b03d288917c648c222ca6a4
                        • Instruction Fuzzy Hash: 4341A171500302AFEB21DF24C885FB77BF8FB5A724F140668F994872A1C73A9845EB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ShowWindow.USER32(010567B0,00000000,01A048B8,?,?,010567B0,?,0101B862,?,?), ref: 0101B9CC
                        • EnableWindow.USER32(00000000,00000000), ref: 0101B9F0
                        • ShowWindow.USER32(010567B0,00000000,01A048B8,?,?,010567B0,?,0101B862,?,?), ref: 0101BA50
                        • ShowWindow.USER32(00000000,00000004,?,0101B862,?,?), ref: 0101BA62
                        • EnableWindow.USER32(00000000,00000001), ref: 0101BA86
                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0101BAA9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$Show$Enable$MessageSend
                        • String ID:
                        • API String ID: 642888154-0
                        • Opcode ID: f2a0576f16cb84937c04593f98e227afc6fee7c2b5b11b82e31eca87bfe31124
                        • Instruction ID: a3fe46f0298d9fb695c2dead6c8ecc461ba53864589b6e9d0b2ee7894a9c1977
                        • Opcode Fuzzy Hash: f2a0576f16cb84937c04593f98e227afc6fee7c2b5b11b82e31eca87bfe31124
                        • Instruction Fuzzy Hash: 7E415131600241AFDB62CF28C489BA57FF1BB05315F5841E9FA888F2AAC739A446CB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetForegroundWindow.USER32(?,?,?,?,?,?,01005134,?,?,00000000,00000001), ref: 010073BF
                          • Part of subcall function 01003C94: GetWindowRect.USER32(?,?), ref: 01003CA7
                        • GetDesktopWindow.USER32 ref: 010073E9
                        • GetWindowRect.USER32(00000000), ref: 010073F0
                        • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 01007422
                          • Part of subcall function 00FF54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF555E
                        • GetCursorPos.USER32(?), ref: 0100744E
                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 010074AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                        • String ID:
                        • API String ID: 4137160315-0
                        • Opcode ID: 035b26668a76aba146a1faaf20a7d2c7cb7598bd85421204d983b7c71eff0ab7
                        • Instruction ID: 4d53350cab97a52d3b71d6a1093cfadceabacca86a70ab8ff4d622e5c7a114d8
                        • Opcode Fuzzy Hash: 035b26668a76aba146a1faaf20a7d2c7cb7598bd85421204d983b7c71eff0ab7
                        • Instruction Fuzzy Hash: 7131A172504316ABD721DF54D849F9BBBE9FF88314F000919F6C997181CB79EA09CB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FE85F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FE8608
                          • Part of subcall function 00FE85F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FE8612
                          • Part of subcall function 00FE85F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FE8621
                          • Part of subcall function 00FE85F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FE8628
                          • Part of subcall function 00FE85F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FE863E
                        • GetLengthSid.ADVAPI32(?,00000000,00FE8977), ref: 00FE8DAC
                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00FE8DB8
                        • HeapAlloc.KERNEL32(00000000), ref: 00FE8DBF
                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00FE8DD8
                        • GetProcessHeap.KERNEL32(00000000,00000000,00FE8977), ref: 00FE8DEC
                        • HeapFree.KERNEL32(00000000), ref: 00FE8DF3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                        • String ID:
                        • API String ID: 3008561057-0
                        • Opcode ID: 5dd7ceda39959f70441bbf9d12c772726359b28033dfc967ea9d9eca115e90ea
                        • Instruction ID: be05fe45ca22e0151813007f65909fcc7410ab21487540ceb642f1e3bc88b4c5
                        • Opcode Fuzzy Hash: 5dd7ceda39959f70441bbf9d12c772726359b28033dfc967ea9d9eca115e90ea
                        • Instruction Fuzzy Hash: AA11B131900605FFDB21EFA5CC09BAE77A9EF553A5F104119F88997240CB3A9905EB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00FE8B2A
                        • OpenProcessToken.ADVAPI32(00000000), ref: 00FE8B31
                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00FE8B40
                        • CloseHandle.KERNEL32(00000004), ref: 00FE8B4B
                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FE8B7A
                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00FE8B8E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                        • String ID:
                        • API String ID: 1413079979-0
                        • Opcode ID: 0f187d1fc340a69cf41f7b970e1b05b95b5dfc7653e01265c98e7b0c9a5ed133
                        • Instruction ID: 0781ac45a6f86eaf9f099fd27ecf934d8263c8e2648bb7f03768b658cb64c089
                        • Opcode Fuzzy Hash: 0f187d1fc340a69cf41f7b970e1b05b95b5dfc7653e01265c98e7b0c9a5ed133
                        • Instruction Fuzzy Hash: B7118CB250024AABDF11DFA4DD49FDA7BA9FF48358F044015FE08A2060C77A8D65EB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F912F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F9134D
                          • Part of subcall function 00F912F3: SelectObject.GDI32(?,00000000), ref: 00F9135C
                          • Part of subcall function 00F912F3: BeginPath.GDI32(?), ref: 00F91373
                          • Part of subcall function 00F912F3: SelectObject.GDI32(?,00000000), ref: 00F9139C
                        • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0101C1C4
                        • LineTo.GDI32(00000000,00000003,?), ref: 0101C1D8
                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0101C1E6
                        • LineTo.GDI32(00000000,00000000,?), ref: 0101C1F6
                        • EndPath.GDI32(00000000), ref: 0101C206
                        • StrokePath.GDI32(00000000), ref: 0101C216
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                        • String ID:
                        • API String ID: 43455801-0
                        • Opcode ID: dd429996f213b807add143e5f1a5fdba6ecead653497dcf565779b9df0cedbee
                        • Instruction ID: 92dd3ac92fe04688dfe7ad077439246fc078c0cdc166c70fb8bb36a34ce806ad
                        • Opcode Fuzzy Hash: dd429996f213b807add143e5f1a5fdba6ecead653497dcf565779b9df0cedbee
                        • Instruction Fuzzy Hash: 49111E7640010DBFEF229F94DC48EEA7FADEB04354F048051FA5846165C77A9E59DBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FB03D3
                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00FB03DB
                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FB03E6
                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FB03F1
                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00FB03F9
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FB0401
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Virtual
                        • String ID:
                        • API String ID: 4278518827-0
                        • Opcode ID: fdea3d509cca070ae2f794051c4ac75159c458f9c1795713a85e26296b373cf5
                        • Instruction ID: 04d135753d54c82f1ce9a57e0e06ff83cc8c8f11549f5dd7a2a1cbc4ce11b84c
                        • Opcode Fuzzy Hash: fdea3d509cca070ae2f794051c4ac75159c458f9c1795713a85e26296b373cf5
                        • Instruction Fuzzy Hash: F0016CB0901B5A7DE3008F6A8C85B52FFA8FF19354F00411BA15C47941C7F5A868CBE5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00FF569B
                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00FF56B1
                        • GetWindowThreadProcessId.USER32(?,?), ref: 00FF56C0
                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF56CF
                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF56D9
                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FF56E0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                        • String ID:
                        • API String ID: 839392675-0
                        • Opcode ID: b19a1403ef4f31b4f978f2374e1dc0d6d41102cb8ff29ce668101dbe6356c04e
                        • Instruction ID: d30904661dab90db3466210303887e984e9a75ffc14eb029c4103e7c28322781
                        • Opcode Fuzzy Hash: b19a1403ef4f31b4f978f2374e1dc0d6d41102cb8ff29ce668101dbe6356c04e
                        • Instruction Fuzzy Hash: C2F0903224151ABBE3315AA2DC0DEEF7B7CEFCBB21F000159FA44D1040D7AA1A0587B5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InterlockedExchange.KERNEL32(?,?), ref: 00FF74E5
                        • EnterCriticalSection.KERNEL32(?,?,00FA1044,?,?), ref: 00FF74F6
                        • TerminateThread.KERNEL32(00000000,000001F6,?,00FA1044,?,?), ref: 00FF7503
                        • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00FA1044,?,?), ref: 00FF7510
                          • Part of subcall function 00FF6ED7: CloseHandle.KERNEL32(00000000,?,00FF751D,?,00FA1044,?,?), ref: 00FF6EE1
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FF7523
                        • LeaveCriticalSection.KERNEL32(?,?,00FA1044,?,?), ref: 00FF752A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                        • String ID:
                        • API String ID: 3495660284-0
                        • Opcode ID: f3c51060c22c3ba37f71007f7b5785cb73516826ea7abb2e9ede62c51deb0207
                        • Instruction ID: f78d62b84868d21c86c9710cc70018d536a0dd35ebaee650b4ab6fd0fc22ad85
                        • Opcode Fuzzy Hash: f3c51060c22c3ba37f71007f7b5785cb73516826ea7abb2e9ede62c51deb0207
                        • Instruction Fuzzy Hash: 0FF0827A540713EBDB212B64FC8C9EB773AFF45322B040621F642E10A8DBBE5819DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FE8E7F
                        • UnloadUserProfile.USERENV(?,?), ref: 00FE8E8B
                        • CloseHandle.KERNEL32(?), ref: 00FE8E94
                        • CloseHandle.KERNEL32(?), ref: 00FE8E9C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00FE8EA5
                        • HeapFree.KERNEL32(00000000), ref: 00FE8EAC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                        • String ID:
                        • API String ID: 146765662-0
                        • Opcode ID: 6e4d38604d2b62773bfd6a0b74f3f31e73e02f4e4739f91c632e0358e6d82261
                        • Instruction ID: 77187c5b7678651b70aa12be71918144b8a54512a7ef459dbd315f2e6e20cb8b
                        • Opcode Fuzzy Hash: 6e4d38604d2b62773bfd6a0b74f3f31e73e02f4e4739f91c632e0358e6d82261
                        • Instruction Fuzzy Hash: 28E0E536104402BBDB112FE1EC0C90ABF79FF8A322B108220F259C1078CB3F9428DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • VariantInit.OLEAUT32(?), ref: 01008928
                        • CharUpperBuffW.USER32(?,?), ref: 01008A37
                        • VariantClear.OLEAUT32(?), ref: 01008BAF
                          • Part of subcall function 00FF7804: VariantInit.OLEAUT32(00000000), ref: 00FF7844
                          • Part of subcall function 00FF7804: VariantCopy.OLEAUT32(00000000,?), ref: 00FF784D
                          • Part of subcall function 00FF7804: VariantClear.OLEAUT32(00000000), ref: 00FF7859
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$BuffCharCopyUpper
                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                        • API String ID: 4237274167-1221869570
                        • Opcode ID: 00764966e44dbbd674aea0cce15fae43abd7a9ec036447c83c844f109af942bd
                        • Instruction ID: f8017c79874c03da4d2524e60806e2d89b39c70086bfd5dac861858dc469b5a9
                        • Opcode Fuzzy Hash: 00764966e44dbbd674aea0cce15fae43abd7a9ec036447c83c844f109af942bd
                        • Instruction Fuzzy Hash: ED918370A087019FDB11EF28C88495BBBE4FF89714F04896EF9968B3A1DB35D905CB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FAFEC6: _wcscpy.LIBCMT ref: 00FAFEE9
                        • _memset.LIBCMT ref: 00FF3077
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FF30A6
                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FF3159
                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00FF3187
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$Default_memset_wcscpy
                        • String ID: 0
                        • API String ID: 4152858687-4108050209
                        • Opcode ID: 7c1b83cb6edf5a4255238c2fb775d2768fa788524d89d71772667f04b5b7e5dc
                        • Instruction ID: 91f0832b8d5f98666c52531918fcdb8a0d58461b8edbd6fc59ccdf5df76ab9d8
                        • Opcode Fuzzy Hash: 7c1b83cb6edf5a4255238c2fb775d2768fa788524d89d71772667f04b5b7e5dc
                        • Instruction Fuzzy Hash: 0B51E371E083049AD725AF28CC45A7BBBE4EF45364F040A2EFA85D31B1DB75CE44AB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FEDAC5
                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00FEDAFB
                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00FEDB0C
                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00FEDB8E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorMode$AddressCreateInstanceProc
                        • String ID: DllGetClassObject
                        • API String ID: 753597075-1075368562
                        • Opcode ID: ba61bfae0759847052bf1b3c39cf9dd46e0ec11ead59df866e86a00a7a195a19
                        • Instruction ID: 1d242c0ebca7966c3b2cd809b9f59a97376977f0824d2d8a93fcbdbfe617dd65
                        • Opcode Fuzzy Hash: ba61bfae0759847052bf1b3c39cf9dd46e0ec11ead59df866e86a00a7a195a19
                        • Instruction Fuzzy Hash: 9041E3B1600248EFDB15CF56C884B9A7BB9EF88350F1180ADED059F205E7B5DD44EBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00FF2CAF
                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00FF2CCB
                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00FF2D11
                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01056890,00000000), ref: 00FF2D5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Menu$Delete$InfoItem_memset
                        • String ID: 0
                        • API String ID: 1173514356-4108050209
                        • Opcode ID: 3e55eef1e7b945dc729a01d38dac7dbaf8d91483bd6fac197360dfcee20ffe8e
                        • Instruction ID: 74b8e89328885447568af0b2efca415c826fbcab6796e3e797c825fcba960698
                        • Opcode Fuzzy Hash: 3e55eef1e7b945dc729a01d38dac7dbaf8d91483bd6fac197360dfcee20ffe8e
                        • Instruction Fuzzy Hash: 5E41C3306043069FD720EF24CC85B6ABBE8EF85320F00465EFA65972A1D774E904DB92
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                          • Part of subcall function 00FEB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB0E7
                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00FE93F6
                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00FE9409
                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00FE9439
                          • Part of subcall function 00F97D2C: _memmove.LIBCMT ref: 00F97D66
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$_memmove$ClassName
                        • String ID: ComboBox$ListBox
                        • API String ID: 365058703-1403004172
                        • Opcode ID: ee81c636b1c89c2a625844a32a8526cf2cceabac5e56ef41eec30a55c3277a25
                        • Instruction ID: 1de1f1630537a84008c2ee8710fc22b8104439257c675787f139d34dda7d9ebe
                        • Opcode Fuzzy Hash: ee81c636b1c89c2a625844a32a8526cf2cceabac5e56ef41eec30a55c3277a25
                        • Instruction Fuzzy Hash: 3721E4B1D04204AFDB14ABB2DC858FFB768DF45760B108119F965971E1DB7D090AAA60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 01001B40
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 01001B66
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 01001B96
                        • InternetCloseHandle.WININET(00000000), ref: 01001BDD
                          • Part of subcall function 01002777: GetLastError.KERNEL32(?,?,01001B0B,00000000,00000000,00000001), ref: 0100278C
                          • Part of subcall function 01002777: SetEvent.KERNEL32(?,?,01001B0B,00000000,00000000,00000001), ref: 010027A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                        • String ID:
                        • API String ID: 3113390036-3916222277
                        • Opcode ID: 91f5362dc9c5d4f8161f6f25e3aaca21f8c68495c51d6b37fe478da727a176a5
                        • Instruction ID: ef74fabac451b8689889cf84059f08eeb37e8d120cd8efef5a9a6ca028f35237
                        • Opcode Fuzzy Hash: 91f5362dc9c5d4f8161f6f25e3aaca21f8c68495c51d6b37fe478da727a176a5
                        • Instruction Fuzzy Hash: C821BEB1600609BFFB229F249C84EBF76ECFB49754F00015AF585E2280EB35DD048BA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F91D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F91D73
                          • Part of subcall function 00F91D35: GetStockObject.GDI32(00000011), ref: 00F91D87
                          • Part of subcall function 00F91D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F91D91
                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 010166D0
                        • LoadLibraryW.KERNEL32(?), ref: 010166D7
                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 010166EC
                        • DestroyWindow.USER32(?), ref: 010166F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                        • String ID: SysAnimate32
                        • API String ID: 4146253029-1011021900
                        • Opcode ID: a7fa8df05b9a84ad1dae95f5ae665a12d95ea6a2c0df13560c6084bee32adab2
                        • Instruction ID: 5b6531d3ef017fc907fb4c5ec3dd98e1491818ae0c619baa403bbd531a09f136
                        • Opcode Fuzzy Hash: a7fa8df05b9a84ad1dae95f5ae665a12d95ea6a2c0df13560c6084bee32adab2
                        • Instruction Fuzzy Hash: 39219F71100206AFEF114E68EC90EBB77EDFB49368F104A69FA9092199D7BBCC519760
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetStdHandle.KERNEL32(0000000C), ref: 00FF705E
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FF7091
                        • GetStdHandle.KERNEL32(0000000C), ref: 00FF70A3
                        • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00FF70DD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CreateHandle$FilePipe
                        • String ID: nul
                        • API String ID: 4209266947-2873401336
                        • Opcode ID: 11ef68b88b7cf0a711ab24e3ee515bc726bc4c2b76d5abc116413d105ff36fd4
                        • Instruction ID: 3b4d796f2b68ee87ac07ea8f9b6ca7eef6da709b1cea6e87af4ed24ddd5c4fcb
                        • Opcode Fuzzy Hash: 11ef68b88b7cf0a711ab24e3ee515bc726bc4c2b76d5abc116413d105ff36fd4
                        • Instruction Fuzzy Hash: 8C21837590430EABDB20AF28DC05AAAB7A4AF44730F204619FEA1D72E0EB7198519B50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00FF712B
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FF715D
                        • GetStdHandle.KERNEL32(000000F6), ref: 00FF716E
                        • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00FF71A8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CreateHandle$FilePipe
                        • String ID: nul
                        • API String ID: 4209266947-2873401336
                        • Opcode ID: b3a408a384cf38d208946b8a2529f9bcc6744dbfa23f20df0b24114b78e526db
                        • Instruction ID: 5a29848564379c2b8c6fb88f36e1b6cd621c1b46bce09b6e1c0fed98a0522658
                        • Opcode Fuzzy Hash: b3a408a384cf38d208946b8a2529f9bcc6744dbfa23f20df0b24114b78e526db
                        • Instruction Fuzzy Hash: 9121B87590430E9BDB20AF689C04AB9F7E8AF55730F200619FEE1E72E0D7749849D750
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00FFAEBF
                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00FFAF13
                        • __swprintf.LIBCMT ref: 00FFAF2C
                        • SetErrorMode.KERNEL32(00000000,00000001,00000000,0101F910), ref: 00FFAF6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume__swprintf
                        • String ID: %lu
                        • API String ID: 3164766367-685833217
                        • Opcode ID: cdc6933de661df2ad350d6126a3e1afe5c2a74ff9362efc1cca6017d3ff84a21
                        • Instruction ID: 54b691f19c3b5a596ca364f979f5683e269740e971d0e6615b09f7bee25de451
                        • Opcode Fuzzy Hash: cdc6933de661df2ad350d6126a3e1afe5c2a74ff9362efc1cca6017d3ff84a21
                        • Instruction Fuzzy Hash: 38217171A0010DAFDB10EF65CD85DAE7BB8EF89704B004069F909EB251DB79EA45DB21
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97D2C: _memmove.LIBCMT ref: 00F97D66
                          • Part of subcall function 00FEA37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00FEA399
                          • Part of subcall function 00FEA37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FEA3AC
                          • Part of subcall function 00FEA37C: GetCurrentThreadId.KERNEL32 ref: 00FEA3B3
                          • Part of subcall function 00FEA37C: AttachThreadInput.USER32(00000000), ref: 00FEA3BA
                        • GetFocus.USER32 ref: 00FEA554
                          • Part of subcall function 00FEA3C5: GetParent.USER32(?), ref: 00FEA3D3
                        • GetClassNameW.USER32(?,?,00000100), ref: 00FEA59D
                        • EnumChildWindows.USER32(?,00FEA615), ref: 00FEA5C5
                        • __swprintf.LIBCMT ref: 00FEA5DF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                        • String ID: %s%d
                        • API String ID: 1941087503-1110647743
                        • Opcode ID: 14eeb0f64971dcc684c0402bfd97228375bf83d93bf600f1336ce2b4acc588ff
                        • Instruction ID: c7d3ac249de759b70ef6732a482dab0af346152807fbcda48876dc43f68e207f
                        • Opcode Fuzzy Hash: 14eeb0f64971dcc684c0402bfd97228375bf83d93bf600f1336ce2b4acc588ff
                        • Instruction Fuzzy Hash: 8C11E171600309BBDF20BF72DC85FEA3779AF49310F004079B908AA042CA796949AB32
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00FF2048
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: BuffCharUpper
                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                        • API String ID: 3964851224-769500911
                        • Opcode ID: e7204905fd90968b2785788cde2c7c4e38992d275855e6d754c370ed918adf65
                        • Instruction ID: b559b2a96e5873e823c063104873b540b531fb6b19305eb293e39f901589404e
                        • Opcode Fuzzy Hash: e7204905fd90968b2785788cde2c7c4e38992d275855e6d754c370ed918adf65
                        • Instruction Fuzzy Hash: 9D113C7195010ACFCF40EFA4D8815FEB7B4BF19304B108468E856673A1EF366906EF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0100EF1B
                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0100EF4B
                        • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0100F07E
                        • CloseHandle.KERNEL32(?), ref: 0100F0FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Process$CloseCountersHandleInfoMemoryOpen
                        • String ID:
                        • API String ID: 2364364464-0
                        • Opcode ID: 1b62ddfae890597fc8b09a9ba84847a760dbd9b075fdd25a8d99de36ceb676b5
                        • Instruction ID: b4ddb8749c8edb92d3c4041a552095c85f02af320b4689e1c616755b6ce97b2c
                        • Opcode Fuzzy Hash: 1b62ddfae890597fc8b09a9ba84847a760dbd9b075fdd25a8d99de36ceb676b5
                        • Instruction Fuzzy Hash: C7815E716043019FEB20EF28CC46B2EB7E5AF48720F05885DF599DB2D2DBB9AC419B51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                          • Part of subcall function 010110A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,01010038,?,?), ref: 010110BC
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01010388
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 010103C7
                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0101040E
                        • RegCloseKey.ADVAPI32(?,?), ref: 0101043A
                        • RegCloseKey.ADVAPI32(00000000), ref: 01010447
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                        • String ID:
                        • API String ID: 3440857362-0
                        • Opcode ID: 31e14cc5625598e981b2faa5e544339ed8af04651d2947c607f901aa24b5a21f
                        • Instruction ID: 807b9e17d6d754e0a5eab441c31ac1d301859c37465ddd13faf1139d1c59887a
                        • Opcode Fuzzy Hash: 31e14cc5625598e981b2faa5e544339ed8af04651d2947c607f901aa24b5a21f
                        • Instruction Fuzzy Hash: F2516871208305AFEB04EF68CC81E6EB7E8FF88704F04892DB59587295DB39E904DB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F99997: __itow.LIBCMT ref: 00F999C2
                          • Part of subcall function 00F99997: __swprintf.LIBCMT ref: 00F99A0C
                        • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0100DC3B
                        • GetProcAddress.KERNEL32(00000000,?), ref: 0100DCBE
                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0100DCDA
                        • GetProcAddress.KERNEL32(00000000,?), ref: 0100DD1B
                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0100DD35
                          • Part of subcall function 00F95B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7B20,?,?,00000000), ref: 00F95B8C
                          • Part of subcall function 00F95B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7B20,?,?,00000000,?,?), ref: 00F95BB0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                        • String ID:
                        • API String ID: 327935632-0
                        • Opcode ID: 331505bc306a62aeea706ad84af00d54b6f384d8822ddf23e173faf4842dae2d
                        • Instruction ID: 94375e2ed8b18ae9e3af29153cc7f863a9e802c322917139860873255a55d098
                        • Opcode Fuzzy Hash: 331505bc306a62aeea706ad84af00d54b6f384d8822ddf23e173faf4842dae2d
                        • Instruction Fuzzy Hash: AD514C35A0020A9FEB02EFA8C884D9DB7F4FF49310B058099E955AB351DB79AD45CF51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00FFE88A
                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00FFE8B3
                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00FFE8F2
                          • Part of subcall function 00F99997: __itow.LIBCMT ref: 00F999C2
                          • Part of subcall function 00F99997: __swprintf.LIBCMT ref: 00F99A0C
                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00FFE917
                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00FFE91F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                        • String ID:
                        • API String ID: 1389676194-0
                        • Opcode ID: 092d75ee19f6c9fd2660cd6e1cacc981c2f3f2804d1fc94b51271c0e37841995
                        • Instruction ID: 62054e56a328b15a8f06fcfc991e8f356c266aab948889f55743ebf712ecd025
                        • Opcode Fuzzy Hash: 092d75ee19f6c9fd2660cd6e1cacc981c2f3f2804d1fc94b51271c0e37841995
                        • Instruction Fuzzy Hash: 4A513A35A00209DFDF11EF64C981AAEBBF5FF08314B148099E949AB361CB79ED11EB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: aa2c86ec9098d4652d26669057c51b7a217f12f37af28d217077f956b626c2ca
                        • Instruction ID: 62f2dcc38684c69f55a1d8c20999fc81a08dc68a7983a5950f3a8064fd386240
                        • Opcode Fuzzy Hash: aa2c86ec9098d4652d26669057c51b7a217f12f37af28d217077f956b626c2ca
                        • Instruction Fuzzy Hash: 0441D435A02284EFD760DB6CCC44FA9BBA4EB09310F0482A5FAD5A72D9D779A941CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCursorPos.USER32(?), ref: 00F92357
                        • ScreenToClient.USER32(010567B0,?), ref: 00F92374
                        • GetAsyncKeyState.USER32(00000001), ref: 00F92399
                        • GetAsyncKeyState.USER32(00000002), ref: 00F923A7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AsyncState$ClientCursorScreen
                        • String ID:
                        • API String ID: 4210589936-0
                        • Opcode ID: 0c99b050a81821aefb635c2ea7f046d24b5760687804c9c116cf1efcad961452
                        • Instruction ID: dad957d047223d2ae31c7928b1f2b0bc4cfed4d0e89b212c8501130916b744d2
                        • Opcode Fuzzy Hash: 0c99b050a81821aefb635c2ea7f046d24b5760687804c9c116cf1efcad961452
                        • Instruction Fuzzy Hash: 10419F3690411AFBDF559FA8CC44FEDBB74FB05370F20431AE86892290C779A994EB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FE695D
                        • TranslateAcceleratorW.USER32(?,?,?), ref: 00FE69A9
                        • TranslateMessage.USER32(?), ref: 00FE69D2
                        • DispatchMessageW.USER32(?), ref: 00FE69DC
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FE69EB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Message$PeekTranslate$AcceleratorDispatch
                        • String ID:
                        • API String ID: 2108273632-0
                        • Opcode ID: 76d9f17846e44cc8d5c39ffd0afcee84fbf41d526118fadc63667dfad3d61908
                        • Instruction ID: 917a2a8e508a610e0b1fdb827664cb46a2859368926d47804d35ab922c88cc97
                        • Opcode Fuzzy Hash: 76d9f17846e44cc8d5c39ffd0afcee84fbf41d526118fadc63667dfad3d61908
                        • Instruction Fuzzy Hash: D631F671D0038EAADB70CE72DC84FBB7BACAB25790F104165E461D3056E73E9889E790
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00FE8F12
                        • PostMessageW.USER32(?,00000201,00000001), ref: 00FE8FBC
                        • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00FE8FC4
                        • PostMessageW.USER32(?,00000202,00000000), ref: 00FE8FD2
                        • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00FE8FDA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessagePostSleep$RectWindow
                        • String ID:
                        • API String ID: 3382505437-0
                        • Opcode ID: 068a0008970c0f692aa8f2bddd6fccbbdb219eb83b0e540964e4894d53d75fe6
                        • Instruction ID: 5b256382b43b6622add4c6c3317b54ea3c8ea28dd157d9aad86173387ff08f7e
                        • Opcode Fuzzy Hash: 068a0008970c0f692aa8f2bddd6fccbbdb219eb83b0e540964e4894d53d75fe6
                        • Instruction Fuzzy Hash: D1312171900299EFDF10DFA8D94CA9E3BB6FB04325F104219F928E71D0C7B49914EB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • IsWindowVisible.USER32(?), ref: 00FEB6C7
                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00FEB6E4
                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00FEB71C
                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00FEB742
                        • _wcsstr.LIBCMT ref: 00FEB74C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                        • String ID:
                        • API String ID: 3902887630-0
                        • Opcode ID: 7d61047b69f0c2dde99f93b882c80562ff7c4ca6e3dd403d42d2a899ac90e89a
                        • Instruction ID: bdd61f907a477d08912ed3b5be1740252f02fed38b6e6d42688b58a483528e2a
                        • Opcode Fuzzy Hash: 7d61047b69f0c2dde99f93b882c80562ff7c4ca6e3dd403d42d2a899ac90e89a
                        • Instruction Fuzzy Hash: 82210B32604245BBEB255B7BDC49E7B7B9CDF89760F004069FC05CA195EF69DC40A760
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                        • GetWindowLongW.USER32(?,000000F0), ref: 0101B44C
                        • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0101B471
                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0101B489
                        • GetSystemMetrics.USER32(00000004), ref: 0101B4B2
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,01001184,00000000), ref: 0101B4D0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$Long$MetricsSystem
                        • String ID:
                        • API String ID: 2294984445-0
                        • Opcode ID: 739b50d8b1d95bdb2c34b33140ba2f174a92127a0b4a4110430ab59ee86f3222
                        • Instruction ID: 6cf4cec84e46985a3736d1640b0ccd61686ab5bce679dfda2cdcca9add404fdb
                        • Opcode Fuzzy Hash: 739b50d8b1d95bdb2c34b33140ba2f174a92127a0b4a4110430ab59ee86f3222
                        • Instruction Fuzzy Hash: 2F21B571650216AFDB608E78DC04B6A3BB4FB05724F108768FEA6C31D8EB399811CB80
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FE9802
                          • Part of subcall function 00F97D2C: _memmove.LIBCMT ref: 00F97D66
                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FE9834
                        • __itow.LIBCMT ref: 00FE984C
                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FE9874
                        • __itow.LIBCMT ref: 00FE9885
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$__itow$_memmove
                        • String ID:
                        • API String ID: 2983881199-0
                        • Opcode ID: 0af3a2e3491b0df2df217abd79015a711b7e555c93de8176fa6ab120c38946ba
                        • Instruction ID: 7a2581f4af3f8f977a74ec2140b6bb1e0e2eb4a65692346f1ab44f03c80b4ee4
                        • Opcode Fuzzy Hash: 0af3a2e3491b0df2df217abd79015a711b7e555c93de8176fa6ab120c38946ba
                        • Instruction Fuzzy Hash: 3A210A35B04344ABEF10EA728C86EEE3BA8DF49720F440029FD04DB251E6B48E45A7E1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F9134D
                        • SelectObject.GDI32(?,00000000), ref: 00F9135C
                        • BeginPath.GDI32(?), ref: 00F91373
                        • SelectObject.GDI32(?,00000000), ref: 00F9139C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: a504c560b21ec1605ec03ac246ffac6f7d56361a6ef1509a63331dbc8688940e
                        • Instruction ID: 1aa2e53ba7ddddac1472835f57ab0cc0e6c336d70c1e34e2f96d92dd0e119501
                        • Opcode Fuzzy Hash: a504c560b21ec1605ec03ac246ffac6f7d56361a6ef1509a63331dbc8688940e
                        • Instruction Fuzzy Hash: 072171B1C00306EFEF218F25D905B7A7BB8FB10321F644326F89196194D77B9995EB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: e6d01f0164510af9c903cc0e3bd21114a11f8ca13ca5681e2d6dbe40bd4dd299
                        • Instruction ID: 092f6e2ef0d7f7815c7f966e4cffab57a1792da6b422bac1d2f73706e3cc6ea7
                        • Opcode Fuzzy Hash: e6d01f0164510af9c903cc0e3bd21114a11f8ca13ca5681e2d6dbe40bd4dd299
                        • Instruction Fuzzy Hash: BA0128B3A042197BE204A6638C52FEB735DAF213A4F444024FD049B243E758DE12A6E1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00FF4D5C
                        • __beginthreadex.LIBCMT ref: 00FF4D7A
                        • MessageBoxW.USER32(?,?,?,?), ref: 00FF4D8F
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00FF4DA5
                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00FF4DAC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                        • String ID:
                        • API String ID: 3824534824-0
                        • Opcode ID: fc15ac626b7bae6ad165052e59c18777c6ddaacf3e12d4ca3c888a55b6958ce5
                        • Instruction ID: a2c98d2ddf1da1653a61e22ea4b681645fb2a48fbd6f0e31541ad0a0640a799f
                        • Opcode Fuzzy Hash: fc15ac626b7bae6ad165052e59c18777c6ddaacf3e12d4ca3c888a55b6958ce5
                        • Instruction Fuzzy Hash: 9F11E1B2904609ABC7219BA89C08AAF7BACEF45360F144355FA54D3261D67E9D048BA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FE8766
                        • GetLastError.KERNEL32(?,00FE822A,?,?,?), ref: 00FE8770
                        • GetProcessHeap.KERNEL32(00000008,?,?,00FE822A,?,?,?), ref: 00FE877F
                        • HeapAlloc.KERNEL32(00000000,?,00FE822A,?,?,?), ref: 00FE8786
                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FE879D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 842720411-0
                        • Opcode ID: 18214e0340398564694bbd83c348ea8381144bdb92b27fe042df913adb8898d5
                        • Instruction ID: 089fd86cc99649c22c48eb50877f05c02693432a6d93f33e049e941e0732e724
                        • Opcode Fuzzy Hash: 18214e0340398564694bbd83c348ea8381144bdb92b27fe042df913adb8898d5
                        • Instruction Fuzzy Hash: 70016D71640245BFDB205FB6DC88D6B7BACFF8A3A57200569F88DC2250DA368C05DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5502
                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FF5510
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF5518
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FF5522
                        • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF555E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: PerformanceQuery$CounterSleep$Frequency
                        • String ID:
                        • API String ID: 2833360925-0
                        • Opcode ID: 90096b40a7593747d34b354e2ef9b0f192c8a8022f5fe174c47b0aa8c2e36110
                        • Instruction ID: bd41ad7e04d3f97d6c75d17b2269cf7bd74508e94e1ddf89e4bb5be6ad71ce21
                        • Opcode Fuzzy Hash: 90096b40a7593747d34b354e2ef9b0f192c8a8022f5fe174c47b0aa8c2e36110
                        • Instruction Fuzzy Hash: 1B015B36C00A2EDBCF10EFE8E849AEDBB78BF09B15F080146EA41F2144DB395554D7A1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE758C,80070057,?,?,?,00FE799D), ref: 00FE766F
                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE758C,80070057,?,?), ref: 00FE768A
                        • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE758C,80070057,?,?), ref: 00FE7698
                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE758C,80070057,?), ref: 00FE76A8
                        • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FE758C,80070057,?,?), ref: 00FE76B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: From$Prog$FreeStringTasklstrcmpi
                        • String ID:
                        • API String ID: 3897988419-0
                        • Opcode ID: cb639f592b854cc28e9594f71bcd429c6ab603183ab55d9604f6cfa5d935c860
                        • Instruction ID: b1e40fc0e33b42ddac4fb525001d10d1f44801b39844ea7c8c9f06d47d8d97ae
                        • Opcode Fuzzy Hash: cb639f592b854cc28e9594f71bcd429c6ab603183ab55d9604f6cfa5d935c860
                        • Instruction Fuzzy Hash: 4E01D472600715BBDB20AF59DC04BAA7BACEB44765F100018FD04D2205E73ADD00ABA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FE8608
                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FE8612
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FE8621
                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FE8628
                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FE863E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: f42dd4e3b036155c685e18bd34b62933ad07a71041aa6c3692d55d61af03d583
                        • Instruction ID: a35bee9d51e437ae5278b19fda4b9de643c0e00672ae7fbbb3860ad1f0a39539
                        • Opcode Fuzzy Hash: f42dd4e3b036155c685e18bd34b62933ad07a71041aa6c3692d55d61af03d583
                        • Instruction Fuzzy Hash: 2AF06875241205AFD7211FA5DC8DE6B3BACFF467A4B004515F549C7140CB799C45DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FE8669
                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8673
                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8682
                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8689
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE869F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: 1b85f1af9162f92e75665757dc6e4bb2ebf31da140db40033c44d15e9fbdd087
                        • Instruction ID: 850292bef2a2e8874e2188836a1e8ce6bfb3e6894fc8ccf8db20a6817e9141f6
                        • Opcode Fuzzy Hash: 1b85f1af9162f92e75665757dc6e4bb2ebf31da140db40033c44d15e9fbdd087
                        • Instruction Fuzzy Hash: 4CF06275240345AFEB212FA5EC88E673BACEF8A7A4B100155F989C6140CB7ADD45EB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetDlgItem.USER32(?,000003E9), ref: 00FEC6BA
                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00FEC6D1
                        • MessageBeep.USER32(00000000), ref: 00FEC6E9
                        • KillTimer.USER32(?,0000040A), ref: 00FEC705
                        • EndDialog.USER32(?,00000001), ref: 00FEC71F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                        • String ID:
                        • API String ID: 3741023627-0
                        • Opcode ID: ca298f493779d7f88407afce5831b2889e58a8970c21e660d191b94f000e5b7c
                        • Instruction ID: 0e089ece20337b60c3302d3d0293f37e1552da7dba6566e74e08366193735061
                        • Opcode Fuzzy Hash: ca298f493779d7f88407afce5831b2889e58a8970c21e660d191b94f000e5b7c
                        • Instruction Fuzzy Hash: 9401A230900749ABEB305F21DC4EF9677B8FF04701F000659F586A10D0EBE9A9599F80
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • EndPath.GDI32(?), ref: 00F913BF
                        • StrokeAndFillPath.GDI32(?,?,00FCBAD8,00000000,?), ref: 00F913DB
                        • SelectObject.GDI32(?,00000000), ref: 00F913EE
                        • DeleteObject.GDI32 ref: 00F91401
                        • StrokePath.GDI32(?), ref: 00F9141C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Path$ObjectStroke$DeleteFillSelect
                        • String ID:
                        • API String ID: 2625713937-0
                        • Opcode ID: 64d1ae8e4539cb605fb8c968024106629140b29a6a5e85d6550c46daebd44085
                        • Instruction ID: 91fdea384813c1e19d9751ca67e3f863c6ac3ff99761391cc1c4dd72fb1af442
                        • Opcode Fuzzy Hash: 64d1ae8e4539cb605fb8c968024106629140b29a6a5e85d6550c46daebd44085
                        • Instruction Fuzzy Hash: 09F0CD7000470A9BEF329F5AE80C7653BA4B711326F548324F4AA451E8C73F4595DF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FB0FF6: std::exception::exception.LIBCMT ref: 00FB102C
                          • Part of subcall function 00FB0FF6: __CxxThrowException@8.LIBCMT ref: 00FB1041
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                          • Part of subcall function 00F97BB1: _memmove.LIBCMT ref: 00F97C0B
                        • __swprintf.LIBCMT ref: 00FA302D
                        Strings
                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00FA2EC6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                        • API String ID: 1943609520-557222456
                        • Opcode ID: f50ad68919fb212c8894c927a31187bf61519bc12109de62b442000382874b6e
                        • Instruction ID: da34fe8a07dcf8e545bd6f0fb547f3c05b7346b36290548a7eee0f6884c32273
                        • Opcode Fuzzy Hash: f50ad68919fb212c8894c927a31187bf61519bc12109de62b442000382874b6e
                        • Instruction Fuzzy Hash: A4918D715087019FDB18FF24DC85C6EB7A8EF95750F04491EF4829B2A1EA34EE44EB52
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __startOneArgErrorHandling.LIBCMT ref: 00FB52DD
                          • Part of subcall function 00FC0340: __87except.LIBCMT ref: 00FC037B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorHandling__87except__start
                        • String ID: pow
                        • API String ID: 2905807303-2276729525
                        • Opcode ID: cdcf72b3b6d3f032830dacde9188c79be61e17b9288ba707e738fe0773044907
                        • Instruction ID: 4230f4f61966a427d47d72745f7dff4861117aca4c6ec1b00e9b152e5482d86a
                        • Opcode Fuzzy Hash: cdcf72b3b6d3f032830dacde9188c79be61e17b9288ba707e738fe0773044907
                        • Instruction Fuzzy Hash: 0F515971E09602C7CB25BA25CA42BAA3BD49B40B60F34495CE1D5822D9EE7D8CC5BE42
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID: #$+
                        • API String ID: 0-2552117581
                        • Opcode ID: 8a8085758ed58a0ca94cf42e00ec45fc3a39871a2694e0176a40ab459a3991a3
                        • Instruction ID: 68ff5b1d35c0e8071ee0b866fda5edcd535b85f8470aa537bc6805995ee890db
                        • Opcode Fuzzy Hash: 8a8085758ed58a0ca94cf42e00ec45fc3a39871a2694e0176a40ab459a3991a3
                        • Instruction Fuzzy Hash: AF513535908286DFDF259F2ACC886FE7BA4EF15720F184055EC919B2A0CB349C46EB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memset$_memmove
                        • String ID: ERCP
                        • API String ID: 2532777613-1384759551
                        • Opcode ID: a28ebef32dfd6e8fa941b4c9d47e69ba467de04a10c00b8dcf2ddbed52f8406a
                        • Instruction ID: aa8070a7ce24aa92409f8628eadfd5a0cedd7360c0a676e1e09f6e905fd84510
                        • Opcode Fuzzy Hash: a28ebef32dfd6e8fa941b4c9d47e69ba467de04a10c00b8dcf2ddbed52f8406a
                        • Instruction Fuzzy Hash: 5851A1B1900309DBDB24CF66C8817AABBF8FF08724F24856EE94AC7241E735D994DB40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0101F910,00000000,?,?,?,?), ref: 01017C4E
                        • GetWindowLongW.USER32 ref: 01017C6B
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 01017C7B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID: SysTreeView32
                        • API String ID: 847901565-1698111956
                        • Opcode ID: 0e54ac5021056b1997285ad63f80e61d8cfc9c7dd7b0d331d49b7b2f2c9b19ea
                        • Instruction ID: 4358f0db22e8d71242de6d42bb5b09e41521b4cc2a164e382f7078f6f2025b45
                        • Opcode Fuzzy Hash: 0e54ac5021056b1997285ad63f80e61d8cfc9c7dd7b0d331d49b7b2f2c9b19ea
                        • Instruction Fuzzy Hash: 2131B23124020AAFEB618E38CC41BDA7BA9FB45324F204729F9B5931E4D739E8519B50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 010176D0
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 010176E4
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 01017708
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$Window
                        • String ID: SysMonthCal32
                        • API String ID: 2326795674-1439706946
                        • Opcode ID: 10b2826ea2a30af8cd048c73938ebc50e03497f9426d37aedbe973d33e15ff3c
                        • Instruction ID: 7fa0a6de41a944ea9ef27269b8c3e08e55c582fc05b5dafee1edcbc48cd857dd
                        • Opcode Fuzzy Hash: 10b2826ea2a30af8cd048c73938ebc50e03497f9426d37aedbe973d33e15ff3c
                        • Instruction Fuzzy Hash: 7821B132500219ABDF22CE64CC46FEA3BA9FF48714F110254FE556B1D5DAB9A8508BA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 01016FAA
                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 01016FBA
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 01016FDF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend$MoveWindow
                        • String ID: Listbox
                        • API String ID: 3315199576-2633736733
                        • Opcode ID: f7017be93d41ec2c15bdeea14e66552c56194fc3fa5698333b35a2484054a31e
                        • Instruction ID: 404c203b7f11551d5d0ad976e37694f2c962534f579a557e965c1f0594b9192d
                        • Opcode Fuzzy Hash: f7017be93d41ec2c15bdeea14e66552c56194fc3fa5698333b35a2484054a31e
                        • Instruction Fuzzy Hash: 3E21C5326111187FDF128F58CC84FAB37AAFF89754F418168F9849B195CABA9C51C7A0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 010179E1
                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 010179F6
                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 01017A03
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: msctls_trackbar32
                        • API String ID: 3850602802-1010561917
                        • Opcode ID: a485fc4de108bdf44b90bac3e72b9784c867c853ceef775511d089ff2cab7b72
                        • Instruction ID: ad433081f00b89fc7bd4dea3f9021a82bfacfb5d5f66b409de3b199b3635af64
                        • Opcode Fuzzy Hash: a485fc4de108bdf44b90bac3e72b9784c867c853ceef775511d089ff2cab7b72
                        • Instruction Fuzzy Hash: 75110672240209BFEF219EB4CC05FEB7BA9EFC9B64F010529FA81A6091D276D451CB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00F94C2E), ref: 00F94CA3
                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00F94CB5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetNativeSystemInfo$kernel32.dll
                        • API String ID: 2574300362-192647395
                        • Opcode ID: f4e066b656d3da854198417feacfaa6098e5119c40a993578af889967054cd65
                        • Instruction ID: fee6f00fda69fda9d597cc28608cb91bd5af1f3685d9b820d7128b36f36dcadc
                        • Opcode Fuzzy Hash: f4e066b656d3da854198417feacfaa6098e5119c40a993578af889967054cd65
                        • Instruction Fuzzy Hash: ABD01230911723CFDB205F31D958A0676E5BF15651B11882D98C5D6504D67CD884C750
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00F94CE1,?), ref: 00F94DA2
                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F94DB4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                        • API String ID: 2574300362-1355242751
                        • Opcode ID: 4a1494873364a3bfd28e6e8f9cb98a3f2f5bd1f4d201c715ba1c1837051394bf
                        • Instruction ID: 82e3b1321a154e250ea824e80d67b1e6219071f478ae3191083ec9af0caba8df
                        • Opcode Fuzzy Hash: 4a1494873364a3bfd28e6e8f9cb98a3f2f5bd1f4d201c715ba1c1837051394bf
                        • Instruction Fuzzy Hash: BCD01775960713CFEB309F32D858A4676E4AF16265B11883EE8C6DA504E7B8E884CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00F94D2E,?,00F94F4F,?,010562F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F94D6F
                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F94D81
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                        • API String ID: 2574300362-3689287502
                        • Opcode ID: 92ddb9239ec19e28e283fa2e68eb9364d0bf84f7e688ad7691b735507c5267bc
                        • Instruction ID: b0919319baef33d2020a50c0ba747b7cddb58f2fb512241579a117fed070239c
                        • Opcode Fuzzy Hash: 92ddb9239ec19e28e283fa2e68eb9364d0bf84f7e688ad7691b735507c5267bc
                        • Instruction Fuzzy Hash: A9D01274910753CFEB305F31D85861676D8BF15265B11893E94C6D6304D779D884CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(advapi32.dll,?,010112C1), ref: 01011080
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 01011092
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 2574300362-4033151799
                        • Opcode ID: 17339f67abd62a8c03c7773276c5a43c0a8e808cc36c9d145176a522e31de274
                        • Instruction ID: 234eadeabbc1b585566c83d0107a0d002cf54ffd8e839b0dffe4869299305978
                        • Opcode Fuzzy Hash: 17339f67abd62a8c03c7773276c5a43c0a8e808cc36c9d145176a522e31de274
                        • Instruction Fuzzy Hash: 55D01770A10B138FD7359F3AD968A1A76E4AF06265B118C7EA9CADA104E6BCC480CB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,00000001,01009009,?,0101F910), ref: 01009403
                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 01009415
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetModuleHandleExW$kernel32.dll
                        • API String ID: 2574300362-199464113
                        • Opcode ID: e5fbba831e16f31601c31c5d64534315e732005fa901d50426f465d9696f3c4f
                        • Instruction ID: 7ae75c89f13c8e37812dc39f36f59d31ead4388c2c120edb7290c0e6089c6f54
                        • Opcode Fuzzy Hash: e5fbba831e16f31601c31c5d64534315e732005fa901d50426f465d9696f3c4f
                        • Instruction Fuzzy Hash: 93D0C730A00723CFE7208F36D948A0276E4AF02245F02C83EA8CACA541EAB8C4C4CB10
                        Uniqueness

                        Uniqueness Score: -1.00%

                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5e68086f45a2faa405d0403bcdc0c9becb48f4f73fde35871ca8e750569b2e75
                        • Instruction ID: e01f2eb4be59d52b1d7a8b78a7f2048025de537d951a51d7d936b0ba3e6b63e8
                        • Opcode Fuzzy Hash: 5e68086f45a2faa405d0403bcdc0c9becb48f4f73fde35871ca8e750569b2e75
                        • Instruction Fuzzy Hash: 4CC17E75A04256EFCB14DF95C884EAEB7F5FF48710B218598E805EB251D730EE81DB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CharLowerBuffW.USER32(?,?), ref: 0100E3D2
                        • CharLowerBuffW.USER32(?,?), ref: 0100E415
                          • Part of subcall function 0100DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0100DAD9
                        • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0100E615
                        • _memmove.LIBCMT ref: 0100E628
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: BuffCharLower$AllocVirtual_memmove
                        • String ID:
                        • API String ID: 3659485706-0
                        • Opcode ID: 8b8e95c4594989b467b845223f9214d7da0d84958d9724ae518911f2a952d1b4
                        • Instruction ID: 3aad1decbe114442b70b3b5755eefc5e41fc6b9bd5eb47cb32e22739c9c47159
                        • Opcode Fuzzy Hash: 8b8e95c4594989b467b845223f9214d7da0d84958d9724ae518911f2a952d1b4
                        • Instruction Fuzzy Hash: AAC17B716083018FD755DF28C88096ABBE4FF88714F04896DF999AB391EB35E945CF82
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CoInitialize.OLE32(00000000), ref: 010083D8
                        • CoUninitialize.OLE32 ref: 010083E3
                          • Part of subcall function 00FEDA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FEDAC5
                        • VariantInit.OLEAUT32(?), ref: 010083EE
                        • VariantClear.OLEAUT32(?), ref: 010086BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                        • String ID:
                        • API String ID: 780911581-0
                        • Opcode ID: ee92895487984f0fb7bd9db46996ed482b17a220dca293b9e4960837991c1f44
                        • Instruction ID: 00b5ff5f7611412eb217bc444359a7c3e42d428837adb804dbbe2ef87747c1e2
                        • Opcode Fuzzy Hash: ee92895487984f0fb7bd9db46996ed482b17a220dca293b9e4960837991c1f44
                        • Instruction Fuzzy Hash: 89A13A756087019FEB11DF18C881B1ABBE4BF88314F05844DFA9A9B3A1CB75ED44DB46
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,01022C7C,?), ref: 00FE7C32
                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,01022C7C,?), ref: 00FE7C4A
                        • CLSIDFromProgID.OLE32(?,?,00000000,0101FB80,000000FF,?,00000000,00000800,00000000,?,01022C7C,?), ref: 00FE7C6F
                        • _memcmp.LIBCMT ref: 00FE7C90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FromProg$FreeTask_memcmp
                        • String ID:
                        • API String ID: 314563124-0
                        • Opcode ID: 2a8c3e558c8d263128c61d531f7137848c000925a39822e9a87e6ef5262efe08
                        • Instruction ID: a01b3694cb43de3e6793fe45acd4b44425423e305baff7f3a2319f8547d28d85
                        • Opcode Fuzzy Hash: 2a8c3e558c8d263128c61d531f7137848c000925a39822e9a87e6ef5262efe08
                        • Instruction Fuzzy Hash: 21811C71A00209EFCB04DF95C984EEEB7B9FF89315F204198E505AB254DB75AE05DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Variant$AllocClearCopyInitString
                        • String ID:
                        • API String ID: 2808897238-0
                        • Opcode ID: 14ee97075bb439aa8a168771779138946b2dd7b6801c8321a72b5861a4fcccd1
                        • Instruction ID: 5d9db96b88544c6783fe543585d988eb011fc21add66f6c3cb92c335a31daab6
                        • Opcode Fuzzy Hash: 14ee97075bb439aa8a168771779138946b2dd7b6801c8321a72b5861a4fcccd1
                        • Instruction Fuzzy Hash: C351B9316083869BDB30BF66DC91B79B3E5AF54350F20881FE696CB291EF749840BB15
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • socket.WSOCK32(00000002,00000002,00000011), ref: 01006CE4
                        • WSAGetLastError.WSOCK32(00000000), ref: 01006CF4
                          • Part of subcall function 00F99997: __itow.LIBCMT ref: 00F999C2
                          • Part of subcall function 00F99997: __swprintf.LIBCMT ref: 00F99A0C
                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 01006D58
                        • WSAGetLastError.WSOCK32(00000000), ref: 01006D64
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ErrorLast$__itow__swprintfsocket
                        • String ID:
                        • API String ID: 2214342067-0
                        • Opcode ID: 16dc564e943e91fd5caacadc9116f6396f8d4f0d3d7491de26dcb629893655f7
                        • Instruction ID: 57812c6a36e8d6c45124ad6212c9458a4d15f8244db90f339b064f42d3ee63df
                        • Opcode Fuzzy Hash: 16dc564e943e91fd5caacadc9116f6396f8d4f0d3d7491de26dcb629893655f7
                        • Instruction Fuzzy Hash: D7419174640200AFFB21BF28DC86F2A77E5AB44B10F44805CFA59DB2C2DAB99D419791
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0101F910), ref: 010067BA
                        • _strlen.LIBCMT ref: 010067EC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _strlen
                        • String ID:
                        • API String ID: 4218353326-0
                        • Opcode ID: 9147cb33f629115720bb6afe00136c3239f815f2a7df77905b859098bb67371a
                        • Instruction ID: a0e8fd2e67fdebed1ad2e77cd64c3393c7c786930816279c890f2d0fb5b5309f
                        • Opcode Fuzzy Hash: 9147cb33f629115720bb6afe00136c3239f815f2a7df77905b859098bb67371a
                        • Instruction Fuzzy Hash: 3B411770A00105AFEB15EB69CCC1EEEB3AAEF44710F048159F9599B2D2DF39AE14DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00FFBB09
                        • GetLastError.KERNEL32(?,00000000), ref: 00FFBB2F
                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00FFBB54
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00FFBB80
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CreateHardLink$DeleteErrorFileLast
                        • String ID:
                        • API String ID: 3321077145-0
                        • Opcode ID: 4818ca4670f32b968f0429d8bf45c1ea55871963ddd341aadd88c689c9763827
                        • Instruction ID: 5cf38979eb1b2b4a26693a5d27c0d0736eb6eb70aaaff77022fd165b8d11f71b
                        • Opcode Fuzzy Hash: 4818ca4670f32b968f0429d8bf45c1ea55871963ddd341aadd88c689c9763827
                        • Instruction Fuzzy Hash: 1C415E39604515DFDF10DF19C984A5DBBE5EF89320B098488EE4A9B362CB78FD01EB91
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 01018B4D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: InvalidateRect
                        • String ID:
                        • API String ID: 634782764-0
                        • Opcode ID: f0b8dcde060e82a11b2aadc2d5aa29c5a6dbed591c2b41965619ba7c36d96f4d
                        • Instruction ID: c6ca777f26e19fa24763e24adacf7ff78fe056eafeb4e5689ce763f89d77570a
                        • Opcode Fuzzy Hash: f0b8dcde060e82a11b2aadc2d5aa29c5a6dbed591c2b41965619ba7c36d96f4d
                        • Instruction Fuzzy Hash: A031B0B4600204BFFB609A2CCCC5BA93BA5FB05310F54CA43FBD1D62A9C63DA6408B41
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • ClientToScreen.USER32(?,?), ref: 0101AE1A
                        • GetWindowRect.USER32(?,?), ref: 0101AE90
                        • PtInRect.USER32(?,?,0101C304), ref: 0101AEA0
                        • MessageBeep.USER32(00000000), ref: 0101AF11
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Rect$BeepClientMessageScreenWindow
                        • String ID:
                        • API String ID: 1352109105-0
                        • Opcode ID: 749904b579dd5a58bf9343f64f64efbd8b2bb72fcf88e578ea733af3b31e51fe
                        • Instruction ID: 44662a52c6fcea49690d87642b32679f323e730a99e87f5abd2b9f651056b25c
                        • Opcode Fuzzy Hash: 749904b579dd5a58bf9343f64f64efbd8b2bb72fcf88e578ea733af3b31e51fe
                        • Instruction Fuzzy Hash: 24418E70701249DFDB22CF98C484AA97BF5FF49340F1481A9E594CB34AD73AA842CF50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00FF1037
                        • SetKeyboardState.USER32(00000080,?,00000001), ref: 00FF1053
                        • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00FF10B9
                        • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00FF110B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 57d62724473486b7a6c11a70b522e7488ad5dc9d79e1cac12ebfdf5e90176851
                        • Instruction ID: fc3ee65857c490f0faacb8e569d807d45930810dc069dc456f586b2852594f05
                        • Opcode Fuzzy Hash: 57d62724473486b7a6c11a70b522e7488ad5dc9d79e1cac12ebfdf5e90176851
                        • Instruction Fuzzy Hash: 8B312631E4069CEEFB308A658C05BFABBA9BF44320F04435AE781521F1CB7989C4B751
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00FF1176
                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00FF1192
                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00FF11F1
                        • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00FF1243
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 76e27c5f8fdcbd3a61e04b67ba433c4064e5fadb90680b7b8de22d40bcb06fed
                        • Instruction ID: 54575a3034f90f88b72d056cb1f273a5fd1fe94220611f7f0978f6d2b26e1b4a
                        • Opcode Fuzzy Hash: 76e27c5f8fdcbd3a61e04b67ba433c4064e5fadb90680b7b8de22d40bcb06fed
                        • Instruction Fuzzy Hash: FF310730D4061CDAFF318AA588147FABBAEBF49320F04431AE780921E1C3795955A751
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00FC644B
                        • __isleadbyte_l.LIBCMT ref: 00FC6479
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FC64A7
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FC64DD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                        • String ID:
                        • API String ID: 3058430110-0
                        • Opcode ID: 56c449282db78e9fec5311fd1329cc0a5fdcb92edb6b3dfb65a05e83d49f7fec
                        • Instruction ID: 516af760c3418b941b741741f1054dc49f6b694e49fc0c6949d28cadf8780da1
                        • Opcode Fuzzy Hash: 56c449282db78e9fec5311fd1329cc0a5fdcb92edb6b3dfb65a05e83d49f7fec
                        • Instruction Fuzzy Hash: B031CD31A08247AFDB29CF65CE46FAA7BA9FF81320F15402DE854C7190EB35D850EB90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetForegroundWindow.USER32 ref: 01015189
                          • Part of subcall function 00FF387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FF3897
                          • Part of subcall function 00FF387D: GetCurrentThreadId.KERNEL32 ref: 00FF389E
                          • Part of subcall function 00FF387D: AttachThreadInput.USER32(00000000,?,00FF52A7), ref: 00FF38A5
                        • GetCaretPos.USER32(?), ref: 0101519A
                        • ClientToScreen.USER32(00000000,?), ref: 010151D5
                        • GetForegroundWindow.USER32 ref: 010151DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                        • String ID:
                        • API String ID: 2759813231-0
                        • Opcode ID: cf76be7135802a675b81b4d4acd8e35dd114b61bc29685142f25b5ecb942e76d
                        • Instruction ID: 9170f257d9bfbb70e97ffd1e728d49a4f0631ff7a009b61c81a8bf155f7035cd
                        • Opcode Fuzzy Hash: cf76be7135802a675b81b4d4acd8e35dd114b61bc29685142f25b5ecb942e76d
                        • Instruction Fuzzy Hash: EB312F72900108AFDB10EFA9CC459EFB7F9EF98300F11406AE555E7251EA799E05DBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                        • GetCursorPos.USER32(?), ref: 0101C7C2
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00FCBBFB,?,?,?,?,?), ref: 0101C7D7
                        • GetCursorPos.USER32(?), ref: 0101C824
                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00FCBBFB,?,?,?), ref: 0101C85E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                        • String ID:
                        • API String ID: 2864067406-0
                        • Opcode ID: 4e17829d94e2ba5da690aca1539d4670e1e1c2dd0cc0eed0e6fe3e3a4b23bb90
                        • Instruction ID: b05cac336a41fc273796473010514bd56656dd9b9509fd8b70e8c7fcb1d4712d
                        • Opcode Fuzzy Hash: 4e17829d94e2ba5da690aca1539d4670e1e1c2dd0cc0eed0e6fe3e3a4b23bb90
                        • Instruction Fuzzy Hash: CA31A035600018EFEB25CF58C898EFA7FF6FB09320F444199FA858B255C73A9950DBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • __setmode.LIBCMT ref: 00FB0BF2
                          • Part of subcall function 00F95B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7B20,?,?,00000000), ref: 00F95B8C
                          • Part of subcall function 00F95B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7B20,?,?,00000000,?,?), ref: 00F95BB0
                        • _fprintf.LIBCMT ref: 00FB0C29
                        • OutputDebugStringW.KERNEL32(?), ref: 00FE6331
                          • Part of subcall function 00FB4CDA: _flsall.LIBCMT ref: 00FB4CF3
                        • __setmode.LIBCMT ref: 00FB0C5E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                        • String ID:
                        • API String ID: 521402451-0
                        • Opcode ID: e31dc98a74c7c303dd4442518d0e197367ade7f36a06d2e3f1df77210b5ac649
                        • Instruction ID: 840eca27b68ab4aeb654ca6580fcca100d1e4fb24c8e92d5f5f5b45277580512
                        • Opcode Fuzzy Hash: e31dc98a74c7c303dd4442518d0e197367ade7f36a06d2e3f1df77210b5ac649
                        • Instruction Fuzzy Hash: 8F113672A042087EDB15B7BA9C839FE7B6D9F41320F24011AF20497193DF792D46BB95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FE8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FE8669
                          • Part of subcall function 00FE8652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8673
                          • Part of subcall function 00FE8652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8682
                          • Part of subcall function 00FE8652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE8689
                          • Part of subcall function 00FE8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FE869F
                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00FE8BEB
                        • _memcmp.LIBCMT ref: 00FE8C0E
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FE8C44
                        • HeapFree.KERNEL32(00000000), ref: 00FE8C4B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                        • String ID:
                        • API String ID: 1592001646-0
                        • Opcode ID: 5f1365daa7857b82d23464a8354524fc9cf8a48eb2b9d8e57e5471b604215040
                        • Instruction ID: 11cdfcc3ada559b71073f3bdd7f27b3c21dc282239a8247fc4cba02f369c20d9
                        • Opcode Fuzzy Hash: 5f1365daa7857b82d23464a8354524fc9cf8a48eb2b9d8e57e5471b604215040
                        • Instruction Fuzzy Hash: 3A21B071E01209EFCB10EFA9C944BEEB7B8FF41394F144099E458A7240DB35AE06EB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FEF5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00FEE1C4,?,?,?,00FEEFB7,00000000,000000EF,00000119,?,?), ref: 00FEF5BC
                          • Part of subcall function 00FEF5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00FEF5E2
                          • Part of subcall function 00FEF5AD: lstrcmpiW.KERNEL32(00000000,?,00FEE1C4,?,?,?,00FEEFB7,00000000,000000EF,00000119,?,?), ref: 00FEF613
                        • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00FEEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00FEE1DD
                        • lstrcpyW.KERNEL32(00000000,?), ref: 00FEE203
                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00FEEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00FEE237
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: lstrcmpilstrcpylstrlen
                        • String ID: cdecl
                        • API String ID: 4031866154-3896280584
                        • Opcode ID: 65de334061a67f6b5f304dd4a11042c595bed494f6d7c85848917bf1cdaa3695
                        • Instruction ID: bec7e082d6a670766e86c4d0465b513f6e2f6f85f6ac38c4badef5fcd1395527
                        • Opcode Fuzzy Hash: 65de334061a67f6b5f304dd4a11042c595bed494f6d7c85848917bf1cdaa3695
                        • Instruction Fuzzy Hash: FA11D336600381EFCB25AF65EC45D7A77B8FF85350B40402AF906CB254EB759854E790
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _free.LIBCMT ref: 00FC5351
                          • Part of subcall function 00FB594C: __FF_MSGBANNER.LIBCMT ref: 00FB5963
                          • Part of subcall function 00FB594C: __NMSG_WRITE.LIBCMT ref: 00FB596A
                          • Part of subcall function 00FB594C: RtlAllocateHeap.NTDLL(019F0000,00000000,00000001,00000000,?,?,?,00FB1013,?), ref: 00FB598F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: AllocateHeap_free
                        • String ID:
                        • API String ID: 614378929-0
                        • Opcode ID: 2c137375871964cd4104add4d3ea2fb3982ae44a52c260616f3cc1b0cb01e11e
                        • Instruction ID: c9754272e3e29eebe06046e0e71f6736d3f81e43ddf89930b901696c16f16883
                        • Opcode Fuzzy Hash: 2c137375871964cd4104add4d3ea2fb3982ae44a52c260616f3cc1b0cb01e11e
                        • Instruction Fuzzy Hash: BD112732D04A17AFCB302FB1AD06B9D37996F04BF0B10452EF8449A080DE7E9981FB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00F94560
                          • Part of subcall function 00F9410D: _memset.LIBCMT ref: 00F9418D
                          • Part of subcall function 00F9410D: _wcscpy.LIBCMT ref: 00F941E1
                          • Part of subcall function 00F9410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F941F1
                        • KillTimer.USER32(?,00000001,?,?), ref: 00F945B5
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F945C4
                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FCD6CE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                        • String ID:
                        • API String ID: 1378193009-0
                        • Opcode ID: 82d0d2a7a25c1d095a4ebfd1428bea198f066046986b21310553d39ab7191107
                        • Instruction ID: b4dc314e252e21b6f31651418c728fc4149483828f06a4271506e3ba6deadb58
                        • Opcode Fuzzy Hash: 82d0d2a7a25c1d095a4ebfd1428bea198f066046986b21310553d39ab7191107
                        • Instruction Fuzzy Hash: B8210A71904784AFFB328B24C845FEBBBEC9F11314F04009EE2DE56145C7796A89EB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F95B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FF7B20,?,?,00000000), ref: 00F95B8C
                          • Part of subcall function 00F95B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FF7B20,?,?,00000000,?,?), ref: 00F95BB0
                        • gethostbyname.WSOCK32(?,?,?), ref: 010066AC
                        • WSAGetLastError.WSOCK32(00000000), ref: 010066B7
                        • _memmove.LIBCMT ref: 010066E4
                        • inet_ntoa.WSOCK32(?), ref: 010066EF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                        • String ID:
                        • API String ID: 1504782959-0
                        • Opcode ID: 3428d71579076a4dfb7db01c9db7a725667665dc3af45ea3e49a1fd3ab9429cc
                        • Instruction ID: db58f071cc5aa70e49c6e5c111243f15a4ad38b854418c8c361ee0ac2cb6a0ca
                        • Opcode Fuzzy Hash: 3428d71579076a4dfb7db01c9db7a725667665dc3af45ea3e49a1fd3ab9429cc
                        • Instruction Fuzzy Hash: F8118B35904109AFDF01FFA8DD86CEEB7B8BF58710B044069F506A71A1DB39AE04DB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00FE9043
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE9055
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE906B
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FE9086
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 3f76093d3537c3872510d046ba54318bb091975ace9af1d189bda7c1da4e6f3f
                        • Instruction ID: 61e35d47301b0f32e19b25c841e030d45f66fd1b25e0100a4629c5c9ea4cf4d7
                        • Opcode Fuzzy Hash: 3f76093d3537c3872510d046ba54318bb091975ace9af1d189bda7c1da4e6f3f
                        • Instruction Fuzzy Hash: 61115E7A901218FFDB10DFA5CC84F9DBB74FB48310F204095EA04B7250D6726E50EBA0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F92612: GetWindowLongW.USER32(?,000000EB), ref: 00F92623
                        • DefDlgProcW.USER32(?,00000020,?), ref: 00F912D8
                        • GetClientRect.USER32(?,?), ref: 00FCB84B
                        • GetCursorPos.USER32(?), ref: 00FCB855
                        • ScreenToClient.USER32(?,?), ref: 00FCB860
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Client$CursorLongProcRectScreenWindow
                        • String ID:
                        • API String ID: 4127811313-0
                        • Opcode ID: 39fb64a08dce49fb89dd4dec64bdf83696afdadf351496fff8c28cdd4ab22037
                        • Instruction ID: 34212ec65efc43942e6aaef39140efab55208f94c5e01f3ece53f3223eb26927
                        • Opcode Fuzzy Hash: 39fb64a08dce49fb89dd4dec64bdf83696afdadf351496fff8c28cdd4ab22037
                        • Instruction Fuzzy Hash: 3F113A39A0001AAFDF10EFA4D8859FE77B8FB05300F4004A5F941E7140D739BA55ABA5
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FF01FD,?,00FF1250,?,00008000), ref: 00FF166F
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00FF01FD,?,00FF1250,?,00008000), ref: 00FF1694
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FF01FD,?,00FF1250,?,00008000), ref: 00FF169E
                        • Sleep.KERNEL32(?,?,?,?,?,?,?,00FF01FD,?,00FF1250,?,00008000), ref: 00FF16D1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CounterPerformanceQuerySleep
                        • String ID:
                        • API String ID: 2875609808-0
                        • Opcode ID: 39b3ce577db4f0976bbd977dc170c097cc2ea3415d93799f9d1f5f3e1195b79f
                        • Instruction ID: c7b7063057f1536ed80ddbac21ad951eb9c852a3ad5624fb471533d3b56d2439
                        • Opcode Fuzzy Hash: 39b3ce577db4f0976bbd977dc170c097cc2ea3415d93799f9d1f5f3e1195b79f
                        • Instruction Fuzzy Hash: 91117C31C0051DDBCF109FA5D948AFEBB78FF09711F044059EA80F6240DB3595609B96
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                        • String ID:
                        • API String ID: 3016257755-0
                        • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                        • Instruction ID: fda5c1f5d8683c82831545d722fea9b178bc5b6d23c2ad43cfca936602ea3dc2
                        • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                        • Instruction Fuzzy Hash: AB017E3244824ABBCF526F85CD02DEE3F22BF69350B088519FA1858031C236C9B1BF81
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetWindowRect.USER32(?,?), ref: 0101B59E
                        • ScreenToClient.USER32(?,?), ref: 0101B5B6
                        • ScreenToClient.USER32(?,?), ref: 0101B5DA
                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0101B5F5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ClientRectScreen$InvalidateWindow
                        • String ID:
                        • API String ID: 357397906-0
                        • Opcode ID: bfa660d3b8a0a3b493c4b15300153fef7d09f9f9537207363a877adfcb876592
                        • Instruction ID: a509a8951820aca92411354fca1cf974524d5e9ff2189d83954aff5dca06b8bf
                        • Opcode Fuzzy Hash: bfa660d3b8a0a3b493c4b15300153fef7d09f9f9537207363a877adfcb876592
                        • Instruction Fuzzy Hash: E71143B9D0020AEFDB51DFA9C484AEEFBF9FB08310F108156E954E3214D735AA558F90
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 0101B8FE
                        • _memset.LIBCMT ref: 0101B90D
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,01057F20,01057F64), ref: 0101B93C
                        • CloseHandle.KERNEL32 ref: 0101B94E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _memset$CloseCreateHandleProcess
                        • String ID:
                        • API String ID: 3277943733-0
                        • Opcode ID: 9a2dffb6e03249d6beedb9455445b7657357c88785193edca59371d8c25207a3
                        • Instruction ID: ed3be24bd8a9cac633da7e9c097d699130dc2e76291071d1afba6b4ba3091d36
                        • Opcode Fuzzy Hash: 9a2dffb6e03249d6beedb9455445b7657357c88785193edca59371d8c25207a3
                        • Instruction Fuzzy Hash: 72F082B26403007BF320BA65AC05FBB3A9CEB08398F404021BB89D518AD77E4900A7A8
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • EnterCriticalSection.KERNEL32(?), ref: 00FF6E88
                          • Part of subcall function 00FF794E: _memset.LIBCMT ref: 00FF7983
                        • _memmove.LIBCMT ref: 00FF6EAB
                        • _memset.LIBCMT ref: 00FF6EB8
                        • LeaveCriticalSection.KERNEL32(?), ref: 00FF6EC8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CriticalSection_memset$EnterLeave_memmove
                        • String ID:
                        • API String ID: 48991266-0
                        • Opcode ID: 8988e9e8555b76323c209569242cd217432723b63cb428bc26ec2e6d0b1a44c3
                        • Instruction ID: e213848b03bbe2f788d8b4d0f23fc3cb76f38032194e74529ad008a659335e78
                        • Opcode Fuzzy Hash: 8988e9e8555b76323c209569242cd217432723b63cb428bc26ec2e6d0b1a44c3
                        • Instruction Fuzzy Hash: 8BF05E7A200204ABCF117F55DC85A9ABB2AEF45360B04C051FE089E22AC77AA911DBB4
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F912F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F9134D
                          • Part of subcall function 00F912F3: SelectObject.GDI32(?,00000000), ref: 00F9135C
                          • Part of subcall function 00F912F3: BeginPath.GDI32(?), ref: 00F91373
                          • Part of subcall function 00F912F3: SelectObject.GDI32(?,00000000), ref: 00F9139C
                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0101C030
                        • LineTo.GDI32(00000000,?,?), ref: 0101C03D
                        • EndPath.GDI32(00000000), ref: 0101C04D
                        • StrokePath.GDI32(00000000), ref: 0101C05B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                        • String ID:
                        • API String ID: 1539411459-0
                        • Opcode ID: 2c00651206b29a740c9af8b56e66c15ab8ecc12a472f03ba98382222378efc36
                        • Instruction ID: 1926e70d879a4f4218813fe54c7ded826eb782d636ca0878469c070e72c1939b
                        • Opcode Fuzzy Hash: 2c00651206b29a740c9af8b56e66c15ab8ecc12a472f03ba98382222378efc36
                        • Instruction Fuzzy Hash: 9FF09A3100022ABBEB236F94AC0AFDA3F98AF06310F044140FA91210C5C76E4264CB95
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00FEA399
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FEA3AC
                        • GetCurrentThreadId.KERNEL32 ref: 00FEA3B3
                        • AttachThreadInput.USER32(00000000), ref: 00FEA3BA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                        • String ID:
                        • API String ID: 2710830443-0
                        • Opcode ID: 6e4341247a5ea3df17c9fdfd6e571d3585365a2167f955b87fa67898d2c81d02
                        • Instruction ID: 38ffca9243a7bbc49ad3b9ed040e6f6e12d62894351c9a5e3d1f1680b16616f2
                        • Opcode Fuzzy Hash: 6e4341247a5ea3df17c9fdfd6e571d3585365a2167f955b87fa67898d2c81d02
                        • Instruction Fuzzy Hash: 7DE03931541268BADB201AA2DC0CED73F1CEF1A7B1F008014F548C4050D67A9544DBA1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetSysColor.USER32(00000008), ref: 00F92231
                        • SetTextColor.GDI32(?,000000FF), ref: 00F9223B
                        • SetBkMode.GDI32(?,00000001), ref: 00F92250
                        • GetStockObject.GDI32(00000005), ref: 00F92258
                        • GetWindowDC.USER32(?,00000000), ref: 00FCC0D3
                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FCC0E0
                        • GetPixel.GDI32(00000000,?,00000000), ref: 00FCC0F9
                        • GetPixel.GDI32(00000000,00000000,?), ref: 00FCC112
                        • GetPixel.GDI32(00000000,?,?), ref: 00FCC132
                        • ReleaseDC.USER32(?,00000000), ref: 00FCC13D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                        • String ID:
                        • API String ID: 1946975507-0
                        • Opcode ID: 4bae2fcb4deb92ab87ffd7aea652cc49d89e983f99a4dd04e8d6ba57afcc46f7
                        • Instruction ID: 43b37bf0c445bd03137460cf854c201b6544d721d0018fc8fde97ec7c7dc266e
                        • Opcode Fuzzy Hash: 4bae2fcb4deb92ab87ffd7aea652cc49d89e983f99a4dd04e8d6ba57afcc46f7
                        • Instruction Fuzzy Hash: 65E06531544145AAEF315F74F80DBD83B10EB06332F148356FBAD880D5C77A4584DB51
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetCurrentThread.KERNEL32 ref: 00FE8C63
                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00FE882E), ref: 00FE8C6A
                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00FE882E), ref: 00FE8C77
                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00FE882E), ref: 00FE8C7E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CurrentOpenProcessThreadToken
                        • String ID:
                        • API String ID: 3974789173-0
                        • Opcode ID: 42c09e1801b1492390f7e07d5d4b4a9f3aeca1a0392497c131d0b68d609f69e2
                        • Instruction ID: 550923cc579b44e1a6e750351dfe4e5d8884c7f86cc0050abc1ffcfce7e52768
                        • Opcode Fuzzy Hash: 42c09e1801b1492390f7e07d5d4b4a9f3aeca1a0392497c131d0b68d609f69e2
                        • Instruction Fuzzy Hash: 69E0DF36A422129BD7306EB16D0CB863BA8AF117A2F144818B289C9044DA3D844A8B20
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetDesktopWindow.USER32 ref: 00FD2187
                        • GetDC.USER32(00000000), ref: 00FD2191
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00FD21B1
                        • ReleaseDC.USER32(?), ref: 00FD21D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: c3faa111c3af120416bda80fa9988c0a63b73c857e4c94443a0f602caa878a8e
                        • Instruction ID: 15f4591a0b56e25d8db2121277f493c37ca717d91fad09c2e19bb184caa7671b
                        • Opcode Fuzzy Hash: c3faa111c3af120416bda80fa9988c0a63b73c857e4c94443a0f602caa878a8e
                        • Instruction Fuzzy Hash: 87E0E575800205EFDF119FB0C808A9D7BB1EB5C350F11880AF99A97210CB7E8146AF40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetDesktopWindow.USER32 ref: 00FD219B
                        • GetDC.USER32(00000000), ref: 00FD21A5
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00FD21B1
                        • ReleaseDC.USER32(?), ref: 00FD21D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: bab4478e007da63ad41602b161370b868b67f5c2f81171a482b5365b5d8c242a
                        • Instruction ID: a97b8073924c4771c788fe5c8adfd2272c09389e650afceadbdbb535c541c596
                        • Opcode Fuzzy Hash: bab4478e007da63ad41602b161370b868b67f5c2f81171a482b5365b5d8c242a
                        • Instruction Fuzzy Hash: 28E012B5800206AFDF219FB0C80869D7BF1EB4C350F118809F99AA7210CB7E9145AF40
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • OleSetContainedObject.OLE32(?,00000001), ref: 00FEB981
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ContainedObject
                        • String ID: AutoIt3GUI$Container
                        • API String ID: 3565006973-3941886329
                        • Opcode ID: 1b2b097417b50f113dcde1e99cb6dfbf201eebfaf6fcc2aea96c44adaa1e01cb
                        • Instruction ID: aac6d88ef2a6036e18275311f972b3021a71ad04252ae9cfbfe72701c664d43d
                        • Opcode Fuzzy Hash: 1b2b097417b50f113dcde1e99cb6dfbf201eebfaf6fcc2aea96c44adaa1e01cb
                        • Instruction Fuzzy Hash: F59148716006019FDB24DF69C884B6BBBE8FF48710F24856EE94ACB7A1DB70E941DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FAFEC6: _wcscpy.LIBCMT ref: 00FAFEE9
                          • Part of subcall function 00F99997: __itow.LIBCMT ref: 00F999C2
                          • Part of subcall function 00F99997: __swprintf.LIBCMT ref: 00F99A0C
                        • __wcsnicmp.LIBCMT ref: 00FFB298
                        • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00FFB361
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                        • String ID: LPT
                        • API String ID: 3222508074-1350329615
                        • Opcode ID: 3c711bf536fb0c28d91c168a162d46d882146555f78c5dbe25757e8457989b09
                        • Instruction ID: 371137ff58e5e7d89a588250c0cd177223d4d5e18534a727c65af839365c8544
                        • Opcode Fuzzy Hash: 3c711bf536fb0c28d91c168a162d46d882146555f78c5dbe25757e8457989b09
                        • Instruction Fuzzy Hash: 07619276E04219AFDF14DF98C881EBEB7B4AF08310F114059F646AB361DB74AE44EB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • Sleep.KERNEL32(00000000), ref: 00FA2AC8
                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00FA2AE1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: GlobalMemorySleepStatus
                        • String ID: @
                        • API String ID: 2783356886-2766056989
                        • Opcode ID: a1d0003e2538283834a1a6ebc54715aa2483813d3ff9057b95cd8c11fc943ed9
                        • Instruction ID: 888714d8cf2596f6e7d7c4d1a6b045f02c00d1baa5d924708c620b525b34a27b
                        • Opcode Fuzzy Hash: a1d0003e2538283834a1a6ebc54715aa2483813d3ff9057b95cd8c11fc943ed9
                        • Instruction Fuzzy Hash: 79515A714187449BE320AF14DC85BAFBBF8FF84310F42484DF1E941095EB798529DB16
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F9506B: __fread_nolock.LIBCMT ref: 00F95089
                        • _wcscmp.LIBCMT ref: 00FF9AAE
                        • _wcscmp.LIBCMT ref: 00FF9AC1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: _wcscmp$__fread_nolock
                        • String ID: FILE
                        • API String ID: 4029003684-3121273764
                        • Opcode ID: b810a4ea32ce29776f85b592d911a9c5f9a1a804d6dc1956507f320e1337e852
                        • Instruction ID: 10103eeb8fcbc16783d59c27714d4bd8eb38929734a328b138fb9aa70d888afe
                        • Opcode Fuzzy Hash: b810a4ea32ce29776f85b592d911a9c5f9a1a804d6dc1956507f320e1337e852
                        • Instruction Fuzzy Hash: 5641E971E0460EBADF219EA1DC45FEFBBBDDF45710F000079FA00A7191DAB99A0497A1
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 01002892
                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 010028C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CrackInternet_memset
                        • String ID: |
                        • API String ID: 1413715105-2343686810
                        • Opcode ID: efdfd2932972141cb35cb0864cdcb91ca614adba753d99f55e22579b635c9e41
                        • Instruction ID: abb8e1ee8fdd932bf23b1d388e2de79adf798629e8fee70be2f37f24bb942d42
                        • Opcode Fuzzy Hash: efdfd2932972141cb35cb0864cdcb91ca614adba753d99f55e22579b635c9e41
                        • Instruction Fuzzy Hash: D3316F71811219AFDF45EFA1CC89EEEBFB8FF08340F100069F815A6166DB355A56DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • DestroyWindow.USER32(?,?,?,?), ref: 01016D86
                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 01016DC2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$DestroyMove
                        • String ID: static
                        • API String ID: 2139405536-2160076837
                        • Opcode ID: 502a3787940ce2e48d856f2dbb758c8f4ae46d949d69ce871d561858c816aaa3
                        • Instruction ID: f1e7ebfb3652f8ffe9878d9e05832f6d50aff0971eed5819469bc2c35f45a156
                        • Opcode Fuzzy Hash: 502a3787940ce2e48d856f2dbb758c8f4ae46d949d69ce871d561858c816aaa3
                        • Instruction Fuzzy Hash: 6A31A171500604AEEB119F38CC40AFB77B9FF48720F50851DF99987194DA7AA891DB60
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00FF2E00
                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FF2E3B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: InfoItemMenu_memset
                        • String ID: 0
                        • API String ID: 2223754486-4108050209
                        • Opcode ID: 895179b52babf6ae14abacca822908682d43000c4213a9a31a94646de0e0e5ac
                        • Instruction ID: df1b62574bd903c94db9b0c861b56bb2190980e01f672794364d8fec8f431ad6
                        • Opcode Fuzzy Hash: 895179b52babf6ae14abacca822908682d43000c4213a9a31a94646de0e0e5ac
                        • Instruction Fuzzy Hash: BD31E931E0030DABEB649F58C8457FEBBB5FF05360F240029EA85961B0E7749944EB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 010169D0
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 010169DB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Combobox
                        • API String ID: 3850602802-2096851135
                        • Opcode ID: 7f350c0517c24eb842ccceccd76b3602bbac6f849cf9bbf90ff82228ac7872f7
                        • Instruction ID: 17ce36bf5e85dd5327a5fe72473b0d8351473de18349c035086a599d73a4f422
                        • Opcode Fuzzy Hash: 7f350c0517c24eb842ccceccd76b3602bbac6f849cf9bbf90ff82228ac7872f7
                        • Instruction Fuzzy Hash: 2D11CB717002096FEF529E18CC80EFB3BAFEB45394F110165F99497295D67A9C5187A0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F91D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F91D73
                          • Part of subcall function 00F91D35: GetStockObject.GDI32(00000011), ref: 00F91D87
                          • Part of subcall function 00F91D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F91D91
                        • GetWindowRect.USER32(00000000,?), ref: 01016EE0
                        • GetSysColor.USER32(00000012), ref: 01016EFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                        • String ID: static
                        • API String ID: 1983116058-2160076837
                        • Opcode ID: d140cf65919a69410c4c4f7373a95aab1c7c371b366928dc45714e53ba8af0f8
                        • Instruction ID: a6bd6a59c6488a708e08bc479d135c73e5af6fd52238c8c2278656aa0244f9cd
                        • Opcode Fuzzy Hash: d140cf65919a69410c4c4f7373a95aab1c7c371b366928dc45714e53ba8af0f8
                        • Instruction Fuzzy Hash: 5721597261021AAFDB04DFB8CC45AEA7BF8FB08314F004629FD95D3244E679E861DB50
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • GetWindowTextLengthW.USER32(00000000), ref: 01016C11
                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 01016C20
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: LengthMessageSendTextWindow
                        • String ID: edit
                        • API String ID: 2978978980-2167791130
                        • Opcode ID: 5f4bc5aaf199d32752c4c77e9282840d72c4d44ac84f201605355b5471fdae2d
                        • Instruction ID: 07d171e7cb59bfddd983823bd9789fc27deed96502ad55bc44586d3063c63575
                        • Opcode Fuzzy Hash: 5f4bc5aaf199d32752c4c77e9282840d72c4d44ac84f201605355b5471fdae2d
                        • Instruction Fuzzy Hash: 46119D71500209ABEB518E689C81AFB37A9FB04368F504714F9A0971D8C6BEDC919760
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • _memset.LIBCMT ref: 00FF2F11
                        • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00FF2F30
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: InfoItemMenu_memset
                        • String ID: 0
                        • API String ID: 2223754486-4108050209
                        • Opcode ID: f9cc81b316854eb79f188f95058c279f2584b7fc0dc757e1f1bc1d75af2e75a9
                        • Instruction ID: f94dba757340822dbadcdf8dfed4aac236e21e4e27350b764fb6a828afa3dff1
                        • Opcode Fuzzy Hash: f9cc81b316854eb79f188f95058c279f2584b7fc0dc757e1f1bc1d75af2e75a9
                        • Instruction Fuzzy Hash: D611E632E1121CABCB60DA58DC84BBA77B9EF01320F1401A1FA44E72F0D7B6AD04E791
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 01002520
                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 01002549
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Internet$OpenOption
                        • String ID: <local>
                        • API String ID: 942729171-4266983199
                        • Opcode ID: 91771c86a9c161de520b08b7551dabe12f7610b46a18f60b5de70037f5aaa812
                        • Instruction ID: 6ea0eb37b39c1a5c6408f99007c9dc4b51b65f0d00ba965397bb6a42273c7e35
                        • Opcode Fuzzy Hash: 91771c86a9c161de520b08b7551dabe12f7610b46a18f60b5de70037f5aaa812
                        • Instruction Fuzzy Hash: 10110670100225BAFB268F558C9CFBBFFA8FF05252F00816AF58646080D6715554C6F0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 0100830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,010080C8,?,00000000,?,?), ref: 01008322
                        • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 010080CB
                        • htons.WSOCK32(00000000,?,00000000), ref: 01008108
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ByteCharMultiWidehtonsinet_addr
                        • String ID: 255.255.255.255
                        • API String ID: 2496851823-2422070025
                        • Opcode ID: 00c34c6dddeffa255436e20ffd758ad531548bdcf5781dc06727a3c224feb496
                        • Instruction ID: 79fc3bdb17876e185a316328728f0ecc528729bad528fef1a54d2b14df25c174
                        • Opcode Fuzzy Hash: 00c34c6dddeffa255436e20ffd758ad531548bdcf5781dc06727a3c224feb496
                        • Instruction Fuzzy Hash: EC11E534A00205ABEF21EF64CC46FEDB364FF14720F108567FA51972D2D636A810C755
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                          • Part of subcall function 00FEB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB0E7
                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00FE9355
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 372448540-1403004172
                        • Opcode ID: 0fe5354fde417a2a2562f60be0e3f750bd9d7185d9a33e436e05a5b0a9b91ae0
                        • Instruction ID: 7be3af0642d0324aca589072842c4369354209fa1e07e9b518bd41d24f7845e0
                        • Opcode Fuzzy Hash: 0fe5354fde417a2a2562f60be0e3f750bd9d7185d9a33e436e05a5b0a9b91ae0
                        • Instruction Fuzzy Hash: BC01D271A09314AB9F04EBA2CC958FE736DBF06320B100619B972572D2DA395808A760
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                          • Part of subcall function 00FEB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB0E7
                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00FE924D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 372448540-1403004172
                        • Opcode ID: af50aa788af326e5bf8f82db4c738c46e1033c035184bc866b7d6c1a54c50706
                        • Instruction ID: f2842a54ed2eedcbb9a0659833e5f7c7668738027d3ed64a204d5dd902080dc2
                        • Opcode Fuzzy Hash: af50aa788af326e5bf8f82db4c738c46e1033c035184bc866b7d6c1a54c50706
                        • Instruction Fuzzy Hash: 6401FC71E4520477DF04EBA1CC96EFF73AC9F45710F1400297A1267191DA596F0CA7B2
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00F97F41: _memmove.LIBCMT ref: 00F97F82
                          • Part of subcall function 00FEB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00FEB0E7
                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00FE92D0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 372448540-1403004172
                        • Opcode ID: 62a607ac740d12c4793a82337fa1c3257e0e48bec273b85b9c0cbd93435c781a
                        • Instruction ID: 226e65759b2a3fe9bfc704d34a9f6ca3935e31abcd5872272fc95a7380c0d1a8
                        • Opcode Fuzzy Hash: 62a607ac740d12c4793a82337fa1c3257e0e48bec273b85b9c0cbd93435c781a
                        • Instruction Fuzzy Hash: 3001F771E4520477DF00E6A1CC86EFF73AC9F04710F240025790263191DA195E0CA6B6
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: ClassName_wcscmp
                        • String ID: #32770
                        • API String ID: 2292705959-463685578
                        • Opcode ID: dd015eae9902ad430c9afd2eea0b004d4920431e957ee6c3524aeea0fb93c78e
                        • Instruction ID: 6e5d9294545078f1724397d1bf7ae320dee00a5c5afacd73666fe92f85d16d84
                        • Opcode Fuzzy Hash: dd015eae9902ad430c9afd2eea0b004d4920431e957ee6c3524aeea0fb93c78e
                        • Instruction Fuzzy Hash: A5E02B72A0022D27D320959A9C49BA7F7ACEB40731F00015AF950D3040D56499048BD0
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00FE81CA
                          • Part of subcall function 00FB3598: _doexit.LIBCMT ref: 00FB35A2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: Message_doexit
                        • String ID: AutoIt$Error allocating memory.
                        • API String ID: 1993061046-4017498283
                        • Opcode ID: 55e9570f6648d47a5b912d41b60b07247e6bb39b0897e3529dda3469a3feeee7
                        • Instruction ID: f379ec3e272371cf14af7f6045bde4cba1b1185c788e7999db65939a41302fbb
                        • Opcode Fuzzy Hash: 55e9570f6648d47a5b912d41b60b07247e6bb39b0897e3529dda3469a3feeee7
                        • Instruction Fuzzy Hash: 11D0C23238031832D22032A6AC06FC639484B08B51F000029BB48990C3CEDA54825298
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                          • Part of subcall function 00FCB564: _memset.LIBCMT ref: 00FCB571
                          • Part of subcall function 00FB0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00FCB540,?,?,?,00F9100A), ref: 00FB0B89
                        • IsDebuggerPresent.KERNEL32(?,?,?,00F9100A), ref: 00FCB544
                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F9100A), ref: 00FCB553
                        Strings
                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00FCB54E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                        • API String ID: 3158253471-631824599
                        • Opcode ID: fb5bbf301a0a74e43656e0deca1cee40e4ee0267485901170c57fd83cdcfade4
                        • Instruction ID: aced3ae7419df965fe1c4fc047f795d8880f858272844cce302a24f34eb448e1
                        • Opcode Fuzzy Hash: fb5bbf301a0a74e43656e0deca1cee40e4ee0267485901170c57fd83cdcfade4
                        • Instruction Fuzzy Hash: FCE06DB46007128FD730DF29E506B427BE8AB00754F048D2CE486C7355DBBEE408DB61
                        Uniqueness

                        Uniqueness Score: -1.00%

                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 01015BF5
                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 01015C08
                          • Part of subcall function 00FF54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FF555E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1688752035.0000000000F91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F90000, based on PE: true
                        • Associated: 00000000.00000002.1688741780.0000000000F90000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.000000000101F000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1688948449.0000000001045000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689158412.000000000104F000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1689176341.0000000001058000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_f90000_Payment_Advice-pdf.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: b63b6db56b28fcd97649b241792aa33ed27fc0113baaf3aff3cce5d8f2b3353e
                        • Instruction ID: 19828c171e0ead6920e1b20241b9da2f94ad12f917dc793a475f714852735f30
                        • Opcode Fuzzy Hash: b63b6db56b28fcd97649b241792aa33ed27fc0113baaf3aff3cce5d8f2b3353e
                        • Instruction Fuzzy Hash: 22D0C971388312BBE774AA70AC5BFA77A14AB04B51F000829B78AAA1D5D9ED5804C750
                        Uniqueness

                        Uniqueness Score: -1.00%