Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment List.bat.exe

Overview

General Information

Sample name:Payment List.bat.exe
Analysis ID:1448359
MD5:fed0e7606fdae5961988a53e62c792b9
SHA1:6a2955bf2a7a60e1a5b3d37176d5c4842a582702
SHA256:2cd9ea183ef88bc1ee850151e47ffc1613b6a4a57ddbb14ef8230cd25ba77a70
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Payment List.bat.exe (PID: 4268 cmdline: "C:\Users\user\Desktop\Payment List.bat.exe" MD5: FED0E7606FDAE5961988A53E62C792B9)
    • powershell.exe (PID: 4416 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5888 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7372 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 3040 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Payment List.bat.exe (PID: 7228 cmdline: "C:\Users\user\Desktop\Payment List.bat.exe" MD5: FED0E7606FDAE5961988A53E62C792B9)
  • qicqbuFUGCXO.exe (PID: 7336 cmdline: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe MD5: FED0E7606FDAE5961988A53E62C792B9)
    • schtasks.exe (PID: 7540 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpD43A.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • qicqbuFUGCXO.exe (PID: 7588 cmdline: "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe" MD5: FED0E7606FDAE5961988A53E62C792B9)
    • qicqbuFUGCXO.exe (PID: 7600 cmdline: "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe" MD5: FED0E7606FDAE5961988A53E62C792B9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "smtp.privateemail.com", "Username": "info@bondamit.shop", "Password": "payment1759"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000009.00000002.3237643875.0000000002D21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000009.00000002.3237643875.0000000002D21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0000000F.00000002.3238159947.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            9.2.Payment List.bat.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
            • 0x33495:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
            • 0x33507:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
            • 0x33591:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
            • 0x33623:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
            • 0x3368d:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
            • 0x336ff:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
            • 0x33795:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
            • 0x33825:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
            10.2.qicqbuFUGCXO.exe.44da8d8.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              10.2.qicqbuFUGCXO.exe.44da8d8.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                10.2.qicqbuFUGCXO.exe.44da8d8.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x31695:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31707:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x31791:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31823:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3188d:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x318ff:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x31995:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31a25:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                10.2.qicqbuFUGCXO.exe.449feb8.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 22 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment List.bat.exe", ParentImage: C:\Users\user\Desktop\Payment List.bat.exe, ParentProcessId: 4268, ParentProcessName: Payment List.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe", ProcessId: 4416, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment List.bat.exe", ParentImage: C:\Users\user\Desktop\Payment List.bat.exe, ParentProcessId: 4268, ParentProcessName: Payment List.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe", ProcessId: 4416, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpD43A.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpD43A.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe, ParentImage: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe, ParentProcessId: 7336, ParentProcessName: qicqbuFUGCXO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpD43A.tmp", ProcessId: 7540, ProcessName: schtasks.exe
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 66.29.159.53, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Payment List.bat.exe, Initiated: true, ProcessId: 7228, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49709
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment List.bat.exe", ParentImage: C:\Users\user\Desktop\Payment List.bat.exe, ParentProcessId: 4268, ParentProcessName: Payment List.bat.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp", ProcessId: 3040, ProcessName: schtasks.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment List.bat.exe", ParentImage: C:\Users\user\Desktop\Payment List.bat.exe, ParentProcessId: 4268, ParentProcessName: Payment List.bat.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe", ProcessId: 4416, ProcessName: powershell.exe

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment List.bat.exe", ParentImage: C:\Users\user\Desktop\Payment List.bat.exe, ParentProcessId: 4268, ParentProcessName: Payment List.bat.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp", ProcessId: 3040, ProcessName: schtasks.exe
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Payment List.bat.exeAvira: detected
                  Source: http://smtp.privateemail.comAvira URL Cloud: Label: malware
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeAvira: detection malicious, Label: HEUR/AGEN.1309290
                  Source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "smtp.privateemail.com", "Username": "info@bondamit.shop", "Password": "payment1759"}
                  Source: smtp.privateemail.comVirustotal: Detection: 6%Perma Link
                  Source: http://smtp.privateemail.comVirustotal: Detection: 6%Perma Link
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeReversingLabs: Detection: 26%
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeVirustotal: Detection: 39%Perma Link
                  Source: Payment List.bat.exeVirustotal: Detection: 39%Perma Link
                  Source: Payment List.bat.exeReversingLabs: Detection: 26%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeJoe Sandbox ML: detected
                  Source: Payment List.bat.exeJoe Sandbox ML: detected
                  Source: Payment List.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49708 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49712 version: TLS 1.2
                  Source: Payment List.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3c09bc8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, type: UNPACKEDPE
                  Source: global trafficTCP traffic: 192.168.2.5:49709 -> 66.29.159.53:587
                  Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                  Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                  Source: Joe Sandbox ViewIP Address: 66.29.159.53 66.29.159.53
                  Source: Joe Sandbox ViewASN Name: ADVANTAGECOMUS ADVANTAGECOMUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: global trafficTCP traffic: 192.168.2.5:49709 -> 66.29.159.53:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                  Source: global trafficDNS traffic detected: DNS query: smtp.privateemail.com
                  Source: Payment List.bat.exe, 00000009.00000002.3236913525.0000000001009000.00000004.00000020.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3236064889.0000000001178000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.0000000006486000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.000000000643A000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: Payment List.bat.exe, 00000009.00000002.3236913525.0000000001009000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3236064889.0000000001143000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.000000000643A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: Payment List.bat.exe, 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3236064889.0000000001178000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.0000000006486000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                  Source: Payment List.bat.exe, 00000009.00000002.3236913525.0000000001009000.00000004.00000020.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3236064889.0000000001178000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.0000000006486000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.000000000643A000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: Payment List.bat.exe, 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3236064889.0000000001178000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.0000000006486000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                  Source: Payment List.bat.exe, 00000000.00000002.2051609562.0000000002A2F000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3237643875.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000A.00000002.2087668364.00000000032B0000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Payment List.bat.exe, 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.privateemail.com
                  Source: Payment List.bat.exe, 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3234606006.0000000000435000.00000040.00000400.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000A.00000002.2088998167.000000000449F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: Payment List.bat.exe, 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3237643875.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000A.00000002.2088998167.000000000449F000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3234618654.0000000000425000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                  Source: Payment List.bat.exe, 00000009.00000002.3237643875.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: Payment List.bat.exe, 00000009.00000002.3237643875.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                  Source: Payment List.bat.exe, 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3236064889.0000000001178000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.0000000006486000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49708 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49712 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, R1W.cs.Net Code: Niu4iGJUscW
                  Source: 0.2.Payment List.bat.exe.3c09bc8.1.raw.unpack, R1W.cs.Net Code: Niu4iGJUscW

                  System Summary

                  barindex
                  Source: 9.2.Payment List.bat.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 10.2.qicqbuFUGCXO.exe.449feb8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Payment List.bat.exe.3c09bc8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 10.2.qicqbuFUGCXO.exe.449feb8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Payment List.bat.exe.3c09bc8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Payment List.bat.exe.8840000.6.raw.unpack, .csLarge array initialization: : array initializer size 27104
                  Source: initial sampleStatic PE information: Filename: Payment List.bat.exe
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_0286E2EC0_2_0286E2EC
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_07083F000_2_07083F00
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_07081F710_2_07081F71
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_07081F800_2_07081F80
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_070845B00_2_070845B0
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_070845C00_2_070845C0
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_07081B480_2_07081B48
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_070823B80_2_070823B8
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_0708B2D00_2_0708B2D0
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_08836FA80_2_08836FA8
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_088345AA0_2_088345AA
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_0883D6E00_2_0883D6E0
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_088391500_2_08839150
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_088391600_2_08839160
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 0_2_088336300_2_08833630
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_00F1E6C19_2_00F1E6C1
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_00F1A9689_2_00F1A968
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_00F14AA09_2_00F14AA0
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_00F13E889_2_00F13E88
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_00F141D09_2_00F141D0
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068BA0689_2_068BA068
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068BBB589_2_068BBB58
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068C56309_2_068C5630
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068C66789_2_068C6678
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068C24209_2_068C2420
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068CB2C89_2_068CB2C8
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068CC2209_2_068CC220
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068C7E089_2_068C7E08
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068C77289_2_068C7728
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068CE4489_2_068CE448
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068C00079_2_068C0007
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068C00409_2_068C0040
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_068C5D789_2_068C5D78
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_0167E2EC10_2_0167E2EC
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_0580051810_2_05800518
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_05807AE810_2_05807AE8
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_0580050910_2_05800509
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_05807AD810_2_05807AD8
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_077E1F7110_2_077E1F71
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_077E3F0010_2_077E3F00
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_077E1F8010_2_077E1F80
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_077EA6C010_2_077EA6C0
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_077E45C010_2_077E45C0
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_077E45B010_2_077E45B0
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_077E1B4810_2_077E1B48
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_077E23B810_2_077E23B8
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_010CE2C115_2_010CE2C1
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_010CAA2315_2_010CAA23
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_010C4AA015_2_010C4AA0
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_010CDCE815_2_010CDCE8
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_010C3E8815_2_010C3E88
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_010C41D015_2_010C41D0
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_058FA06815_2_058FA068
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_058FBB5815_2_058FBB58
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_0690B6E015_2_0690B6E0
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_0690563015_2_06905630
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_0690667815_2_06906678
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_0690B2BA15_2_0690B2BA
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_0690C22015_2_0690C220
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_069030F815_2_069030F8
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_06907E0815_2_06907E08
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_0690772815_2_06907728
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_0690E44815_2_0690E448
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_0690004015_2_06900040
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_06905D6715_2_06905D67
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 15_2_0690000715_2_06900007
                  Source: Payment List.bat.exe, 00000000.00000002.2059120003.0000000008840000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs Payment List.bat.exe
                  Source: Payment List.bat.exe, 00000000.00000002.2050105007.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Payment List.bat.exe
                  Source: Payment List.bat.exe, 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebb26f961-fadf-4425-9082-cde080536011.exe4 vs Payment List.bat.exe
                  Source: Payment List.bat.exe, 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Payment List.bat.exe
                  Source: Payment List.bat.exe, 00000000.00000002.2051609562.0000000002A2F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebb26f961-fadf-4425-9082-cde080536011.exe4 vs Payment List.bat.exe
                  Source: Payment List.bat.exe, 00000000.00000000.1996291919.0000000000708000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedhRh.exe6 vs Payment List.bat.exe
                  Source: Payment List.bat.exe, 00000000.00000002.2058603056.0000000006D70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Payment List.bat.exe
                  Source: Payment List.bat.exe, 00000000.00000002.2059160853.00000000088A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedhRh.exe6 vs Payment List.bat.exe
                  Source: Payment List.bat.exe, 00000009.00000002.3235139188.0000000000CF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Payment List.bat.exe
                  Source: Payment List.bat.exeBinary or memory string: OriginalFilenamedhRh.exe6 vs Payment List.bat.exe
                  Source: Payment List.bat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 9.2.Payment List.bat.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 10.2.qicqbuFUGCXO.exe.449feb8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.Payment List.bat.exe.3c09bc8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 10.2.qicqbuFUGCXO.exe.449feb8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.Payment List.bat.exe.3c09bc8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: Payment List.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: qicqbuFUGCXO.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, KLhJmaON.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, KLhJmaON.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, 9HIFdl.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, 9HIFdl.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, Jsi8pDhntxMX6Xyxk2.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, Jsi8pDhntxMX6Xyxk2.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, Jsi8pDhntxMX6Xyxk2.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, euaaF1BcsGrmlCeRIA.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, euaaF1BcsGrmlCeRIA.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, euaaF1BcsGrmlCeRIA.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, euaaF1BcsGrmlCeRIA.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, Jsi8pDhntxMX6Xyxk2.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, Jsi8pDhntxMX6Xyxk2.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, Jsi8pDhntxMX6Xyxk2.csSecurity API names: _0020.AddAccessRule
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/15@2/2
                  Source: C:\Users\user\Desktop\Payment List.bat.exeFile created: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7548:120:WilError_03
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMutant created: \Sessions\1\BaseNamedObjects\DJoxFmROk
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6148:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3636:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5880:120:WilError_03
                  Source: C:\Users\user\Desktop\Payment List.bat.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC3DF.tmpJump to behavior
                  Source: Payment List.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Payment List.bat.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\Payment List.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Payment List.bat.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Payment List.bat.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Payment List.bat.exeVirustotal: Detection: 39%
                  Source: Payment List.bat.exeReversingLabs: Detection: 26%
                  Source: C:\Users\user\Desktop\Payment List.bat.exeFile read: C:\Users\user\Desktop\Payment List.bat.exe:Zone.IdentifierJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Payment List.bat.exe "C:\Users\user\Desktop\Payment List.bat.exe"
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp"
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Users\user\Desktop\Payment List.bat.exe "C:\Users\user\Desktop\Payment List.bat.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpD43A.tmp"
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess created: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess created: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp"Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Users\user\Desktop\Payment List.bat.exe "C:\Users\user\Desktop\Payment List.bat.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpD43A.tmp"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess created: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess created: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: wbemcomn.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: rasapi32.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: rasman.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: rtutils.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: mswsock.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: dnsapi.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: winnsi.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: rasadhlp.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: fwpuclnt.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: secur32.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: schannel.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: mskeyprotect.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: ntasn1.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: ncrypt.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: ncryptsslp.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: vaultcli.dll
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\Desktop\Payment List.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\Payment List.bat.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: Payment List.bat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Payment List.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: Payment List.bat.exe, Form1.cs.Net Code: InitializeComponent
                  Source: qicqbuFUGCXO.exe.0.dr, Form1.cs.Net Code: InitializeComponent
                  Source: 0.2.Payment List.bat.exe.8840000.6.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, Jsi8pDhntxMX6Xyxk2.cs.Net Code: pmo5yOopxhe9Lsx1Haj System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, Jsi8pDhntxMX6Xyxk2.cs.Net Code: pmo5yOopxhe9Lsx1Haj System.Reflection.Assembly.Load(byte[])
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_00F1A255 push esp; retf 0139h9_2_00F1A6C1
                  Source: C:\Users\user\Desktop\Payment List.bat.exeCode function: 9_2_00F10C55 push edi; retf 9_2_00F10C7A
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_077E723F pushad ; retf 10_2_077E7245
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeCode function: 10_2_077E505D pushfd ; ret 10_2_077E505E
                  Source: Payment List.bat.exeStatic PE information: section name: .text entropy: 7.9683017131333695
                  Source: qicqbuFUGCXO.exe.0.drStatic PE information: section name: .text entropy: 7.9683017131333695
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, r0iZedUvuindKHylwd.csHigh entropy of concatenated method names: 'puyJ1s10GM', 'WhtJBnTxD7', 'oh0JfLXl6k', 'N8SJUu733p', 'Ey5JFa8hAU', 'Lm0JICsnEn', 'dYYJM5QHvC', 'LAnJDHKkC6', 'KJBJYG9Xsd', 'dvMJPCECKb'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, pikLgkbN4ZISFR2s3c.csHigh entropy of concatenated method names: 'mKlhlkSQ1m', 'UnjhEbqJOW', 'rp8hykMng8', 'RUXh0WBOli', 'B26hnoDEmQ', 'Bh7hoTVFc4', 'tLQhVVUTKg', 'P5Te5ApeoE', 'Tnee4Qf6p0', 'PL1edHJs7r'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, ELtqISxsOw3V02RCjFW.csHigh entropy of concatenated method names: 'tqph1yBrlX', 'MPJhBGhX4M', 'sLwhfm4u1b', 'n8chUMth4n', 'ORDhFAX3Jt', 'QMIhIys1Rl', 'TeVhMUUpq2', 'qJ2hDI3DFw', 'aTThYgEZoG', 'tglhP08ovA'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, dWulo9RpUOalcjJI2Q.csHigh entropy of concatenated method names: 'WrCJ0Hl5ak', 'ByrJw7pRoJ', 'tYdJVsE2QX', 'lZWVXxCDKm', 'quaVzWarn7', 'vaoJpEKSQi', 'S82Jl6wLK4', 'KY9J9Qwd9h', 'r3ZJE9xTGJ', 'UKeJyVFkXK'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, p0iPcUeZyPThV5MRLn.csHigh entropy of concatenated method names: 'kLrVZvmjiB', 'MWPVnbTjiF', 'wloVoZ2Moe', 'cttVJCiL4R', 'VQ1Vv76HHD', 'iUXoqBMC2b', 'jTooKLJSMK', 'ddjo5nGHWI', 'BZGo4iWYbD', 'TIOodtUY4t'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, rYGv6xaF2ojY36Wqqb.csHigh entropy of concatenated method names: 'NIie0yMOW5', 'h9benpJh8s', 'z5OewxEFmM', 'brHeoP95Eo', 'vWqeVcuiIp', 'HJWeJk1jua', 'PZ1evX7193', 'NMBebiJCS6', 'y3oea6VjwM', 'opEexyF9ox'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, SJAEGJxHxC1BWIHAdZ8.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'O3PTH3Hr3x', 'ILnTrna6FB', 'PmXTLaQcdE', 'CbaTRF1XvW', 'oVBTqrPHWl', 'goLTKEHWAo', 'KtRT5rkKck'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, qKTWB5qjUIJB9pwDoA.csHigh entropy of concatenated method names: 'Dispose', 'bx6ldoIrdd', 'MnL9WEPvoU', 'uokkkaCnIr', 'Q0QlXmaWFG', 'wBhlzIlB1J', 'ProcessDialogKey', 'iT19pJd4lh', 'jOr9lrTxut', 'PCc99VYyru'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, EhpjUmncbbEC1BLpWS.csHigh entropy of concatenated method names: 'Nw9lJXHehO', 'goElvOhdww', 'rNnla1NUFu', 'r2ylxyy2ye', 'hPUlO6bNQs', 'Afbl8rCngc', 'thadskZhrkhjaRjTOV', 'pRlbDtgJQHcaKgOINU', 'eRSllJO0VG', 'qIclE9Qoqo'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, aWlFDfwStAKSqIvErB.csHigh entropy of concatenated method names: 'J91uapAQdC', 'lS0uxDOrZF', 'ToString', 'HIPu0gUDOf', 'itDun2T7lo', 'PweuwQKQE6', 'uehuoKSDVr', 'DAJuV4JWyd', 'IL7uJGAQuX', 'KGRuvQXdwq'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, hpCmMLpM3wQUvsSK1M.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'dZu9dVQIC1', 'o6x9Xdb5El', 'aGt9zkrPnI', 'TSQEpw3WJB', 'GkAElyoCso', 'Jc5E9ZNNXs', 'evdEE3mRCI', 'xYVZXeolL7WCI0q8APP'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, X8ilbRKJ9gowAsFF2T.csHigh entropy of concatenated method names: 'pgPu4WPITY', 'oLtuXljTb4', 'csEephFvNR', 'g7HelIvJuW', 'yoxuQKsopx', 'O9Iuie85PL', 'XkAujwyymG', 'JKyuHCUh5j', 'je5urSq28q', 'uh1uLsCEjI'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, Nnw42Cz0pPmI8skKNY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Pujht4wd1h', 'eV6hODwbIK', 'EYWh81xdeA', 'ULohuTFebx', 'kxohePguwN', 'FjGhh9Lrt0', 'wlihT0l2yH'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, SWgkEbtr45SQJ1E5e9.csHigh entropy of concatenated method names: 'HBnwU18OjM', 'g7cwI557q4', 'P4SwDmhIMF', 'PpkwYykva3', 'eIowO3TN0H', 'Gk3w8nEpNG', 'MbZwunE7T8', 'YhFwem4596', 'EKrwhAF8gJ', 'zhiwT22O1q'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, euaaF1BcsGrmlCeRIA.csHigh entropy of concatenated method names: 'R0UnH5vPGo', 'LmLnrxYZK4', 'I4knLXEacH', 'fSOnRLil8U', 'pymnqKuKWp', 'MCnnKKJ9il', 'lFSn5GxM1i', 'Uewn4T8Ete', 'qUjndDE6a1', 'Ba3nX9Rpye'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, SsPoL0kKePBSP7AoUO.csHigh entropy of concatenated method names: 'mVZe7gwEOB', 'oXJeWElOef', 'zsmeAdkeZl', 'rCkesLyF10', 'zJ2eHGjviq', 'qPpe3UTtpK', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, KOOR6mdGIBnqTRBpUD.csHigh entropy of concatenated method names: 'OTFfdsox0', 'FeeUntNyx', 'S7FIOwYQ7', 'X9NMUkBWG', 'mUpYMwCHv', 'PopPX7isX', 'pP3yy1KqVwLkv6HAvt', 'k6jsa9tmhJtjvnKD5R', 'c1LeTTSUM', 'xjyT5tXsC'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, kuPSY3Xvn0gTTjEVG5.csHigh entropy of concatenated method names: 'oUYtDSfd7E', 'SyUtYFuihh', 'mXEt7ipcVN', 'kNetW0kSUl', 'v61tsXxXAo', 'gFot3NkOQM', 'aI9tGm6dgd', 'sxctcFeR0d', 'adHtSQLxIV', 'CnetQuPw1D'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, mjxHCeI2arfhcxYQMD.csHigh entropy of concatenated method names: 'p24OS0q3t0', 'aoTOiEALVn', 'D3BOH3Xxht', 'DpaOrLRXyD', 'R5dOWh6hKI', 'yPLOA3j1fd', 'R4mOsSnofX', 'U3lO3TfjdO', 'SqyOCiFG6H', 'opKOGji23h'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, ESiwFYGf9PIJGb224M.csHigh entropy of concatenated method names: 'reHoFJcx4I', 'yhJoM6ijZC', 'mMLwAWb1WU', 'WtgwsnE3aD', 'DaQw3SopxJ', 'CA4wCksoNd', 'oROwGLO2G8', 'AwDwce73iL', 'Uqqwg2wx7G', 'UxIwSN0Pfe'
                  Source: 0.2.Payment List.bat.exe.3cf9160.2.raw.unpack, Jsi8pDhntxMX6Xyxk2.csHigh entropy of concatenated method names: 'iPHEZKLncS', 'OrEE0aywFR', 'DeNEnOBVhv', 'HQ9EwVollF', 'E1oEoNP3vi', 'Jw8EVJNMQY', 'MZcEJ3wLfq', 'VLFEvqL1Y0', 'TFxEbJLG8l', 'YWHEak41ot'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, r0iZedUvuindKHylwd.csHigh entropy of concatenated method names: 'puyJ1s10GM', 'WhtJBnTxD7', 'oh0JfLXl6k', 'N8SJUu733p', 'Ey5JFa8hAU', 'Lm0JICsnEn', 'dYYJM5QHvC', 'LAnJDHKkC6', 'KJBJYG9Xsd', 'dvMJPCECKb'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, pikLgkbN4ZISFR2s3c.csHigh entropy of concatenated method names: 'mKlhlkSQ1m', 'UnjhEbqJOW', 'rp8hykMng8', 'RUXh0WBOli', 'B26hnoDEmQ', 'Bh7hoTVFc4', 'tLQhVVUTKg', 'P5Te5ApeoE', 'Tnee4Qf6p0', 'PL1edHJs7r'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, ELtqISxsOw3V02RCjFW.csHigh entropy of concatenated method names: 'tqph1yBrlX', 'MPJhBGhX4M', 'sLwhfm4u1b', 'n8chUMth4n', 'ORDhFAX3Jt', 'QMIhIys1Rl', 'TeVhMUUpq2', 'qJ2hDI3DFw', 'aTThYgEZoG', 'tglhP08ovA'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, dWulo9RpUOalcjJI2Q.csHigh entropy of concatenated method names: 'WrCJ0Hl5ak', 'ByrJw7pRoJ', 'tYdJVsE2QX', 'lZWVXxCDKm', 'quaVzWarn7', 'vaoJpEKSQi', 'S82Jl6wLK4', 'KY9J9Qwd9h', 'r3ZJE9xTGJ', 'UKeJyVFkXK'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, p0iPcUeZyPThV5MRLn.csHigh entropy of concatenated method names: 'kLrVZvmjiB', 'MWPVnbTjiF', 'wloVoZ2Moe', 'cttVJCiL4R', 'VQ1Vv76HHD', 'iUXoqBMC2b', 'jTooKLJSMK', 'ddjo5nGHWI', 'BZGo4iWYbD', 'TIOodtUY4t'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, rYGv6xaF2ojY36Wqqb.csHigh entropy of concatenated method names: 'NIie0yMOW5', 'h9benpJh8s', 'z5OewxEFmM', 'brHeoP95Eo', 'vWqeVcuiIp', 'HJWeJk1jua', 'PZ1evX7193', 'NMBebiJCS6', 'y3oea6VjwM', 'opEexyF9ox'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, SJAEGJxHxC1BWIHAdZ8.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'O3PTH3Hr3x', 'ILnTrna6FB', 'PmXTLaQcdE', 'CbaTRF1XvW', 'oVBTqrPHWl', 'goLTKEHWAo', 'KtRT5rkKck'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, qKTWB5qjUIJB9pwDoA.csHigh entropy of concatenated method names: 'Dispose', 'bx6ldoIrdd', 'MnL9WEPvoU', 'uokkkaCnIr', 'Q0QlXmaWFG', 'wBhlzIlB1J', 'ProcessDialogKey', 'iT19pJd4lh', 'jOr9lrTxut', 'PCc99VYyru'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, EhpjUmncbbEC1BLpWS.csHigh entropy of concatenated method names: 'Nw9lJXHehO', 'goElvOhdww', 'rNnla1NUFu', 'r2ylxyy2ye', 'hPUlO6bNQs', 'Afbl8rCngc', 'thadskZhrkhjaRjTOV', 'pRlbDtgJQHcaKgOINU', 'eRSllJO0VG', 'qIclE9Qoqo'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, aWlFDfwStAKSqIvErB.csHigh entropy of concatenated method names: 'J91uapAQdC', 'lS0uxDOrZF', 'ToString', 'HIPu0gUDOf', 'itDun2T7lo', 'PweuwQKQE6', 'uehuoKSDVr', 'DAJuV4JWyd', 'IL7uJGAQuX', 'KGRuvQXdwq'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, hpCmMLpM3wQUvsSK1M.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'dZu9dVQIC1', 'o6x9Xdb5El', 'aGt9zkrPnI', 'TSQEpw3WJB', 'GkAElyoCso', 'Jc5E9ZNNXs', 'evdEE3mRCI', 'xYVZXeolL7WCI0q8APP'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, X8ilbRKJ9gowAsFF2T.csHigh entropy of concatenated method names: 'pgPu4WPITY', 'oLtuXljTb4', 'csEephFvNR', 'g7HelIvJuW', 'yoxuQKsopx', 'O9Iuie85PL', 'XkAujwyymG', 'JKyuHCUh5j', 'je5urSq28q', 'uh1uLsCEjI'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, Nnw42Cz0pPmI8skKNY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Pujht4wd1h', 'eV6hODwbIK', 'EYWh81xdeA', 'ULohuTFebx', 'kxohePguwN', 'FjGhh9Lrt0', 'wlihT0l2yH'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, SWgkEbtr45SQJ1E5e9.csHigh entropy of concatenated method names: 'HBnwU18OjM', 'g7cwI557q4', 'P4SwDmhIMF', 'PpkwYykva3', 'eIowO3TN0H', 'Gk3w8nEpNG', 'MbZwunE7T8', 'YhFwem4596', 'EKrwhAF8gJ', 'zhiwT22O1q'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, euaaF1BcsGrmlCeRIA.csHigh entropy of concatenated method names: 'R0UnH5vPGo', 'LmLnrxYZK4', 'I4knLXEacH', 'fSOnRLil8U', 'pymnqKuKWp', 'MCnnKKJ9il', 'lFSn5GxM1i', 'Uewn4T8Ete', 'qUjndDE6a1', 'Ba3nX9Rpye'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, SsPoL0kKePBSP7AoUO.csHigh entropy of concatenated method names: 'mVZe7gwEOB', 'oXJeWElOef', 'zsmeAdkeZl', 'rCkesLyF10', 'zJ2eHGjviq', 'qPpe3UTtpK', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, KOOR6mdGIBnqTRBpUD.csHigh entropy of concatenated method names: 'OTFfdsox0', 'FeeUntNyx', 'S7FIOwYQ7', 'X9NMUkBWG', 'mUpYMwCHv', 'PopPX7isX', 'pP3yy1KqVwLkv6HAvt', 'k6jsa9tmhJtjvnKD5R', 'c1LeTTSUM', 'xjyT5tXsC'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, kuPSY3Xvn0gTTjEVG5.csHigh entropy of concatenated method names: 'oUYtDSfd7E', 'SyUtYFuihh', 'mXEt7ipcVN', 'kNetW0kSUl', 'v61tsXxXAo', 'gFot3NkOQM', 'aI9tGm6dgd', 'sxctcFeR0d', 'adHtSQLxIV', 'CnetQuPw1D'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, mjxHCeI2arfhcxYQMD.csHigh entropy of concatenated method names: 'p24OS0q3t0', 'aoTOiEALVn', 'D3BOH3Xxht', 'DpaOrLRXyD', 'R5dOWh6hKI', 'yPLOA3j1fd', 'R4mOsSnofX', 'U3lO3TfjdO', 'SqyOCiFG6H', 'opKOGji23h'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, ESiwFYGf9PIJGb224M.csHigh entropy of concatenated method names: 'reHoFJcx4I', 'yhJoM6ijZC', 'mMLwAWb1WU', 'WtgwsnE3aD', 'DaQw3SopxJ', 'CA4wCksoNd', 'oROwGLO2G8', 'AwDwce73iL', 'Uqqwg2wx7G', 'UxIwSN0Pfe'
                  Source: 0.2.Payment List.bat.exe.6d70000.5.raw.unpack, Jsi8pDhntxMX6Xyxk2.csHigh entropy of concatenated method names: 'iPHEZKLncS', 'OrEE0aywFR', 'DeNEnOBVhv', 'HQ9EwVollF', 'E1oEoNP3vi', 'Jw8EVJNMQY', 'MZcEJ3wLfq', 'VLFEvqL1Y0', 'TFxEbJLG8l', 'YWHEak41ot'
                  Source: C:\Users\user\Desktop\Payment List.bat.exeFile created: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp"

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Payment List.bat.exe PID: 4268, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: qicqbuFUGCXO.exe PID: 7336, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Payment List.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: 2820000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: 4990000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: 8A90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: 6E00000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: 9B90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: AB90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: F10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: 1130000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMemory allocated: 1670000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMemory allocated: 3260000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMemory allocated: 5260000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMemory allocated: 8E60000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMemory allocated: 75F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMemory allocated: 8E60000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMemory allocated: 1080000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMemory allocated: 2E80000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMemory allocated: 11D0000 memory reserve | memory write watch
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6113Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 423Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7921Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 596Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeWindow / User API: threadDelayed 2629Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeWindow / User API: threadDelayed 2440Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeWindow / User API: threadDelayed 455
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeWindow / User API: threadDelayed 3730
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 5308Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1172Thread sleep count: 6113 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7224Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5864Thread sleep count: 423 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4284Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7260Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5044Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7212Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -15679732462653109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -100000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7444Thread sleep count: 2629 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -99875s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7444Thread sleep count: 2440 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -99765s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -99656s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -99547s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -99437s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -99328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -99219s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -99109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -99000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -98890s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -98760s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -98641s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -98516s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -98406s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -98297s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -98187s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -98078s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -97968s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -97859s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -97745s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -97625s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -97515s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -97406s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -97297s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exe TID: 7436Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7356Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -7378697629483816s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -100000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7708Thread sleep count: 455 > 30
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -99875s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7708Thread sleep count: 3730 > 30
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -99766s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -99657s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -99532s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -99422s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -99313s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -99188s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -99063s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -98938s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -98813s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -98703s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -98594s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -98469s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -98360s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -98235s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -98110s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -97985s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -97860s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -97735s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -97610s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe TID: 7704Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Desktop\Payment List.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\Payment List.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Payment List.bat.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 99875Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 99765Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 99656Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 99547Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 99437Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 99328Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 99219Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 99109Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 99000Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 98890Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 98760Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 98641Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 98516Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 98406Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 98297Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 98187Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 98078Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 97968Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 97859Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 97745Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 97625Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 97515Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 97406Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 97297Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 100000
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 99875
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 99766
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 99657
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 99532
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 99422
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 99313
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 99188
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 99063
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 98938
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 98813
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 98703
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 98594
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 98469
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 98360
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 98235
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 98110
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 97985
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 97860
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 97735
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 97610
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeThread delayed: delay time: 922337203685477
                  Source: Payment List.bat.exe, 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000A.00000002.2088998167.000000000449F000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3234618654.0000000000425000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: hgfsZrw6
                  Source: qicqbuFUGCXO.exe, 0000000F.00000002.3236064889.00000000011AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllA
                  Source: Payment List.bat.exe, 00000009.00000002.3236913525.0000000001009000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe"
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeMemory written: C:\Users\user\Desktop\Payment List.bat.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeMemory written: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp"Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeProcess created: C:\Users\user\Desktop\Payment List.bat.exe "C:\Users\user\Desktop\Payment List.bat.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpD43A.tmp"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess created: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeProcess created: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Users\user\Desktop\Payment List.bat.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Users\user\Desktop\Payment List.bat.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\Payment List.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.449feb8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3bcf1a8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3c09bc8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.449feb8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3c09bc8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3237643875.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.3238159947.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2088998167.000000000449F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Payment List.bat.exe PID: 4268, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Payment List.bat.exe PID: 7228, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: qicqbuFUGCXO.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: qicqbuFUGCXO.exe PID: 7600, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Payment List.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeFile opened: C:\FTP Navigator\Ftplist.txt
                  Source: C:\Users\user\Desktop\Payment List.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\Payment List.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                  Source: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.449feb8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3bcf1a8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3c09bc8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.449feb8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3c09bc8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.3237643875.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.3238159947.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2088998167.000000000449F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Payment List.bat.exe PID: 4268, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Payment List.bat.exe PID: 7228, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: qicqbuFUGCXO.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: qicqbuFUGCXO.exe PID: 7600, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.449feb8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3bcf1a8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3c09bc8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.44da8d8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.qicqbuFUGCXO.exe.449feb8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3c09bc8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Payment List.bat.exe.3bcf1a8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3237643875.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.3238159947.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.2088998167.000000000449F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Payment List.bat.exe PID: 4268, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Payment List.bat.exe PID: 7228, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: qicqbuFUGCXO.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: qicqbuFUGCXO.exe PID: 7600, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  111
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  24
                  System Information Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  Scheduled Task/Job
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  1
                  Query Registry
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                  Software Packing
                  NTDS211
                  Security Software Discovery
                  Distributed Component Object Model1
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets1
                  Process Discovery
                  SSHKeylogging23
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Masquerading
                  Cached Domain Credentials141
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                  Virtualization/Sandbox Evasion
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                  Process Injection
                  Proc Filesystem1
                  System Network Configuration Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1448359 Sample: Payment List.bat.exe Startdate: 28/05/2024 Architecture: WINDOWS Score: 100 44 smtp.privateemail.com 2->44 46 api.ipify.org 2->46 52 Multi AV Scanner detection for domain / URL 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 17 other signatures 2->58 8 qicqbuFUGCXO.exe 5 2->8         started        11 Payment List.bat.exe 7 2->11         started        signatures3 process4 file5 60 Antivirus detection for dropped file 8->60 62 Multi AV Scanner detection for dropped file 8->62 64 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->64 66 Machine Learning detection for dropped file 8->66 14 qicqbuFUGCXO.exe 8->14         started        17 schtasks.exe 8->17         started        19 qicqbuFUGCXO.exe 8->19         started        40 C:\Users\user\AppData\...\qicqbuFUGCXO.exe, PE32 11->40 dropped 42 C:\Users\user\AppData\Local\...\tmpC3DF.tmp, XML 11->42 dropped 68 Adds a directory exclusion to Windows Defender 11->68 70 Injects a PE file into a foreign processes 11->70 21 Payment List.bat.exe 15 2 11->21         started        24 powershell.exe 23 11->24         started        26 powershell.exe 23 11->26         started        28 schtasks.exe 1 11->28         started        signatures6 process7 dnsIp8 72 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->72 74 Tries to steal Mail credentials (via file / registry access) 14->74 76 Tries to harvest and steal ftp login credentials 14->76 78 Tries to harvest and steal browser information (history, passwords, etc) 14->78 30 conhost.exe 17->30         started        48 smtp.privateemail.com 66.29.159.53, 49709, 49713, 587 ADVANTAGECOMUS United States 21->48 50 api.ipify.org 104.26.12.205, 443, 49708, 49712 CLOUDFLARENETUS United States 21->50 80 Loading BitLocker PowerShell Module 24->80 32 conhost.exe 24->32         started        34 WmiPrvSE.exe 24->34         started        36 conhost.exe 26->36         started        38 conhost.exe 28->38         started        signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Payment List.bat.exe40%VirustotalBrowse
                  Payment List.bat.exe26%ReversingLabsByteCode-MSIL.Trojan.CrypterX
                  Payment List.bat.exe100%AviraHEUR/AGEN.1309290
                  Payment List.bat.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe100%AviraHEUR/AGEN.1309290
                  C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe26%ReversingLabsByteCode-MSIL.Trojan.CrypterX
                  C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe40%VirustotalBrowse
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  api.ipify.org1%VirustotalBrowse
                  smtp.privateemail.com6%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://api.ipify.org/0%URL Reputationsafe
                  http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                  https://api.ipify.org0%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  https://account.dyn.com/0%URL Reputationsafe
                  http://ocsp.sectigo.com00%URL Reputationsafe
                  https://api.ipify.org/t0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://smtp.privateemail.com100%Avira URL Cloudmalware
                  http://smtp.privateemail.com6%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api.ipify.org
                  104.26.12.205
                  truefalseunknown
                  smtp.privateemail.com
                  66.29.159.53
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#Payment List.bat.exe, 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3236064889.0000000001178000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.0000000006486000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://api.ipify.orgPayment List.bat.exe, 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3237643875.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000A.00000002.2088998167.000000000449F000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3234618654.0000000000425000.00000040.00000400.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://sectigo.com/CPS0Payment List.bat.exe, 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3236064889.0000000001178000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.0000000006486000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://account.dyn.com/Payment List.bat.exe, 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3234606006.0000000000435000.00000040.00000400.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000A.00000002.2088998167.000000000449F000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ocsp.sectigo.com0Payment List.bat.exe, 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3236645093.0000000000FD2000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3236064889.0000000001178000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3248237829.0000000006486000.00000004.00000020.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://api.ipify.org/tPayment List.bat.exe, 00000009.00000002.3237643875.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002E81000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePayment List.bat.exe, 00000000.00000002.2051609562.0000000002A2F000.00000004.00000800.00020000.00000000.sdmp, Payment List.bat.exe, 00000009.00000002.3237643875.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000A.00000002.2087668364.00000000032B0000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002E81000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://smtp.privateemail.comPayment List.bat.exe, 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, qicqbuFUGCXO.exe, 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 6%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.26.12.205
                  api.ipify.orgUnited States
                  13335CLOUDFLARENETUSfalse
                  66.29.159.53
                  smtp.privateemail.comUnited States
                  19538ADVANTAGECOMUStrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1448359
                  Start date and time:2024-05-28 09:10:32 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 15s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:19
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Payment List.bat.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@21/15@2/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 257
                  • Number of non-executed functions: 27
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtCreateKey calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  03:11:19API Interceptor27x Sleep call for process: Payment List.bat.exe modified
                  03:11:21API Interceptor27x Sleep call for process: powershell.exe modified
                  03:11:24API Interceptor23x Sleep call for process: qicqbuFUGCXO.exe modified
                  09:11:22Task SchedulerRun new task: qicqbuFUGCXO path: C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.26.12.205482730621.exeGet hashmaliciousStealitBrowse
                  • api.ipify.org/?format=json
                  482730621.exeGet hashmaliciousStealitBrowse
                  • api.ipify.org/?format=json
                  Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                  • api.ipify.org/?format=json
                  Sky-Beta.exeGet hashmaliciousStealitBrowse
                  • api.ipify.org/?format=json
                  SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                  • api.ipify.org/
                  lods.cmdGet hashmaliciousRemcosBrowse
                  • api.ipify.org/
                  66.29.159.53INQUIRY RE44535_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    Texas_Tool_Purchase_Order#T18834-1.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                      Swift_Message#1234323456.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                        e-dekont_swift-details.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                          17129052285907bbffa1e06db9a2c2be9b124dbfe370dcce33488c29504b5286529b8a6aa8471.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                            Scan_IMG-Payment Sheet _Till Febuary 2024...bat.exeGet hashmaliciousAgentTeslaBrowse
                              1709572324a197889913f96ec9bd444cdc1a03ae72cd8e81098994f82b76ebbbd558d62ba0270.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                1709572324a197889913f96ec9bd444cdc1a03ae72cd8e81098994f82b76ebbbd558d62ba0270.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                  https://www.wikiran.org/attachments/leaks/asbgroup//4d90f5a202dda02e5900334984637a7fd0d3b2e2/CIMB%20PAYMENT%200520.zipGet hashmaliciousAgentTeslaBrowse
                                    pAYMENTcOPY.com.exeGet hashmaliciousAgentTesla, NSISDropperBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      smtp.privateemail.comINQUIRY RE44535_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 66.29.159.53
                                      Texas_Tool_Purchase_Order#T18834-1.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                      • 66.29.159.53
                                      Swift_Message#1234323456.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                      • 66.29.159.53
                                      e-dekont_swift-details.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                      • 66.29.159.53
                                      17129052285907bbffa1e06db9a2c2be9b124dbfe370dcce33488c29504b5286529b8a6aa8471.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                      • 66.29.159.53
                                      Scan_IMG-Payment Sheet _Till Febuary 2024...bat.exeGet hashmaliciousAgentTeslaBrowse
                                      • 66.29.159.53
                                      1709572324a197889913f96ec9bd444cdc1a03ae72cd8e81098994f82b76ebbbd558d62ba0270.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                      • 66.29.159.53
                                      1709572324a197889913f96ec9bd444cdc1a03ae72cd8e81098994f82b76ebbbd558d62ba0270.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                      • 66.29.159.53
                                      https://www.wikiran.org/attachments/leaks/asbgroup//4d90f5a202dda02e5900334984637a7fd0d3b2e2/CIMB%20PAYMENT%200520.zipGet hashmaliciousAgentTeslaBrowse
                                      • 66.29.159.53
                                      pAYMENTcOPY.com.exeGet hashmaliciousAgentTesla, NSISDropperBrowse
                                      • 66.29.159.53
                                      api.ipify.orgN#U00a3mero de pedido HMFZ0772 [Pedido].exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      http://pesoneta3754.pages.dev/help/contact/687223607724468/Get hashmaliciousUnknownBrowse
                                      • 104.26.12.205
                                      https://spoge-tronie37834.pages.dev/help/contact/815304886072906Get hashmaliciousUnknownBrowse
                                      • 172.67.74.152
                                      http://fb.com-case0328.me/help/contact/472015820496903Get hashmaliciousUnknownBrowse
                                      • 172.67.74.152
                                      http://kalvin9835-philadent98254.pages.dev/Get hashmaliciousUnknownBrowse
                                      • 104.26.13.205
                                      http://fb.com-case0328.me/help/Get hashmaliciousUnknownBrowse
                                      • 104.26.12.205
                                      https://grtpesoneta3754.pages.dev/help/contact/310231431980412Get hashmaliciousUnknownBrowse
                                      • 104.26.12.205
                                      Company Profile.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.13.205
                                      b86258bbf5182d3da8292cbff6262a90cef9dd418fd8b6706fde5747662da2ae_dump.bin.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 104.26.12.205
                                      https://pesoneta3754.pages.dev/help/defaults.phpGet hashmaliciousUnknownBrowse
                                      • 104.26.12.205
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUSN#U00a3mero de pedido HMFZ0772 [Pedido].exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      https://layanan-banntuan.program-update.com/Get hashmaliciousUnknownBrowse
                                      • 172.67.196.204
                                      https://download.adaware.com/nano_download.php?partner=adawareGet hashmaliciousUnknownBrowse
                                      • 104.16.212.94
                                      http://personapatternanalyzer.com/6c9pixalGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      D8toi0qM9J.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                      • 104.16.180.49
                                      http://pesoneta3754.pages.dev/help/contact/687223607724468/Get hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      http://xmdt-kun-5-manh.pages.dev/Get hashmaliciousUnknownBrowse
                                      • 188.114.96.3
                                      http://pemulihanakunndanaa.program-update.com/Get hashmaliciousUnknownBrowse
                                      • 104.17.25.14
                                      http://mint-openseapro-nftsx.vercel.app/Get hashmaliciousUnknownBrowse
                                      • 104.17.25.14
                                      http://pemulihan-akun-danaaa.program-update.com/Get hashmaliciousUnknownBrowse
                                      • 172.67.196.204
                                      ADVANTAGECOMUSVSL_BUNKER INQUIRY.exeGet hashmaliciousFormBookBrowse
                                      • 66.29.149.46
                                      PO JAN 2024.exeGet hashmaliciousFormBookBrowse
                                      • 66.29.145.248
                                      RFQ#o52824.exeGet hashmaliciousFormBookBrowse
                                      • 66.29.149.46
                                      Doc_10577030xls.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 66.29.151.236
                                      Copy#51007602.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 66.29.151.236
                                      Doc100057638xls.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      • 66.29.151.236
                                      RB_VAC_1.EXE.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                      • 66.29.137.12
                                      4TH HIRE SOA REMITTANCE_USD280,000.exeGet hashmaliciousFormBookBrowse
                                      • 66.29.149.46
                                      PAYMENT COPY.exeGet hashmaliciousFormBookBrowse
                                      • 66.29.149.46
                                      #U0426#U0438#U0442#U0430#U0442#U0430.exeGet hashmaliciousFormBookBrowse
                                      • 66.29.149.193
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0eN#U00a3mero de pedido HMFZ0772 [Pedido].exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.12.205
                                      https://o-p.me/public/Netflix/ch/login.php/Get hashmaliciousUnknownBrowse
                                      • 104.26.12.205
                                      http://pemulihanakunndanaa.program-update.com/Get hashmaliciousUnknownBrowse
                                      • 104.26.12.205
                                      http://mysteryybox13.vercel.app/Get hashmaliciousUnknownBrowse
                                      • 104.26.12.205
                                      https://suchen-mobile-fahrzeuge-details-search-390615990-request.de/Get hashmaliciousUnknownBrowse
                                      • 104.26.12.205
                                      Listido_Junio.exeGet hashmaliciousDarkCloud, DarkTortillaBrowse
                                      • 104.26.12.205
                                      1.ps1Get hashmaliciousDarkGate, MailPassViewBrowse
                                      • 104.26.12.205
                                      new.cmdGet hashmaliciousUnknownBrowse
                                      • 104.26.12.205
                                      IMG-35235235523525235252532535Selvfinansieret.vbsGet hashmaliciousGuLoaderBrowse
                                      • 104.26.12.205
                                      Company Profile.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.12.205
                                      No context
                                      Process:C:\Users\user\Desktop\Payment List.bat.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):1216
                                      Entropy (8bit):5.34331486778365
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                      Process:C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.34331486778365
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):2232
                                      Entropy (8bit):5.380805901110357
                                      Encrypted:false
                                      SSDEEP:48:lylWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugeC/ZPUyus:lGLHyIFKL3IZ2KRH9Oug8s
                                      MD5:16AD599332DD2FF94DA0787D71688B62
                                      SHA1:02F738694B02E84FFE3BAB7DE5709001823C6E40
                                      SHA-256:452876FE504FC0DBEDBD7F8467E94F6E80002DB4572D02C723ABC69F8DF0B367
                                      SHA-512:A96158FDFFA424A4AC01220EDC789F3236C03AAA6A7C1A3D8BE62074B4923957E6CFEEB6E8852F9064093E0A290B0E56E4B5504D18113A7983F48D5388CEC747
                                      Malicious:false
                                      Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Users\user\Desktop\Payment List.bat.exe
                                      File Type:XML 1.0 document, ASCII text
                                      Category:dropped
                                      Size (bytes):1585
                                      Entropy (8bit):5.115111534925106
                                      Encrypted:false
                                      SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtzxvn:cgergYrFdOFzOzN33ODOiDdKrsuTtv
                                      MD5:46C06DE08A32D8912122FEFFA542804F
                                      SHA1:7016849857F20EB4ABAA6A907B6643B2D01A155C
                                      SHA-256:3AED92A28B288F5DB0D1E077A879C8E6B7E3FF3CA4C8D5221EBC3A688D0B562F
                                      SHA-512:872913F7E074B284E6FBAE7F99DE7DD5BE4052F04329D5BF8003F6EC45DC9CF5FE8861F0D5E8C5F6836571DA4629C5FCEC60EF21FA84EC62F6E21DEA703D0515
                                      Malicious:true
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                      Process:C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe
                                      File Type:XML 1.0 document, ASCII text
                                      Category:dropped
                                      Size (bytes):1585
                                      Entropy (8bit):5.115111534925106
                                      Encrypted:false
                                      SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtzxvn:cgergYrFdOFzOzN33ODOiDdKrsuTtv
                                      MD5:46C06DE08A32D8912122FEFFA542804F
                                      SHA1:7016849857F20EB4ABAA6A907B6643B2D01A155C
                                      SHA-256:3AED92A28B288F5DB0D1E077A879C8E6B7E3FF3CA4C8D5221EBC3A688D0B562F
                                      SHA-512:872913F7E074B284E6FBAE7F99DE7DD5BE4052F04329D5BF8003F6EC45DC9CF5FE8861F0D5E8C5F6836571DA4629C5FCEC60EF21FA84EC62F6E21DEA703D0515
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                      Process:C:\Users\user\Desktop\Payment List.bat.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):683520
                                      Entropy (8bit):7.96173932044234
                                      Encrypted:false
                                      SSDEEP:12288:rKcOV/xljKrCu8RrCPZTUYTkXh/9HJRGWqF07TDuTkOVvF:PrC/rCRT+Rlv0F0fwLV
                                      MD5:FED0E7606FDAE5961988A53E62C792B9
                                      SHA1:6A2955BF2A7A60E1A5B3D37176D5C4842A582702
                                      SHA-256:2CD9EA183EF88BC1EE850151E47FFC1613B6A4A57DDBB14EF8230CD25BA77A70
                                      SHA-512:B49626292C059439C027C0211E499711616D09A0EEC50800F374952D4B2BC8CA83538250CA9BC5C87445D7AD9B2B8E1E6468386DC9D94BD6CEF29ADC0890F951
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 26%
                                      • Antivirus: Virustotal, Detection: 40%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...45Uf..............0..F...&.......d... ........@.. ....................................@.................................td..O........"........................................................................... ............... ..H............text....D... ...F.................. ..`.rsrc....".......$...H..............@..@.reloc...............l..............@..B.................d......H........h..07..........................................................6.(.....(....*...0..~......."....."......{....o....,..{....o......(....,...X..{....o....,..{....o......(....,...X..{....o....,..{....o......(....,...X..{....o....,..{....o......(....,...X..{....o....,..{....o......(....,...X..{....o....,..{....o......(....,...X..{....o....,..{....o......(....,...X..{....o......(....&..X..{....o......(....&..X..{....o......(....&..X..{"...o......(....&..X..{*.....(....o...
                                      Process:C:\Users\user\Desktop\Payment List.bat.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:false
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.96173932044234
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:Payment List.bat.exe
                                      File size:683'520 bytes
                                      MD5:fed0e7606fdae5961988a53e62c792b9
                                      SHA1:6a2955bf2a7a60e1a5b3d37176d5c4842a582702
                                      SHA256:2cd9ea183ef88bc1ee850151e47ffc1613b6a4a57ddbb14ef8230cd25ba77a70
                                      SHA512:b49626292c059439c027c0211e499711616d09a0eec50800f374952d4b2bc8ca83538250ca9bc5c87445d7ad9b2b8e1e6468386dc9d94bd6cef29adc0890f951
                                      SSDEEP:12288:rKcOV/xljKrCu8RrCPZTUYTkXh/9HJRGWqF07TDuTkOVvF:PrC/rCRT+Rlv0F0fwLV
                                      TLSH:2CE4237937B92363E5F9D2F054AA25D087F4728B76A0EAD55DD621C30DE3FA88200E47
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...45Uf..............0..F...&.......d... ........@.. ....................................@................................
                                      Icon Hash:4c9e97336b69cda2
                                      Entrypoint:0x4a64c6
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x66553534 [Tue May 28 01:36:52 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xa64740x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x22e0.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xa44cc0xa46002e366e6348caef1c493cf666a110675aFalse0.9555935123574144data7.9683017131333695IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0xa80000x22e00x24002ad73b0f778c5afb74828b4533f944e4False0.8470052083333334data7.446515066909842IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xac0000xc0x20006c45e8f7165e1ea7f5b2047a87c3316False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0xa81000x1c70PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9625
                                      RT_GROUP_ICON0xa9d800x14data1.05
                                      RT_VERSION0xa9da40x33cdata0.428743961352657
                                      RT_MANIFEST0xaa0f00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 28, 2024 09:11:23.368767977 CEST49708443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:23.368803024 CEST44349708104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:23.369085073 CEST49708443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:23.373814106 CEST49708443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:23.373835087 CEST44349708104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:23.867547989 CEST44349708104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:23.867708921 CEST49708443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:23.875999928 CEST49708443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:23.876022100 CEST44349708104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:23.876318932 CEST44349708104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:23.916049004 CEST49708443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:23.962816954 CEST49708443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:24.010505915 CEST44349708104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:24.138869047 CEST44349708104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:24.138941050 CEST44349708104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:24.139030933 CEST49708443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:24.146255970 CEST49708443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:24.789616108 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:24.794703960 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:24.794780016 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:25.467019081 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.470796108 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:25.475734949 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.629717112 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.630192995 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:25.635149002 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.789910078 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.790357113 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:25.797163963 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.950627089 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.950690985 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.950722933 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.950761080 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:25.950762987 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.950819016 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:25.950819969 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.950850010 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:25.951288939 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:26.019164085 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:26.024123907 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:26.178764105 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:26.183650970 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:26.188518047 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:26.350617886 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:26.351603031 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:26.356900930 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:26.513199091 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:26.514389038 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:26.520411968 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:26.677381039 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:26.677611113 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:26.682801008 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:26.796732903 CEST49712443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:26.796780109 CEST44349712104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:26.797811031 CEST49712443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:26.801879883 CEST49712443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:26.801896095 CEST44349712104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:26.838298082 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:26.838576078 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:26.843457937 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:27.028398037 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:27.028809071 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:27.033735991 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:27.187180996 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:27.187985897 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:27.188075066 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:27.188114882 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:27.188139915 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:27.193010092 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:27.193041086 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:27.193075895 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:27.193124056 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:27.278156996 CEST44349712104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:27.278228045 CEST49712443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:27.280189037 CEST49712443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:27.280195951 CEST44349712104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:27.280582905 CEST44349712104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:27.360124111 CEST49712443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:27.406500101 CEST44349712104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:27.501018047 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:11:27.525348902 CEST44349712104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:27.525413990 CEST44349712104.26.12.205192.168.2.5
                                      May 28, 2024 09:11:27.525476933 CEST49712443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:27.529330969 CEST49712443192.168.2.5104.26.12.205
                                      May 28, 2024 09:11:27.634835958 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:28.225913048 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:28.231357098 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:28.231472015 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:28.788465977 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:28.790505886 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:28.795411110 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:28.943707943 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:28.944607973 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:28.949639082 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.098071098 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.098475933 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:29.103363037 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.253359079 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.253391981 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.253444910 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:29.253509998 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.253536940 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.253555059 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.253570080 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.253591061 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:29.253638983 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:29.255259991 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:29.260092974 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.409118891 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.414453030 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:29.419431925 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.568451881 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.568836927 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:29.573925018 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.723423958 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.723716021 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:29.728575945 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.878819942 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:29.879097939 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:29.883990049 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.034487009 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.034768105 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:30.039809942 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.212047100 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.212328911 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:30.217519045 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.366729021 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.367307901 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:30.367388964 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:30.367417097 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:30.367417097 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:11:30.372462988 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.372503996 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.372523069 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.372534037 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.671519995 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:11:30.712973118 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:13:04.807194948 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:13:04.812160015 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:13:04.965713978 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:13:04.965869904 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:13:04.965969086 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:13:04.967575073 CEST49709587192.168.2.566.29.159.53
                                      May 28, 2024 09:13:04.973329067 CEST5874970966.29.159.53192.168.2.5
                                      May 28, 2024 09:13:08.244668007 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:13:08.249872923 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:13:08.398660898 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:13:08.398893118 CEST5874971366.29.159.53192.168.2.5
                                      May 28, 2024 09:13:08.398950100 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:13:08.399694920 CEST49713587192.168.2.566.29.159.53
                                      May 28, 2024 09:13:08.404541016 CEST5874971366.29.159.53192.168.2.5
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 28, 2024 09:11:23.348853111 CEST5289553192.168.2.51.1.1.1
                                      May 28, 2024 09:11:23.355957031 CEST53528951.1.1.1192.168.2.5
                                      May 28, 2024 09:11:24.779937029 CEST5460553192.168.2.51.1.1.1
                                      May 28, 2024 09:11:24.788892984 CEST53546051.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      May 28, 2024 09:11:23.348853111 CEST192.168.2.51.1.1.10xe2cfStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                      May 28, 2024 09:11:24.779937029 CEST192.168.2.51.1.1.10xbd02Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      May 28, 2024 09:11:23.355957031 CEST1.1.1.1192.168.2.50xe2cfNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                      May 28, 2024 09:11:23.355957031 CEST1.1.1.1192.168.2.50xe2cfNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                      May 28, 2024 09:11:23.355957031 CEST1.1.1.1192.168.2.50xe2cfNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                      May 28, 2024 09:11:24.788892984 CEST1.1.1.1192.168.2.50xbd02No error (0)smtp.privateemail.com66.29.159.53A (IP address)IN (0x0001)false
                                      • api.ipify.org
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.549708104.26.12.2054437228C:\Users\user\Desktop\Payment List.bat.exe
                                      TimestampBytes transferredDirectionData
                                      2024-05-28 07:11:23 UTC155OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                      Host: api.ipify.org
                                      Connection: Keep-Alive
                                      2024-05-28 07:11:24 UTC211INHTTP/1.1 200 OK
                                      Date: Tue, 28 May 2024 07:11:24 GMT
                                      Content-Type: text/plain
                                      Content-Length: 12
                                      Connection: close
                                      Vary: Origin
                                      CF-Cache-Status: DYNAMIC
                                      Server: cloudflare
                                      CF-RAY: 88ac6e2f18394361-EWR
                                      2024-05-28 07:11:24 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
                                      Data Ascii: 8.46.123.175


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.549712104.26.12.2054437600C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe
                                      TimestampBytes transferredDirectionData
                                      2024-05-28 07:11:27 UTC155OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                      Host: api.ipify.org
                                      Connection: Keep-Alive
                                      2024-05-28 07:11:27 UTC211INHTTP/1.1 200 OK
                                      Date: Tue, 28 May 2024 07:11:27 GMT
                                      Content-Type: text/plain
                                      Content-Length: 12
                                      Connection: close
                                      Vary: Origin
                                      CF-Cache-Status: DYNAMIC
                                      Server: cloudflare
                                      CF-RAY: 88ac6e445e627291-EWR
                                      2024-05-28 07:11:27 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
                                      Data Ascii: 8.46.123.175


                                      TimestampSource PortDest PortSource IPDest IPCommands
                                      May 28, 2024 09:11:25.467019081 CEST5874970966.29.159.53192.168.2.5220 PrivateEmail.com prod Mail Node
                                      May 28, 2024 09:11:25.470796108 CEST49709587192.168.2.566.29.159.53EHLO 841675
                                      May 28, 2024 09:11:25.629717112 CEST5874970966.29.159.53192.168.2.5250-mta-11.privateemail.com
                                      250-PIPELINING
                                      250-SIZE 81788928
                                      250-ETRN
                                      250-AUTH PLAIN LOGIN
                                      250-ENHANCEDSTATUSCODES
                                      250-8BITMIME
                                      250-CHUNKING
                                      250 STARTTLS
                                      May 28, 2024 09:11:25.630192995 CEST49709587192.168.2.566.29.159.53STARTTLS
                                      May 28, 2024 09:11:25.789910078 CEST5874970966.29.159.53192.168.2.5220 Ready to start TLS
                                      May 28, 2024 09:11:28.788465977 CEST5874971366.29.159.53192.168.2.5220 PrivateEmail.com prod Mail Node
                                      May 28, 2024 09:11:28.790505886 CEST49713587192.168.2.566.29.159.53EHLO 841675
                                      May 28, 2024 09:11:28.943707943 CEST5874971366.29.159.53192.168.2.5250-mta-11.privateemail.com
                                      250-PIPELINING
                                      250-SIZE 81788928
                                      250-ETRN
                                      250-AUTH PLAIN LOGIN
                                      250-ENHANCEDSTATUSCODES
                                      250-8BITMIME
                                      250-CHUNKING
                                      250 STARTTLS
                                      May 28, 2024 09:11:28.944607973 CEST49713587192.168.2.566.29.159.53STARTTLS
                                      May 28, 2024 09:11:29.098071098 CEST5874971366.29.159.53192.168.2.5220 Ready to start TLS

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:03:11:18
                                      Start date:28/05/2024
                                      Path:C:\Users\user\Desktop\Payment List.bat.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Payment List.bat.exe"
                                      Imagebase:0x660000
                                      File size:683'520 bytes
                                      MD5 hash:FED0E7606FDAE5961988A53E62C792B9
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2052289650.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:3
                                      Start time:03:11:20
                                      Start date:28/05/2024
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment List.bat.exe"
                                      Imagebase:0xe20000
                                      File size:433'152 bytes
                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:03:11:20
                                      Start date:28/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:03:11:21
                                      Start date:28/05/2024
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"
                                      Imagebase:0xe20000
                                      File size:433'152 bytes
                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:03:11:21
                                      Start date:28/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:03:11:21
                                      Start date:28/05/2024
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpC3DF.tmp"
                                      Imagebase:0xe00000
                                      File size:187'904 bytes
                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:03:11:21
                                      Start date:28/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:9
                                      Start time:03:11:22
                                      Start date:28/05/2024
                                      Path:C:\Users\user\Desktop\Payment List.bat.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Payment List.bat.exe"
                                      Imagebase:0x850000
                                      File size:683'520 bytes
                                      MD5 hash:FED0E7606FDAE5961988A53E62C792B9
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3237643875.0000000002D49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.3237643875.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3237643875.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Target ID:10
                                      Start time:03:11:22
                                      Start date:28/05/2024
                                      Path:C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe
                                      Imagebase:0xed0000
                                      File size:683'520 bytes
                                      MD5 hash:FED0E7606FDAE5961988A53E62C792B9
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2088998167.000000000449F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2088998167.000000000449F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 26%, ReversingLabs
                                      • Detection: 40%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:true

                                      Target ID:11
                                      Start time:03:11:23
                                      Start date:28/05/2024
                                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                      Imagebase:0x7ff6ef0c0000
                                      File size:496'640 bytes
                                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                      Has elevated privileges:true
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:12
                                      Start time:03:11:25
                                      Start date:28/05/2024
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qicqbuFUGCXO" /XML "C:\Users\user\AppData\Local\Temp\tmpD43A.tmp"
                                      Imagebase:0xe00000
                                      File size:187'904 bytes
                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:13
                                      Start time:03:11:25
                                      Start date:28/05/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:14
                                      Start time:03:11:25
                                      Start date:28/05/2024
                                      Path:C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"
                                      Imagebase:0x3e0000
                                      File size:683'520 bytes
                                      MD5 hash:FED0E7606FDAE5961988A53E62C792B9
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:15
                                      Start time:03:11:25
                                      Start date:28/05/2024
                                      Path:C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\qicqbuFUGCXO.exe"
                                      Imagebase:0x870000
                                      File size:683'520 bytes
                                      MD5 hash:FED0E7606FDAE5961988A53E62C792B9
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.3238159947.0000000002EF9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.3238159947.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.3238159947.0000000002ED1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:10.5%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:197
                                        Total number of Limit Nodes:12
                                        execution_graph 29189 7089028 29190 70891b3 29189->29190 29192 708904e 29189->29192 29192->29190 29193 7085a0c 29192->29193 29194 70892a8 PostMessageW 29193->29194 29195 7089314 29194->29195 29195->29192 29216 70850b9 29217 70850ca 29216->29217 29221 7087e58 29216->29221 29241 7087ec6 29216->29241 29262 7087e68 29216->29262 29222 7087e68 29221->29222 29226 7087ea6 29222->29226 29282 7088a29 29222->29282 29286 7088437 29222->29286 29291 7088cf6 29222->29291 29296 7088776 29222->29296 29301 7088393 29222->29301 29306 7088252 29222->29306 29311 708893d 29222->29311 29316 708865b 29222->29316 29321 708881a 29222->29321 29325 70885ba 29222->29325 29330 7088579 29222->29330 29335 7088499 29222->29335 29340 70888b9 29222->29340 29345 70883e6 29222->29345 29349 70882a4 29222->29349 29354 708850c 29222->29354 29358 70889cc 29222->29358 29226->29217 29242 7087e54 29241->29242 29243 7087ec9 29241->29243 29244 7088a29 2 API calls 29242->29244 29245 70889cc 2 API calls 29242->29245 29246 708850c 2 API calls 29242->29246 29247 7087ea6 29242->29247 29248 70882a4 2 API calls 29242->29248 29249 70883e6 2 API calls 29242->29249 29250 70888b9 2 API calls 29242->29250 29251 7088499 2 API calls 29242->29251 29252 7088579 2 API calls 29242->29252 29253 70885ba 2 API calls 29242->29253 29254 708881a 2 API calls 29242->29254 29255 708865b 2 API calls 29242->29255 29256 708893d 2 API calls 29242->29256 29257 7088252 2 API calls 29242->29257 29258 7088393 2 API calls 29242->29258 29259 7088776 2 API calls 29242->29259 29260 7088cf6 2 API calls 29242->29260 29261 7088437 2 API calls 29242->29261 29243->29217 29244->29247 29245->29247 29246->29247 29247->29217 29248->29247 29249->29247 29250->29247 29251->29247 29252->29247 29253->29247 29254->29247 29255->29247 29256->29247 29257->29247 29258->29247 29259->29247 29260->29247 29261->29247 29263 7087e82 29262->29263 29264 7087ea6 29263->29264 29265 7088a29 2 API calls 29263->29265 29266 70889cc 2 API calls 29263->29266 29267 708850c 2 API calls 29263->29267 29268 70882a4 2 API calls 29263->29268 29269 70883e6 2 API calls 29263->29269 29270 70888b9 2 API calls 29263->29270 29271 7088499 2 API calls 29263->29271 29272 7088579 2 API calls 29263->29272 29273 70885ba 2 API calls 29263->29273 29274 708881a 2 API calls 29263->29274 29275 708865b 2 API calls 29263->29275 29276 708893d 2 API calls 29263->29276 29277 7088252 2 API calls 29263->29277 29278 7088393 2 API calls 29263->29278 29279 7088776 2 API calls 29263->29279 29280 7088cf6 2 API calls 29263->29280 29281 7088437 2 API calls 29263->29281 29264->29217 29265->29264 29266->29264 29267->29264 29268->29264 29269->29264 29270->29264 29271->29264 29272->29264 29273->29264 29274->29264 29275->29264 29276->29264 29277->29264 29278->29264 29279->29264 29280->29264 29281->29264 29283 7088819 29282->29283 29283->29282 29362 7084338 29283->29362 29366 7084332 29283->29366 29287 708844c 29286->29287 29288 70887a9 29287->29288 29370 7083e48 29287->29370 29374 7083e50 29287->29374 29292 708839f 29291->29292 29293 70887dc 29292->29293 29378 70844ca 29292->29378 29382 70844d0 29292->29382 29293->29226 29297 708877c 29296->29297 29299 7083e48 ResumeThread 29297->29299 29300 7083e50 ResumeThread 29297->29300 29298 70887a9 29299->29298 29300->29298 29302 708839f 29301->29302 29303 70887dc 29302->29303 29304 70844ca WriteProcessMemory 29302->29304 29305 70844d0 WriteProcessMemory 29302->29305 29303->29226 29304->29302 29305->29302 29307 7088260 29306->29307 29386 7084b90 29307->29386 29390 7084b84 29307->29390 29312 7088958 29311->29312 29314 70844ca WriteProcessMemory 29312->29314 29315 70844d0 WriteProcessMemory 29312->29315 29313 7088979 29314->29313 29315->29313 29317 7088679 29316->29317 29318 70887a9 29317->29318 29319 7083e48 ResumeThread 29317->29319 29320 7083e50 ResumeThread 29317->29320 29318->29226 29318->29318 29319->29318 29320->29318 29323 7084338 Wow64SetThreadContext 29321->29323 29324 7084332 Wow64SetThreadContext 29321->29324 29322 7088819 29322->29321 29323->29322 29324->29322 29326 70885c0 29325->29326 29327 70885e3 29326->29327 29394 70849f8 29326->29394 29398 70849f1 29326->29398 29331 70885c1 29330->29331 29333 70849f8 ReadProcessMemory 29331->29333 29334 70849f1 ReadProcessMemory 29331->29334 29332 70885e3 29333->29332 29334->29332 29338 70844ca WriteProcessMemory 29335->29338 29339 70844d0 WriteProcessMemory 29335->29339 29336 70887dc 29336->29226 29337 708839f 29337->29335 29337->29336 29338->29337 29339->29337 29341 70888bf 29340->29341 29343 70844ca WriteProcessMemory 29341->29343 29344 70844d0 WriteProcessMemory 29341->29344 29342 7088979 29343->29342 29344->29342 29347 70844ca WriteProcessMemory 29345->29347 29348 70844d0 WriteProcessMemory 29345->29348 29346 7088414 29346->29226 29347->29346 29348->29346 29350 7088252 29349->29350 29352 7084b90 CreateProcessA 29350->29352 29353 7084b84 CreateProcessA 29350->29353 29351 7088374 29351->29226 29352->29351 29353->29351 29356 7084338 Wow64SetThreadContext 29354->29356 29357 7084332 Wow64SetThreadContext 29354->29357 29355 7088526 29355->29226 29356->29355 29357->29355 29359 7088b6f 29358->29359 29402 708440a 29359->29402 29406 7084410 29359->29406 29363 708437d Wow64SetThreadContext 29362->29363 29365 70843c5 29363->29365 29365->29283 29367 7084338 Wow64SetThreadContext 29366->29367 29369 70843c5 29367->29369 29369->29283 29371 7083e50 ResumeThread 29370->29371 29373 7083ec1 29371->29373 29373->29288 29375 7083e90 ResumeThread 29374->29375 29377 7083ec1 29375->29377 29377->29288 29379 70844d0 WriteProcessMemory 29378->29379 29381 708456f 29379->29381 29381->29292 29383 7084518 WriteProcessMemory 29382->29383 29385 708456f 29383->29385 29385->29292 29387 7084c19 CreateProcessA 29386->29387 29389 7084ddb 29387->29389 29389->29389 29391 7084b90 CreateProcessA 29390->29391 29393 7084ddb 29391->29393 29393->29393 29395 7084a43 ReadProcessMemory 29394->29395 29397 7084a87 29395->29397 29397->29327 29399 70849f8 ReadProcessMemory 29398->29399 29401 7084a87 29399->29401 29401->29327 29403 7084410 VirtualAllocEx 29402->29403 29405 708448d 29403->29405 29405->29359 29407 7084450 VirtualAllocEx 29406->29407 29409 708448d 29407->29409 29409->29359 29177 286d780 29178 286d7c6 GetCurrentProcess 29177->29178 29180 286d811 29178->29180 29181 286d818 GetCurrentThread 29178->29181 29180->29181 29182 286d855 GetCurrentProcess 29181->29182 29183 286d84e 29181->29183 29184 286d88b GetCurrentThreadId 29182->29184 29183->29182 29186 286d8e4 29184->29186 29410 286b3f0 29411 286b3ff 29410->29411 29413 286b4d9 29410->29413 29414 286b4f9 29413->29414 29415 286b51c 29413->29415 29414->29415 29421 286b780 29414->29421 29425 286b771 29414->29425 29415->29411 29416 286b514 29416->29415 29417 286b720 GetModuleHandleW 29416->29417 29418 286b74d 29417->29418 29418->29411 29422 286b794 29421->29422 29423 286b7b9 29422->29423 29429 286b208 29422->29429 29423->29416 29426 286b794 29425->29426 29427 286b7b9 29426->29427 29428 286b208 LoadLibraryExW 29426->29428 29427->29416 29428->29427 29430 286b960 LoadLibraryExW 29429->29430 29432 286b9d9 29430->29432 29432->29423 29187 286d9c8 DuplicateHandle 29188 286da5e 29187->29188 29196 2864668 29197 2864672 29196->29197 29199 2864758 29196->29199 29200 286477d 29199->29200 29204 2864858 29200->29204 29208 2864868 29200->29208 29205 286488f 29204->29205 29206 286496c 29205->29206 29212 28644b0 29205->29212 29206->29206 29210 286488f 29208->29210 29209 286496c 29209->29209 29210->29209 29211 28644b0 CreateActCtxA 29210->29211 29211->29209 29213 28658f8 CreateActCtxA 29212->29213 29215 28659bb 29213->29215
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR]q$LR]q$LR]q$LR]q$$]q$$]q
                                        • API String ID: 0-2875722158
                                        • Opcode ID: 13c3a743a141ecbd7ad54ca5de54e77549ff8cda9e8bc768f978408cdeb417eb
                                        • Instruction ID: 4033841ef85f80ee64d722991101f68394cc80687c84a74f6b00dedd155e4b5a
                                        • Opcode Fuzzy Hash: 13c3a743a141ecbd7ad54ca5de54e77549ff8cda9e8bc768f978408cdeb417eb
                                        • Instruction Fuzzy Hash: D1F1E5B1A08179CFC715AB6CC8507ACBFB1AF45316F4881BAE452EB692D374C941CBE1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dbbc5efc3afd7c6d48cca0deffccf6846616e5f026ded4eb7ac16f8ca70b7765
                                        • Instruction ID: 5f5286b3dea1367b7e2fc06a3255af689e3203c869fff87c5aa3169c83951413
                                        • Opcode Fuzzy Hash: dbbc5efc3afd7c6d48cca0deffccf6846616e5f026ded4eb7ac16f8ca70b7765
                                        • Instruction Fuzzy Hash: F9713475908229CFC710CFADD8417AABBF1FF12306F1581AAD16ACB692D3349941CB99
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b610e2ccb9ab5215e8fe4f2a3738a7912a7f4c1c5a8300a1479d99d08cc22138
                                        • Instruction ID: 23ad6ed34fdc0ca85329d734cf84b0d41d47246e75f1bfb2c5da9b077723ec02
                                        • Opcode Fuzzy Hash: b610e2ccb9ab5215e8fe4f2a3738a7912a7f4c1c5a8300a1479d99d08cc22138
                                        • Instruction Fuzzy Hash: BF510574E05228DFDB14CF6AC8806AEFBF6BF8A301F54D4A9D409A7212D7345985CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 294 8832aeb-8832af4 295 8832af6 294->295 296 8832a8f-8832a91 294->296 298 8832afc-8832aff 295->298 297 8832a99-8832a9b 296->297 441 8832a93 call 8832fb7 296->441 442 8832a93 call 8832f9e 296->442 299 8832ab3 297->299 300 8832a9d-8832aa3 297->300 301 8832b01 298->301 302 8832b08-8832b1a 298->302 303 8832aa7-8832aa9 300->303 304 8832aa5 300->304 301->302 305 8832e40-8832e46 301->305 306 8832e85-8832e8b 301->306 307 8832dab-8832dff call 8831104 301->307 308 8832ba9-8832be3 301->308 309 8832d2e-8832d41 301->309 310 8832ccd-8832cf3 301->310 311 8832c71-8832c84 301->311 312 8832e10-8832e1f 301->312 313 8832c57-8832c6e 301->313 314 8832d94-8832d98 301->314 315 8832d7b-8832d85 301->315 316 8832b39-8832b4c 301->316 317 8832cf8-8832d09 301->317 318 8832c1d-8832c21 301->318 319 8832b1c-8832b20 301->319 302->298 303->299 304->299 325 8832e48-8832e4a 305->325 326 8832e4c-8832e58 305->326 331 8832e91-8832e9d 306->331 332 8832e8d-8832e8f 306->332 377 8832e04-8832e07 307->377 393 8832be5-8832beb 308->393 394 8832bfb-8832c08 308->394 328 883336f-8833447 309->328 351 8832d47-8832d62 309->351 310->298 360 8832c86-8832c8f 311->360 361 8832ca5 311->361 350 8832e22-8832e2c 312->350 313->311 329 8832da4-8832da9 314->329 330 8832d9a 314->330 327 8832d8b-8832d8f 315->327 315->328 356 8832b68 316->356 357 8832b4e-8832b54 316->357 317->328 333 8832d0f-8832d1d 317->333 321 8832c23-8832c2c 318->321 322 8832c42 318->322 323 8833363-883336c 319->323 324 8832b26-8832b2d 319->324 336 8832c33-8832c36 321->336 337 8832c2e-8832c31 321->337 340 8832c45-8832c47 322->340 324->328 338 8832b33-8832b37 324->338 339 8832e5a-8832e7d 325->339 326->339 327->298 343 8832d9f 329->343 330->343 344 8832e9f-8832ee0 331->344 332->344 333->328 349 8832d23-8832d29 333->349 352 8832c40 336->352 337->352 338->298 339->306 354 8833254-883326a 340->354 355 8832c4d-8832c52 340->355 343->298 419 8832ee2 344->419 420 8832eec-8832ef1 344->420 349->298 362 8832e32-8832e3e 350->362 363 8832f08 350->363 351->328 364 8832d68-8832d6e 351->364 352->340 383 8833280 354->383 384 883326c-883327e 354->384 355->298 369 8832b6a-8832ba4 call 88323e8 356->369 365 8832b56-8832b58 357->365 366 8832b5a-8832b5c 357->366 371 8832c91-8832c94 360->371 372 8832c96-8832c99 360->372 374 8832ca8-8832cc8 361->374 362->377 391 8832f0d 363->391 378 8832d73-8832d76 364->378 379 8832d70 364->379 380 8832b66 365->380 366->380 369->298 382 8832ca3 371->382 372->382 374->298 377->312 390 8832e09 377->390 378->298 379->378 380->369 382->374 392 8833283-8833290 383->392 384->392 390->305 390->306 390->312 390->350 395 8832ef3-8832f06 390->395 396 8832f1b-8832f1f 390->396 397 8832f6b-8832f6f 390->397 398 8832f9b 390->398 399 8833118-8833147 390->399 400 8832f0f-8832f12 391->400 423 8833292-8833298 392->423 424 88332a8-88332b2 392->424 409 8832bef-8832bf1 393->409 410 8832bed 393->410 394->328 411 8832c0e-8832c18 394->411 395->391 402 8832f21-8832f2a 396->402 403 8832f40 396->403 404 8832f92 397->404 405 8832f71-8832f7a 397->405 398->399 400->396 401 8832f14 400->401 401->396 401->397 401->398 401->399 412 8832f31-8832f34 402->412 413 8832f2c-8832f2f 402->413 415 8832f43-8832f45 403->415 418 8832f95 404->418 416 8832f81-8832f8e 405->416 417 8832f7c-8832f7f 405->417 409->394 410->394 411->298 422 8832f3e 412->422 413->422 425 8832f47 415->425 426 8832f4e-8832f58 415->426 427 8832f90 416->427 417->427 418->398 429 8832ee7 419->429 420->429 422->415 430 883329a 423->430 431 883329c-883329e 423->431 424->328 433 88332b8-88332c1 424->433 432 8832f4c 425->432 426->328 434 8832f5e-8832f69 426->434 427->418 429->377 430->424 431->424 432->400 434->432 441->297 442->297
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fbq$ fbq$ fbq$ fbq$ fbq$ fbq$Te]q$XX]q$XX]q$XX]q$XX]q$XX]q$XX]q$$]q
                                        • API String ID: 0-4267258224
                                        • Opcode ID: 9a7c6f71610d28a38c19d52d20e2c77597a465ab128876acaf5c29536137e468
                                        • Instruction ID: 59a5958f4677bf24d4827dc9f04a16bd8c82ee3baf8ac3e1397214e280d41afa
                                        • Opcode Fuzzy Hash: 9a7c6f71610d28a38c19d52d20e2c77597a465ab128876acaf5c29536137e468
                                        • Instruction Fuzzy Hash: 0002E330A04268CFDB25CFA8C5957ADBBF2FF45302F508569D416EF2A6CB748942CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 443 8832f9e 444 8832fa3-8832fa6 443->444 445 8832fb8-8832fbc 444->445 446 8832fa8 444->446 458 8832fdf 445->458 459 8832fbe-8832fc7 445->459 446->445 447 8833363-883336c 446->447 448 88331e2-88331ea 446->448 449 8833331-8833335 446->449 450 8833091-88330a4 446->450 451 88332c6-88332d9 446->451 452 8833254-883326a 446->452 453 883323b-8833242 446->453 454 8833118-883313c 446->454 455 88331ef-8833202 446->455 456 883313f-8833147 446->456 457 883314c-883315f 446->457 448->444 463 8833337-8833340 449->463 464 8833356 449->464 479 88330a6-88330b8 450->479 480 88330ba 450->480 481 88332db-88332e4 451->481 482 88332fa 451->482 483 8833280 452->483 484 883326c-883327e 452->484 465 8833248-883324f 453->465 466 883336f-8833447 453->466 454->456 488 8833221-8833228 455->488 489 8833204-883320b 455->489 457->466 492 8833165-883316d 457->492 462 8832fe2-8832fe4 458->462 460 8832fc9-8832fcc 459->460 461 8832fce-8832fdb 459->461 470 8832fdd 460->470 461->470 471 8832fe6-8832fec 462->471 472 8832ffc-8833019 462->472 474 8833342-8833345 463->474 475 8833347-883334a 463->475 476 8833359-8833360 464->476 465->444 465->452 470->462 486 8832ff0-8832ffa 471->486 487 8832fee 471->487 509 883301b-8833024 472->509 510 883303c 472->510 491 8833354 474->491 475->491 476->447 493 88330bd-88330c1 479->493 480->493 494 88332e6-88332e9 481->494 495 88332eb-88332ee 481->495 497 88332fd-883330b 482->497 496 8833283-8833290 483->496 484->496 486->472 487->472 488->466 500 883322e-8833239 488->500 489->466 498 8833211-8833217 489->498 491->476 501 8833190 492->501 502 883316f-8833178 492->502 505 88330c3-88330cc 493->505 506 88330e2 493->506 504 88332f8 494->504 495->504 527 8833292-8833298 496->527 528 88332a8-88332b2 496->528 529 8833317-8833321 497->529 530 883330d 497->530 508 883321c 498->508 500->508 513 8833193-8833195 501->513 511 883317a-883317d 502->511 512 883317f-883318c 502->512 504->497 516 88330d3-88330d6 505->516 517 88330ce-88330d1 505->517 520 88330e5-8833106 506->520 508->444 521 8833026-8833029 509->521 522 883302b-8833038 509->522 523 883303f-8833066 510->523 524 883318e 511->524 512->524 514 88331a7 513->514 515 8833197-88331a5 513->515 525 88331a9-88331ab 514->525 515->525 526 88330e0 516->526 517->526 520->466 545 883310c-8833113 520->545 531 883303a 521->531 522->531 547 883306e-883307b 523->547 524->513 533 88331b9-88331cc 525->533 534 88331ad-88331b3 525->534 526->520 535 883329a 527->535 536 883329c-883329e 527->536 528->466 537 88332b8-88332c1 528->537 529->466 540 8833323-883332f 529->540 538 8833312 530->538 531->523 533->466 548 88331d2-88331dd 533->548 543 88331b7 534->543 544 88331b5 534->544 535->528 536->528 538->444 540->538 543->533 544->533 545->444 545->454 547->466 549 8833081-883308c 547->549 548->444 549->444
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fbq$ fbq$ fbq$Te]q$Te]q$XX]q$XX]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-140804313
                                        • Opcode ID: 9a235cdd9b3d648acb20e1b2923115f3669f59fddc45eea498538688a3557261
                                        • Instruction ID: 831db2709fd83dd41b2c39f4ee2da12b071ced33c3221990ffe531206054a920
                                        • Opcode Fuzzy Hash: 9a235cdd9b3d648acb20e1b2923115f3669f59fddc45eea498538688a3557261
                                        • Instruction Fuzzy Hash: 16D1AF30A04268CFCB15CFA8E595AADBBB1FF41302F158699E411EF2A9C7709C41CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 550 883156c-88315b0 705 88315b5 call 8831c88 550->705 706 88315b5 call 8831c98 550->706 551 88315bb 707 88315bb call 8831ec0 551->707 708 88315bb call 8831c88 551->708 709 88315bb call 8831c98 551->709 552 88315c1-883162b call 8830ff4 562 883162d-8831630 552->562 563 8831632 562->563 564 8831639-883163e 562->564 563->564 565 88318e3 563->565 566 8831842 563->566 567 8831640-8831688 563->567 568 88316c7-88316cd 563->568 569 883174a-88317ae 563->569 570 88318ca-88318d4 563->570 571 8831829-8831833 563->571 572 88317b3-88317c6 563->572 573 88318b5-88318c2 563->573 574 8831714-8831719 563->574 575 8831814-8831821 563->575 576 883169b-88316a5 563->576 577 883187b-883187f 563->577 578 883171e-8831728 563->578 579 88317de-88317ed 563->579 564->562 582 88318f0-88318f3 565->582 590 8831845-883186a 566->590 606 88317c8 567->606 661 883168e-8831699 567->661 586 88316d3-88316df 568->586 587 88316cf-88316d1 568->587 569->562 580 88318e6 570->580 581 88318d6-88318e1 570->581 571->590 591 8831835-8831840 571->591 583 88317cd 572->583 573->570 574->562 575->571 584 88316b1-88316b8 576->584 585 88316a7 576->585 592 8831881-883188a 577->592 593 88318a0 577->593 588 8831734-883173b 578->588 589 883172a 578->589 627 8831802-8831809 579->627 628 88317ef-88317f6 579->628 610 88318eb 580->610 600 883186f-8831872 581->600 603 8831905-8831909 582->603 604 88318f5 582->604 605 88317d2-88317d5 583->605 584->606 607 88316be-88316c5 584->607 602 88316ac 585->602 608 88316e1-883170f 586->608 587->608 588->606 613 8831741-8831748 588->613 612 883172f 589->612 590->600 591->605 594 8831891-8831894 592->594 595 883188c-883188f 592->595 601 88318a3-88318a5 593->601 614 883189e 594->614 595->614 600->577 630 8831874 600->630 615 88318a7 601->615 616 88318ae-88318b3 601->616 602->562 624 883190b-8831914 603->624 625 883192c 603->625 604->603 617 8831bb0-8831bd1 604->617 618 8831ad0-8831ade 604->618 619 8831a16-8831a1a 604->619 620 8831bea-8831bf1 604->620 621 8831b1d-8831b94 604->621 622 88318fc-8831903 604->622 605->579 623 88317d7 605->623 606->583 607->602 608->562 610->582 612->562 613->612 614->601 632 88318ac 615->632 616->573 616->632 711 8831bd3 call 883b660 617->711 712 8831bd3 call 883b598 617->712 657 8831ae0-8831ae6 618->657 658 8831af6-8831afd 618->658 634 8831a3d 619->634 635 8831a1c-8831a25 619->635 700 8831b9a-8831bab 621->700 622->610 623->565 623->566 623->570 623->571 623->573 623->575 623->577 623->579 623->603 623->617 636 8831916-8831919 624->636 637 883191b-8831928 624->637 641 883192f-883194b 625->641 627->590 640 883180b-8831812 627->640 628->590 638 88317f8-88317fb 628->638 630->565 630->570 630->573 630->577 630->603 630->617 630->618 630->619 630->620 630->621 632->600 646 8831a40-8831aab 634->646 644 8831a27-8831a2a 635->644 645 8831a2c-8831a39 635->645 647 883192a 636->647 637->647 648 8831800 638->648 640->648 665 883196e 641->665 666 883194d-8831956 641->666 653 8831a3b 644->653 645->653 692 8831ac3-8831acb 646->692 693 8831aad-8831ab3 646->693 647->641 648->605 653->646 659 8831aea-8831aec 657->659 660 8831ae8 657->660 713 8831b02 call 8839701 658->713 714 8831b02 call 8839710 658->714 715 8831b02 call 8838a24 658->715 716 8831b02 call 8839b58 658->716 659->658 660->658 661->562 668 8831971-88319d4 call 8836fa8 665->668 671 8831958-883195b 666->671 672 883195d-883196a 666->672 697 88319da-88319dc 668->697 669 8831b08 677 8831b10-8831b18 669->677 675 883196c 671->675 672->675 675->668 677->582 681 8831bd9 685 8831be0-8831be5 681->685 685->582 692->582 695 8831ab7-8831ab9 693->695 696 8831ab5 693->696 695->692 696->692 698 88319f4-8831a01 697->698 699 88319de-88319e4 697->699 698->580 703 8831a07-8831a11 698->703 701 88319e6 699->701 702 88319e8-88319ea 699->702 700->582 701->698 702->698 703->582 705->551 706->551 707->552 708->552 709->552 711->681 712->681 713->669 714->669 715->669 716->669
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te]q$Te]q$Te]q$Te]q$Te]q$Te]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-3613213995
                                        • Opcode ID: ea7faa0c3661f8577ab036b93145dd78ac359ef09a861f09dcd61f41bd01d235
                                        • Instruction ID: 70c801fea9c3f83b79ede92207cbfb182f297cac654ca87812952b07ff493113
                                        • Opcode Fuzzy Hash: ea7faa0c3661f8577ab036b93145dd78ac359ef09a861f09dcd61f41bd01d235
                                        • Instruction Fuzzy Hash: 0BF1B378F40218DFDB149FA8D859BBE76F2AF84B02F548419F402EB385DA749C42CB95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 717 8832fb7 718 8832fb8-8832fbc 717->718 719 8832fdf 718->719 720 8832fbe-8832fc7 718->720 723 8832fe2-8832fe4 719->723 721 8832fc9-8832fcc 720->721 722 8832fce-8832fdb 720->722 724 8832fdd 721->724 722->724 725 8832fe6-8832fec 723->725 726 8832ffc-8833019 723->726 724->723 728 8832ff0-8832ffa 725->728 729 8832fee 725->729 731 883301b-8833024 726->731 732 883303c 726->732 728->726 729->726 734 8833026-8833029 731->734 735 883302b-8833038 731->735 736 883303f-8833066 732->736 737 883303a 734->737 735->737 740 883306e-883307b 736->740 737->736 741 8833081-883308c 740->741 742 883336f-8833447 740->742 743 8832fa3-8832fa6 741->743 743->718 744 8832fa8 743->744 744->718 746 8833363-883336c 744->746 747 88331e2-88331ea 744->747 748 8833331-8833335 744->748 749 8833091-88330a4 744->749 750 88332c6-88332d9 744->750 751 8833254-883326a 744->751 752 883323b-8833242 744->752 753 8833118-883313c 744->753 754 88331ef-8833202 744->754 755 883313f-8833147 744->755 756 883314c-883315f 744->756 747->743 757 8833337-8833340 748->757 758 8833356 748->758 770 88330a6-88330b8 749->770 771 88330ba 749->771 772 88332db-88332e4 750->772 773 88332fa 750->773 774 8833280 751->774 775 883326c-883327e 751->775 752->742 759 8833248-883324f 752->759 753->755 777 8833221-8833228 754->777 778 8833204-883320b 754->778 756->742 776 8833165-883316d 756->776 760 8833342-8833345 757->760 761 8833347-883334a 757->761 765 8833359-8833360 758->765 759->743 759->751 769 8833354 760->769 761->769 765->746 769->765 780 88330bd-88330c1 770->780 771->780 781 88332e6-88332e9 772->781 782 88332eb-88332ee 772->782 784 88332fd-883330b 773->784 783 8833283-8833290 774->783 775->783 785 8833190 776->785 786 883316f-8833178 776->786 777->742 779 883322e-8833239 777->779 778->742 788 8833211-8833217 778->788 789 883321c 779->789 791 88330c3-88330cc 780->791 792 88330e2 780->792 790 88332f8 781->790 782->790 806 8833292-8833298 783->806 807 88332a8-88332b2 783->807 808 8833317-8833321 784->808 809 883330d 784->809 795 8833193-8833195 785->795 793 883317a-883317d 786->793 794 883317f-883318c 786->794 788->789 789->743 790->784 798 88330d3-88330d6 791->798 799 88330ce-88330d1 791->799 803 88330e5-8833106 792->803 802 883318e 793->802 794->802 796 88331a7 795->796 797 8833197-88331a5 795->797 804 88331a9-88331ab 796->804 797->804 805 88330e0 798->805 799->805 802->795 803->742 821 883310c-8833113 803->821 811 88331b9-88331cc 804->811 812 88331ad-88331b3 804->812 805->803 813 883329a 806->813 814 883329c-883329e 806->814 807->742 815 88332b8-88332c1 807->815 808->742 818 8833323-883332f 808->818 816 8833312 809->816 811->742 823 88331d2-88331dd 811->823 819 88331b7 812->819 820 88331b5 812->820 813->807 814->807 816->743 818->816 819->811 820->811 821->743 821->753 823->743
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fbq$ fbq$Te]q$XX]q$XX]q$XX]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-4039791027
                                        • Opcode ID: 4a89375be2c3595828e035167012f88703b5b05ead5ed9896ecd28bfa8a3f94a
                                        • Instruction ID: 341203fcdd5ac92b0742e34f0720d8a44976be563435d29913d6325760179c3e
                                        • Opcode Fuzzy Hash: 4a89375be2c3595828e035167012f88703b5b05ead5ed9896ecd28bfa8a3f94a
                                        • Instruction Fuzzy Hash: 2CB15B31E04228DFDB25CF98E984AACB7B1FF40717F14856AE416EB799C7749842CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 991 286d780-286d80f GetCurrentProcess 995 286d811-286d817 991->995 996 286d818-286d84c GetCurrentThread 991->996 995->996 997 286d855-286d889 GetCurrentProcess 996->997 998 286d84e-286d854 996->998 1000 286d892-286d8aa 997->1000 1001 286d88b-286d891 997->1001 998->997 1004 286d8b3-286d8e2 GetCurrentThreadId 1000->1004 1001->1000 1005 286d8e4-286d8ea 1004->1005 1006 286d8eb-286d94d 1004->1006 1005->1006
                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0286D7FE
                                        • GetCurrentThread.KERNEL32 ref: 0286D83B
                                        • GetCurrentProcess.KERNEL32 ref: 0286D878
                                        • GetCurrentThreadId.KERNEL32 ref: 0286D8D1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2051489930.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2860000_Payment List.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 1552dda0a70673865a875c32350c622cb2c7b2e086ddd50a6e57b894227f3690
                                        • Instruction ID: e99cbe587a134fe8d7c85da22e183581a90d7ad46f69702a5e3787408f0e5540
                                        • Opcode Fuzzy Hash: 1552dda0a70673865a875c32350c622cb2c7b2e086ddd50a6e57b894227f3690
                                        • Instruction Fuzzy Hash: 825167B4A003098FDB14DFAAD548BAEBBF5FF88304F208459E119A7360D778A944CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1012 8831c98-8831cbb 1013 8831cc0-8831cc3 1012->1013 1014 8831cc5 1013->1014 1015 8831ccc-8831cd8 1013->1015 1014->1015 1016 8831d52-8831d57 1014->1016 1017 8831d64-8831d6d 1014->1017 1018 8831dab-8831db2 1014->1018 1019 8831cea-8831cf7 1014->1019 1020 8831d79-8831d80 1014->1020 1021 8831d6f-8831d74 1014->1021 1022 8831d5c 1014->1022 1023 8831db5-8831e09 1015->1023 1024 8831cde-8831ce8 1015->1024 1016->1013 1017->1021 1019->1023 1027 8831cfd-8831d0d 1019->1027 1025 8831d82-8831d86 1020->1025 1026 8831d87-8831d89 1020->1026 1021->1013 1022->1017 1032 8831e2b-8831e5b 1023->1032 1024->1013 1025->1026 1028 8831da4-8831da9 1026->1028 1029 8831d8b-8831d92 1026->1029 1027->1023 1030 8831d13-8831d26 1027->1030 1028->1018 1035 8831d9f 1028->1035 1029->1023 1033 8831d94-8831d9a 1029->1033 1030->1023 1034 8831d2c-8831d3f 1030->1034 1041 8831e5c-8831e68 1032->1041 1033->1035 1036 8831d41 1034->1036 1037 8831d4b-8831d50 1034->1037 1035->1013 1038 8831d46 1036->1038 1037->1016 1037->1038 1038->1013 1043 8831e6a-8831e71 1041->1043 1044 8831e73-8831e7e 1043->1044 1045 8831e9d-8831ec8 1043->1045 1046 8831e0b-8831e0e 1044->1046 1045->1041 1051 8831eca-8831eee 1045->1051 1047 8831e10 1046->1047 1048 8831e17-8831e29 1046->1048 1047->1032 1047->1043 1047->1048 1050 8831e80-8831e9c 1047->1050 1048->1046 1053 8831f10-8831f1f 1051->1053 1055 8831f21-8831f25 1053->1055 1056 8831f34-8831f39 1053->1056 1058 8832016-883201e 1055->1058 1059 8831f2b-8831f2f 1055->1059 1057 8831f32 1056->1057 1060 8831ef0-8831ef3 1057->1060 1059->1057 1062 8831ef5 1060->1062 1063 8831efc-8831f0e 1060->1063 1062->1053 1062->1063 1065 8831f93-8831f95 1062->1065 1066 8831fd0-8831fe9 1062->1066 1067 8831f3b-8831f7d 1062->1067 1068 8831fc8-8831fcd 1062->1068 1063->1060 1070 8831fb1 1065->1070 1071 8831f97-8831f9d 1065->1071 1066->1058 1077 8831feb-8831ff6 1066->1077 1067->1058 1085 8831f83-8831f8e 1067->1085 1068->1066 1072 8831fb3-8831fc3 1070->1072 1075 8831fa3-8831fa5 1071->1075 1076 8831f9f-8831fa1 1071->1076 1072->1060 1078 8831faf 1075->1078 1076->1078 1077->1058 1081 8831ff8-8832008 1077->1081 1078->1072 1081->1058 1082 883200a-8832015 1081->1082 1085->1060
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 8aq$8aq$8aq
                                        • API String ID: 0-3448709602
                                        • Opcode ID: 5304a205714e364d5fa82c870d7b0cb9c2a7ec47316cff8d3519ec9928cb51a4
                                        • Instruction ID: a88ee0c9f6d503a0f739e7fd70effc1d4575e7d3319f08f50ceeb8c1e8803455
                                        • Opcode Fuzzy Hash: 5304a205714e364d5fa82c870d7b0cb9c2a7ec47316cff8d3519ec9928cb51a4
                                        • Instruction Fuzzy Hash: A8A13538A09265CFC7158BACD8057AABBA2FF46712F04857BF016CB692C735D801CBD2

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1108 883184c-883186a 1112 883186f-8831872 1108->1112 1113 8831874 1112->1113 1114 883187b-883187f 1112->1114 1113->1114 1115 88318e3 1113->1115 1116 8831bb0-8831bd1 1113->1116 1117 8831ad0-8831ade 1113->1117 1118 8831a16-8831a1a 1113->1118 1119 88318b5-88318c2 1113->1119 1120 8831905-8831909 1113->1120 1121 88318ca-88318d4 1113->1121 1122 8831bea-8831bf1 1113->1122 1123 8831b1d-8831b94 1113->1123 1124 8831881-883188a 1114->1124 1125 88318a0 1114->1125 1135 88318f0-88318f3 1115->1135 1206 8831bd3 call 883b660 1116->1206 1207 8831bd3 call 883b598 1116->1207 1155 8831ae0-8831ae6 1117->1155 1156 8831af6-8831afd 1117->1156 1132 8831a3d 1118->1132 1133 8831a1c-8831a25 1118->1133 1119->1121 1128 883190b-8831914 1120->1128 1129 883192c 1120->1129 1130 88318e6 1121->1130 1131 88318d6-88318e1 1121->1131 1195 8831b9a-8831bab 1123->1195 1126 8831891-8831894 1124->1126 1127 883188c-883188f 1124->1127 1134 88318a3-88318a5 1125->1134 1136 883189e 1126->1136 1127->1136 1145 8831916-8831919 1128->1145 1146 883191b-8831928 1128->1146 1148 883192f-883194b 1129->1148 1147 88318eb 1130->1147 1131->1112 1144 8831a40-8831aab 1132->1144 1141 8831a27-8831a2a 1133->1141 1142 8831a2c-8831a39 1133->1142 1137 88318a7 1134->1137 1138 88318ae-88318b3 1134->1138 1135->1120 1143 88318f5 1135->1143 1136->1134 1151 88318ac 1137->1151 1138->1119 1138->1151 1152 8831a3b 1141->1152 1142->1152 1143->1116 1143->1117 1143->1118 1143->1120 1143->1122 1143->1123 1153 88318fc-8831903 1143->1153 1188 8831ac3-8831acb 1144->1188 1189 8831aad-8831ab3 1144->1189 1154 883192a 1145->1154 1146->1154 1147->1135 1166 883196e 1148->1166 1167 883194d-8831956 1148->1167 1151->1112 1152->1144 1153->1147 1154->1148 1157 8831aea-8831aec 1155->1157 1158 8831ae8 1155->1158 1202 8831b02 call 8839701 1156->1202 1203 8831b02 call 8839710 1156->1203 1204 8831b02 call 8838a24 1156->1204 1205 8831b02 call 8839b58 1156->1205 1157->1156 1158->1156 1165 8831b08 1174 8831b10-8831b18 1165->1174 1168 8831971-88319d4 call 8836fa8 1166->1168 1171 8831958-883195b 1167->1171 1172 883195d-883196a 1167->1172 1194 88319da-88319dc 1168->1194 1175 883196c 1171->1175 1172->1175 1174->1135 1175->1168 1176 8831bd9 1181 8831be0-8831be5 1176->1181 1181->1135 1188->1135 1192 8831ab7-8831ab9 1189->1192 1193 8831ab5 1189->1193 1192->1188 1193->1188 1196 88319f4-8831a01 1194->1196 1197 88319de-88319e4 1194->1197 1195->1135 1196->1130 1200 8831a07-8831a11 1196->1200 1198 88319e6 1197->1198 1199 88319e8-88319ea 1197->1199 1198->1196 1199->1196 1200->1135 1202->1165 1203->1165 1204->1165 1205->1165 1206->1176 1207->1176
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q
                                        • API String ID: 0-127220927
                                        • Opcode ID: 561abe7aa18769fa2ec56d806a35a2bd1cc67e67214eaf2d0166f4865d1f13b6
                                        • Instruction ID: f4cf3b6ff7b2b200593b9f7f5b3309a059a70c20c20af0d69cc14de8b292ad36
                                        • Opcode Fuzzy Hash: 561abe7aa18769fa2ec56d806a35a2bd1cc67e67214eaf2d0166f4865d1f13b6
                                        • Instruction Fuzzy Hash: 44819438B40228DFDB248B69D959BBD76B2FB84B12F148429F402EB7C4CB758C41CB94

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1209 88318fc-8831903 1210 88318eb 1209->1210 1211 88318f0-88318f3 1210->1211 1212 8831905-8831909 1211->1212 1213 88318f5 1211->1213 1219 883190b-8831914 1212->1219 1220 883192c 1212->1220 1213->1209 1213->1212 1214 8831bb0-8831bc7 1213->1214 1215 8831ad0-8831ad3 1213->1215 1216 8831a16-8831a1a 1213->1216 1217 8831bea-8831bf1 1213->1217 1218 8831b1d-8831b7c 1213->1218 1253 8831bd1 1214->1253 1232 8831adc-8831ade 1215->1232 1223 8831a3d 1216->1223 1224 8831a1c-8831a25 1216->1224 1270 8831b86-8831b94 1218->1270 1221 8831916-8831919 1219->1221 1222 883191b-8831928 1219->1222 1225 883192f-8831939 1220->1225 1227 883192a 1221->1227 1222->1227 1226 8831a40-8831aab 1223->1226 1230 8831a27-8831a2a 1224->1230 1231 8831a2c-8831a39 1224->1231 1233 8831944-883194b 1225->1233 1268 8831ac3-8831acb 1226->1268 1269 8831aad-8831ab3 1226->1269 1227->1225 1235 8831a3b 1230->1235 1231->1235 1236 8831ae0-8831ae6 1232->1236 1237 8831af6-8831afd 1232->1237 1241 883196e 1233->1241 1242 883194d-8831956 1233->1242 1235->1226 1239 8831aea-8831aec 1236->1239 1240 8831ae8 1236->1240 1282 8831b02 call 8839701 1237->1282 1283 8831b02 call 8839710 1237->1283 1284 8831b02 call 8838a24 1237->1284 1285 8831b02 call 8839b58 1237->1285 1239->1237 1240->1237 1246 8831971-88319b8 1241->1246 1248 8831958-883195b 1242->1248 1249 883195d-883196a 1242->1249 1267 88319bf-88319d4 call 8836fa8 1246->1267 1247 8831b08 1254 8831b10-8831b18 1247->1254 1251 883196c 1248->1251 1249->1251 1251->1246 1287 8831bd3 call 883b660 1253->1287 1288 8831bd3 call 883b598 1253->1288 1254->1211 1257 8831bd9 1262 8831be0-8831be5 1257->1262 1262->1211 1273 88319da-88319dc 1267->1273 1268->1211 1271 8831ab7-8831ab9 1269->1271 1272 8831ab5 1269->1272 1276 8831b9a-8831bab 1270->1276 1271->1268 1272->1268 1274 88319f4-8831a01 1273->1274 1275 88319de-88319e4 1273->1275 1279 8831a07-8831a11 1274->1279 1280 88318e6 1274->1280 1277 88319e6 1275->1277 1278 88319e8-88319ea 1275->1278 1276->1211 1277->1274 1278->1274 1279->1211 1280->1210 1282->1247 1283->1247 1284->1247 1285->1247 1287->1257 1288->1257
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q
                                        • API String ID: 0-127220927
                                        • Opcode ID: 547ea4525baedabcb41deb02222183d15a6d1e8d238d73412a65b9cb9fd698f8
                                        • Instruction ID: e82c2d630722e3588ee3b43b4e8bee0ba94a22ba1d71a959cab137334c163d89
                                        • Opcode Fuzzy Hash: 547ea4525baedabcb41deb02222183d15a6d1e8d238d73412a65b9cb9fd698f8
                                        • Instruction Fuzzy Hash: 1C618538B40228DFDB148B79D959BBD76B2FB84B12F148429F402EB7D4CA759C01CBA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1289 8835700-8835726 1290 883572b-883572e 1289->1290 1291 8835730 1290->1291 1292 8835737-88357cc 1290->1292 1291->1292 1293 8835753-883575b 1291->1293 1294 88357b2-88357b7 1291->1294 1295 8835790-8835795 1291->1295 1296 8835797-88357aa 1291->1296 1297 8835744 1291->1297 1298 883578d 1291->1298 1299 883575d-8835763 1291->1299 1300 88357bc-88357c1 1291->1300 1292->1299 1293->1290 1294->1290 1295->1290 1296->1294 1311 8835746 call 8835b67 1297->1311 1312 8835746 call 8835b68 1297->1312 1298->1295 1303 883576d-8835782 1299->1303 1302 883574c-8835751 1302->1290 1308 8835784-883578b 1303->1308 1309 88357ce-88357d6 1303->1309 1308->1290 1311->1302 1312->1302
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Haq$Haq
                                        • API String ID: 0-4016896955
                                        • Opcode ID: bce5ae5c555f6657b181e7c861c9e6e99919e1edc123897b1698af52e8213c2a
                                        • Instruction ID: 5716b1cfbc8015acc62fc397d46c8c804367ca8d3fefc213205d66b036c9fdbc
                                        • Opcode Fuzzy Hash: bce5ae5c555f6657b181e7c861c9e6e99919e1edc123897b1698af52e8213c2a
                                        • Instruction Fuzzy Hash: FE115670604324DFD7129B18EC95FAA7BF8EB85706F005837F006CA6C1C6749E05C7A1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1327 7084b84-7084c25 1330 7084c5e-7084c7e 1327->1330 1331 7084c27-7084c31 1327->1331 1336 7084c80-7084c8a 1330->1336 1337 7084cb7-7084ce6 1330->1337 1331->1330 1332 7084c33-7084c35 1331->1332 1334 7084c58-7084c5b 1332->1334 1335 7084c37-7084c41 1332->1335 1334->1330 1338 7084c43 1335->1338 1339 7084c45-7084c54 1335->1339 1336->1337 1341 7084c8c-7084c8e 1336->1341 1345 7084ce8-7084cf2 1337->1345 1346 7084d1f-7084dd9 CreateProcessA 1337->1346 1338->1339 1339->1339 1340 7084c56 1339->1340 1340->1334 1342 7084c90-7084c9a 1341->1342 1343 7084cb1-7084cb4 1341->1343 1347 7084c9c 1342->1347 1348 7084c9e-7084cad 1342->1348 1343->1337 1345->1346 1349 7084cf4-7084cf6 1345->1349 1359 7084ddb-7084de1 1346->1359 1360 7084de2-7084e68 1346->1360 1347->1348 1348->1348 1350 7084caf 1348->1350 1351 7084cf8-7084d02 1349->1351 1352 7084d19-7084d1c 1349->1352 1350->1343 1354 7084d04 1351->1354 1355 7084d06-7084d15 1351->1355 1352->1346 1354->1355 1355->1355 1356 7084d17 1355->1356 1356->1352 1359->1360 1370 7084e78-7084e7c 1360->1370 1371 7084e6a-7084e6e 1360->1371 1373 7084e8c-7084e90 1370->1373 1374 7084e7e-7084e82 1370->1374 1371->1370 1372 7084e70 1371->1372 1372->1370 1376 7084ea0-7084ea4 1373->1376 1377 7084e92-7084e96 1373->1377 1374->1373 1375 7084e84 1374->1375 1375->1373 1379 7084eb6-7084ebd 1376->1379 1380 7084ea6-7084eac 1376->1380 1377->1376 1378 7084e98 1377->1378 1378->1376 1381 7084ebf-7084ece 1379->1381 1382 7084ed4 1379->1382 1380->1379 1381->1382 1384 7084ed5 1382->1384 1384->1384
                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07084DC6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: dc529885cf6a7076e5c43aa0ca09ab8a9cea36ad2738062009f18fd2e2d33882
                                        • Instruction ID: f44a0c5041cea369f167a062c06c76e972452912e7445b4a4f99320ed781c985
                                        • Opcode Fuzzy Hash: dc529885cf6a7076e5c43aa0ca09ab8a9cea36ad2738062009f18fd2e2d33882
                                        • Instruction Fuzzy Hash: 1BA15DB1D0025ACFDBA4DF68C8417EDBBF2BF44314F14866AE858A7240DB749985CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1385 7084b90-7084c25 1387 7084c5e-7084c7e 1385->1387 1388 7084c27-7084c31 1385->1388 1393 7084c80-7084c8a 1387->1393 1394 7084cb7-7084ce6 1387->1394 1388->1387 1389 7084c33-7084c35 1388->1389 1391 7084c58-7084c5b 1389->1391 1392 7084c37-7084c41 1389->1392 1391->1387 1395 7084c43 1392->1395 1396 7084c45-7084c54 1392->1396 1393->1394 1398 7084c8c-7084c8e 1393->1398 1402 7084ce8-7084cf2 1394->1402 1403 7084d1f-7084dd9 CreateProcessA 1394->1403 1395->1396 1396->1396 1397 7084c56 1396->1397 1397->1391 1399 7084c90-7084c9a 1398->1399 1400 7084cb1-7084cb4 1398->1400 1404 7084c9c 1399->1404 1405 7084c9e-7084cad 1399->1405 1400->1394 1402->1403 1406 7084cf4-7084cf6 1402->1406 1416 7084ddb-7084de1 1403->1416 1417 7084de2-7084e68 1403->1417 1404->1405 1405->1405 1407 7084caf 1405->1407 1408 7084cf8-7084d02 1406->1408 1409 7084d19-7084d1c 1406->1409 1407->1400 1411 7084d04 1408->1411 1412 7084d06-7084d15 1408->1412 1409->1403 1411->1412 1412->1412 1413 7084d17 1412->1413 1413->1409 1416->1417 1427 7084e78-7084e7c 1417->1427 1428 7084e6a-7084e6e 1417->1428 1430 7084e8c-7084e90 1427->1430 1431 7084e7e-7084e82 1427->1431 1428->1427 1429 7084e70 1428->1429 1429->1427 1433 7084ea0-7084ea4 1430->1433 1434 7084e92-7084e96 1430->1434 1431->1430 1432 7084e84 1431->1432 1432->1430 1436 7084eb6-7084ebd 1433->1436 1437 7084ea6-7084eac 1433->1437 1434->1433 1435 7084e98 1434->1435 1435->1433 1438 7084ebf-7084ece 1436->1438 1439 7084ed4 1436->1439 1437->1436 1438->1439 1441 7084ed5 1439->1441 1441->1441
                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07084DC6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: 1dd3fc0793648d6b2ef08b17442e72e1fee248d088c691fe0f900481d90dd7f2
                                        • Instruction ID: 21aa4a9bb902572703198805c7574ef08d4fa5c2d5825f159b1d29b941d9b40c
                                        • Opcode Fuzzy Hash: 1dd3fc0793648d6b2ef08b17442e72e1fee248d088c691fe0f900481d90dd7f2
                                        • Instruction Fuzzy Hash: 89915CB1D0025ACFDBA4DF68C8417EDBBF2BF48314F14866AE858A7240DB749985CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1442 286b4d9-286b4f7 1443 286b523-286b527 1442->1443 1444 286b4f9-286b506 call 286b1a0 1442->1444 1445 286b53b-286b57c 1443->1445 1446 286b529-286b533 1443->1446 1449 286b51c 1444->1449 1450 286b508 1444->1450 1453 286b57e-286b586 1445->1453 1454 286b589-286b597 1445->1454 1446->1445 1449->1443 1497 286b50e call 286b780 1450->1497 1498 286b50e call 286b771 1450->1498 1453->1454 1456 286b5bb-286b5bd 1454->1456 1457 286b599-286b59e 1454->1457 1455 286b514-286b516 1455->1449 1458 286b658-286b718 1455->1458 1459 286b5c0-286b5c7 1456->1459 1460 286b5a0-286b5a7 call 286b1ac 1457->1460 1461 286b5a9 1457->1461 1492 286b720-286b74b GetModuleHandleW 1458->1492 1493 286b71a-286b71d 1458->1493 1464 286b5d4-286b5db 1459->1464 1465 286b5c9-286b5d1 1459->1465 1463 286b5ab-286b5b9 1460->1463 1461->1463 1463->1459 1467 286b5dd-286b5e5 1464->1467 1468 286b5e8-286b5f1 call 286b1bc 1464->1468 1465->1464 1467->1468 1473 286b5f3-286b5fb 1468->1473 1474 286b5fe-286b603 1468->1474 1473->1474 1475 286b605-286b60c 1474->1475 1476 286b621-286b62e 1474->1476 1475->1476 1478 286b60e-286b61e call 286b1cc call 286b1dc 1475->1478 1483 286b630-286b64e 1476->1483 1484 286b651-286b657 1476->1484 1478->1476 1483->1484 1494 286b754-286b768 1492->1494 1495 286b74d-286b753 1492->1495 1493->1492 1495->1494 1497->1455 1498->1455
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0286B73E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2051489930.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2860000_Payment List.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 1f3badb7d55888ef0e23b118fe6b47614da0317f8578183114ce65a3559dad67
                                        • Instruction ID: f498d13ed73df7abdb5bfcd6b193fca37bdb3921befd3889c6c683ccd994ed8b
                                        • Opcode Fuzzy Hash: 1f3badb7d55888ef0e23b118fe6b47614da0317f8578183114ce65a3559dad67
                                        • Instruction Fuzzy Hash: 06815B78A00B458FD724DF29D4497AABBF1FF48308F00892DD44AE7A50D775E946CB91
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 028659A9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2051489930.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2860000_Payment List.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 2f803d283f919432af0b156ba3e80e3f0b186852cea7c0df958e17b3ad14b8b5
                                        • Instruction ID: 8238cfc0534eb8ac998169f91d5b55586a4e0df300c157657da578be5ab88f25
                                        • Opcode Fuzzy Hash: 2f803d283f919432af0b156ba3e80e3f0b186852cea7c0df958e17b3ad14b8b5
                                        • Instruction Fuzzy Hash: 6F4115B4C0061DCFDB24DFA9C8847DDBBB2BF45304F60805AD408AB255DB76694ACF90
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 028659A9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2051489930.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2860000_Payment List.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 5c74843230dd83e29814839e1defd9409ace84f411e92a689570b385ea0cddd8
                                        • Instruction ID: 6b4b05f808787199bb48bd67e98e39be6dee34318a33a17602a0c524510e3c70
                                        • Opcode Fuzzy Hash: 5c74843230dd83e29814839e1defd9409ace84f411e92a689570b385ea0cddd8
                                        • Instruction Fuzzy Hash: 6F41F3B4C0071DCBDB24DFA9C848B9EBBF5BF48304F20806AD418AB255DB75694ACF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2051489930.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2860000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 85cb106957c4cd5b7839705141baa0b40a4668ba18e7c674967210df1c3b8dbd
                                        • Instruction ID: 19bc75e1604ccee0f0670c698d4f4430ac0d00a4a7191f3cd19b8425509df6f2
                                        • Opcode Fuzzy Hash: 85cb106957c4cd5b7839705141baa0b40a4668ba18e7c674967210df1c3b8dbd
                                        • Instruction Fuzzy Hash: EB31EFB880424DCFEB11DFA8C9597EDBBF1AF06308F54418AC005AB255CB7AA94ACB51
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07084560
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: df4031e95d5732627bc45409ff2c56c73a4176046b837002b5ba31d47196b292
                                        • Instruction ID: cefacf58c22434f120b746f809fcb21d5bc79c032a5a6f8c438ac45866bdd373
                                        • Opcode Fuzzy Hash: df4031e95d5732627bc45409ff2c56c73a4176046b837002b5ba31d47196b292
                                        • Instruction Fuzzy Hash: 5E2127B5900359DFCB10DFAAC885BEEBBF5FF48310F10852AE959A7241C7789945CBA0
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07084560
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: a38887de57f5f72d4603b29ffa1fa94eb011a64e6ca26bfeffa50976ae5dab8d
                                        • Instruction ID: 3e5c4e4b08dcd1b7da5195e88e1fd1a97effee5dfd643f8e6df0a79d1646bd5b
                                        • Opcode Fuzzy Hash: a38887de57f5f72d4603b29ffa1fa94eb011a64e6ca26bfeffa50976ae5dab8d
                                        • Instruction Fuzzy Hash: 6E2139B5D003599FCB10DFAAC885BEEBBF5FF48310F10852AE959A7241C7789944CBA0
                                        APIs
                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 070843B6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: ContextThreadWow64
                                        • String ID:
                                        • API String ID: 983334009-0
                                        • Opcode ID: 1f03ffb82d8e9e44f3d164b83b6893310dcfb396c099d7fa691e54cf982e182c
                                        • Instruction ID: f9353fc3532427e9180ca037fdfe79d0e7a1f608c8a2aeb6709da4055c210bc3
                                        • Opcode Fuzzy Hash: 1f03ffb82d8e9e44f3d164b83b6893310dcfb396c099d7fa691e54cf982e182c
                                        • Instruction Fuzzy Hash: D82138B1D003099FDB54DFAAC4857EEBBF4EF49314F10842AE459A7240CB78A985CFA0
                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07084A78
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: b7534c2c1b11549696fae05b8d6d9601d256cf0a85dbfb584e6237de22661b88
                                        • Instruction ID: 69b95a5c5f89a1ce2fb981d8859612f5744d9f29e499e7cbe98da7a803c56312
                                        • Opcode Fuzzy Hash: b7534c2c1b11549696fae05b8d6d9601d256cf0a85dbfb584e6237de22661b88
                                        • Instruction Fuzzy Hash: 852136B18002499FCB10DFAAC884AEEFBF5FF48310F10842AE958A7250D7389545CBA1
                                        APIs
                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 070843B6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: ContextThreadWow64
                                        • String ID:
                                        • API String ID: 983334009-0
                                        • Opcode ID: 095135c56c08a0739478637a833a771f523ed0ce7ff8a401989dc803e84732c2
                                        • Instruction ID: f3db2123215bd114837e4adb035a91f0a2aa79b337aced44bfa5fe7c7ce43561
                                        • Opcode Fuzzy Hash: 095135c56c08a0739478637a833a771f523ed0ce7ff8a401989dc803e84732c2
                                        • Instruction Fuzzy Hash: 142135B1D003098FDB50EFAAC4857EEBBF4EF48324F10842AD459A7240CB78A944CFA0
                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07084A78
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 9419e9c9057f4ffeef520d3a09193de6e8f6878bb53866f115a2228ba75a104a
                                        • Instruction ID: fa610fd73dc3f70e945f2ae86fff19a32b02c1c8fb1d4e4c73803fcd77136bd0
                                        • Opcode Fuzzy Hash: 9419e9c9057f4ffeef520d3a09193de6e8f6878bb53866f115a2228ba75a104a
                                        • Instruction Fuzzy Hash: 9E2118B1C003599FCB10DFAAC885AEEFBF5FF48310F50842AE559A7250C778A945CBA5
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0286DA4F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2051489930.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2860000_Payment List.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: f96c2f07aec2eeb686ad0fbbcfabfcbca66c733449414ef49929378446c18743
                                        • Instruction ID: 67114200ea6daccbe642eebafafd8ea6d5be3a780b3522daa34b181bff898cfa
                                        • Opcode Fuzzy Hash: f96c2f07aec2eeb686ad0fbbcfabfcbca66c733449414ef49929378446c18743
                                        • Instruction Fuzzy Hash: 3921C4B59002489FDB10DF9AD584AEEBBF9FB48310F14841AE918A3350D379A954CFA5
                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0708447E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 6077737530ec0d5ea734a8d1bc10f227f539c2f549f84163b935ef04d29b32a2
                                        • Instruction ID: 208c20fab0514762c3c021096c555e0c9ff25c294b2efba850a3444220043cab
                                        • Opcode Fuzzy Hash: 6077737530ec0d5ea734a8d1bc10f227f539c2f549f84163b935ef04d29b32a2
                                        • Instruction Fuzzy Hash: A11126B18002499FDB20DFAAC845AEFFFF5EF48314F24881AE559A7250C779A545CFA0
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0286B7B9,00000800,00000000,00000000), ref: 0286B9CA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2051489930.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2860000_Payment List.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: cc908d5e4967dfcfe5f286d9c2a5ebef2ed824094b8e336150c79e5dcee0958a
                                        • Instruction ID: f915bf1debd14407c3e057a0afa580417f26c2d8d0953c836e1be6159c3b81f4
                                        • Opcode Fuzzy Hash: cc908d5e4967dfcfe5f286d9c2a5ebef2ed824094b8e336150c79e5dcee0958a
                                        • Instruction Fuzzy Hash: AB1117BA8002098FDB10DF9AD445BEEFBF4EB88314F10842AD529B7200D375A545CFA5
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0286B7B9,00000800,00000000,00000000), ref: 0286B9CA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2051489930.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2860000_Payment List.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 09e1bb5d0e7ae88abd7d282d4078ff9df4b84ff2f75b21e2cc0a990f9ed5005b
                                        • Instruction ID: 8a4b11a9f1aead64cb1665584a0763b0949e157df9551f7302ca0fa36c5513d3
                                        • Opcode Fuzzy Hash: 09e1bb5d0e7ae88abd7d282d4078ff9df4b84ff2f75b21e2cc0a990f9ed5005b
                                        • Instruction Fuzzy Hash: 2E11E7B99002499FDB10DF9AD448BAEFBF4EB48318F10841AD519B7210D375A945CFA5
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 1403e4770d80dba2ac9a3c8a301b096912300b6ada758a22d2b811a7a6a204b9
                                        • Instruction ID: 85651379c933a4147e3bb547a72a5dfcc0182a482feda39e22c4679de6583663
                                        • Opcode Fuzzy Hash: 1403e4770d80dba2ac9a3c8a301b096912300b6ada758a22d2b811a7a6a204b9
                                        • Instruction Fuzzy Hash: E81149B18003498FCB20EFAAC4457EFFBF4EF88724F20841AD459A7240C738A545CBA0
                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0708447E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 1dc20e06da17fb79a63a2d951f86b429acedb2f63fa066cd328eab17d20811a7
                                        • Instruction ID: 6cb43f8c035ac3d4e377d301ed481927ab92de0cc71acc005c5e8efc7007b936
                                        • Opcode Fuzzy Hash: 1dc20e06da17fb79a63a2d951f86b429acedb2f63fa066cd328eab17d20811a7
                                        • Instruction Fuzzy Hash: 9B1137B18002499FCB10DFAAC844AEFBFF5EF48314F148819E519A7250C779A544CFA0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 626a4c9f57664d7eb3f3a54b56986f6b55632f80e61ac0442a12c05b920894d7
                                        • Instruction ID: a1c45be4ecf501bb3ed6d3ce392ef04c5a72db60e55feedd493ff89f83c069e7
                                        • Opcode Fuzzy Hash: 626a4c9f57664d7eb3f3a54b56986f6b55632f80e61ac0442a12c05b920894d7
                                        • Instruction Fuzzy Hash: 9C113AB1D002498FCB10EFAAC4457EEFBF5EF88724F20841AD519A7240CB79A944CFA0
                                        APIs
                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 07089305
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: 7ff7c1125207f15375053707ccfb9c7b4c656fd58f77d94b77f76785827888ab
                                        • Instruction ID: d7ce3f325a4e2a65e2176255ae3b7d203840f2b1d127acaeb9931ad3abe168c3
                                        • Opcode Fuzzy Hash: 7ff7c1125207f15375053707ccfb9c7b4c656fd58f77d94b77f76785827888ab
                                        • Instruction Fuzzy Hash: 3D11F5B58003499FDB10DF9AC885BDEFBF8EB59314F20841AE959A7640C375A544CFA1
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0286B73E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2051489930.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2860000_Payment List.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 39a9c02116c28557412e2d68cfc406b50e8fa86255b9219442ee62aa45298e79
                                        • Instruction ID: cdc0d5c56f1d13d629af809b0c530f85a48fd60973d970eaa9e2e868891de0ae
                                        • Opcode Fuzzy Hash: 39a9c02116c28557412e2d68cfc406b50e8fa86255b9219442ee62aa45298e79
                                        • Instruction Fuzzy Hash: 7C11E3B9C006498FDB10DF9AD448AEEFBF5EF48318F10845AD529B7210C379A545CFA1
                                        APIs
                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 07089305
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: e18b15d37d86f38b447e6af8b6367a115e90665df5506f534c32f1be2e379bcf
                                        • Instruction ID: 51fdb9a0860c7ef6f24dfc93929ed7ee11c9eabc462fd8372eec36dfb1bed600
                                        • Opcode Fuzzy Hash: e18b15d37d86f38b447e6af8b6367a115e90665df5506f534c32f1be2e379bcf
                                        • Instruction Fuzzy Hash: 081106B58007499FDB50EF9AC845BEEFBF8EB58314F108819E558A7240C375A944CFA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te]q
                                        • API String ID: 0-52440209
                                        • Opcode ID: 50797f8cb38c7c6d004bd3edeabe0d367fcb73349dcae4bf5f6459f0dcb0ebf9
                                        • Instruction ID: adffa0b8fee54c3e0485102a972655963d36340d4d572f5a824b24f1d03625be
                                        • Opcode Fuzzy Hash: 50797f8cb38c7c6d004bd3edeabe0d367fcb73349dcae4bf5f6459f0dcb0ebf9
                                        • Instruction Fuzzy Hash: 8651AE34B002198FCB15EF7998448BEBBF6FFC5321B248969E459D7351EB309D068791
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: V
                                        • API String ID: 0-1342839628
                                        • Opcode ID: 7853594dd73875e4d8edbbfd0b8aac7365a93f80d75c1d2ba5f8e56c5fbef95c
                                        • Instruction ID: bf9d630cdb990aa0da9c55d4b834416c2f6d2d376471ec66820e495cb2301701
                                        • Opcode Fuzzy Hash: 7853594dd73875e4d8edbbfd0b8aac7365a93f80d75c1d2ba5f8e56c5fbef95c
                                        • Instruction Fuzzy Hash: 5E519030904138DBDF10DF69C5527FEBAB1AF8830BF04856BE466EA691D739C980DB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te]q
                                        • API String ID: 0-52440209
                                        • Opcode ID: 5bfb987f0ec562bae144c2087cc8fe35f439967f84d65c9ab67f496635799e89
                                        • Instruction ID: da47f2b770802f5a601db886e7642ee7eb1524220d7e44e5bbce88fe7568e9dc
                                        • Opcode Fuzzy Hash: 5bfb987f0ec562bae144c2087cc8fe35f439967f84d65c9ab67f496635799e89
                                        • Instruction Fuzzy Hash: 82413574E05268CFDB04DFAAC8946EEBBF6BF89301F10902AD409EB754DB355846CB80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te]q
                                        • API String ID: 0-52440209
                                        • Opcode ID: 7d3143bac7f1224d68055767acc21b38d023228698c5e118518e09a96e6afe6c
                                        • Instruction ID: 663cc239827fe79eb52a388cd5a42d1faca6c47b610f733aeecd9b1aaf062595
                                        • Opcode Fuzzy Hash: 7d3143bac7f1224d68055767acc21b38d023228698c5e118518e09a96e6afe6c
                                        • Instruction Fuzzy Hash: AC41F6B4E0522CCBDB44DFAAC8956EEBBF6BF88301F109429D409AB754DB755845CF80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: l.]q
                                        • API String ID: 0-1248894718
                                        • Opcode ID: 318cacaf40f537b5deab60a211633fe51579011dca6164920b7f4943d99fe8e1
                                        • Instruction ID: 1c8d9b89eda0914e947f9d41eba2bcfb397d479dd334d76154d966704be74b6e
                                        • Opcode Fuzzy Hash: 318cacaf40f537b5deab60a211633fe51579011dca6164920b7f4943d99fe8e1
                                        • Instruction Fuzzy Hash: 57319231905A28CBCB618FAEC84066AF7B0FF61306F05856BE466E7751C230D941CB8A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te]q
                                        • API String ID: 0-52440209
                                        • Opcode ID: fd2b237cac0865948040072f1d9626f0e863ce0cba1b693a59ef2661fc22b7a1
                                        • Instruction ID: 4e506ee67468a84e34bc855088c4a867aa34a93d351de36812b788d1cac10291
                                        • Opcode Fuzzy Hash: fd2b237cac0865948040072f1d9626f0e863ce0cba1b693a59ef2661fc22b7a1
                                        • Instruction Fuzzy Hash: 45219D78E00219CFCF44CFE8D4859ACBBB1FB88311F10816AE919AB365C731A946CF50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: r
                                        • API String ID: 0-1812594589
                                        • Opcode ID: 65d0bc404d81eedb1fdf67f092effbf46c93f2fd772e3495b30c950b3b5437e9
                                        • Instruction ID: d5945ef12864e9f22854d132837e826bfee94bb454b34605c2be7659a9349202
                                        • Opcode Fuzzy Hash: 65d0bc404d81eedb1fdf67f092effbf46c93f2fd772e3495b30c950b3b5437e9
                                        • Instruction Fuzzy Hash: F7012570D0A128EFC704CFA8D4944FCB739FB8E31B7009095D61A96202CB39A845CFD0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: r
                                        • API String ID: 0-1812594589
                                        • Opcode ID: 892782d7704a9ca1e9a6afdbafcbc2610455c54f59d02109a441ae542201f670
                                        • Instruction ID: 38de62f366943f0e3e22fb3ee9bb7cf36cedc218c5998e142d86960e3c95c5c5
                                        • Opcode Fuzzy Hash: 892782d7704a9ca1e9a6afdbafcbc2610455c54f59d02109a441ae542201f670
                                        • Instruction Fuzzy Hash: C9017C35D09128DFC744DF68C4954FCB739FB4E31B7109155C61A96252CB39A885CFD0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Haq
                                        • API String ID: 0-725504367
                                        • Opcode ID: 83a826c0a971a6b19f084a7157531c6dedbf5e927fc5d4c9aeb4f3136c19ef17
                                        • Instruction ID: ab3a70910974c00b5a07b14cd0e1ad55ca150dbefa76d726829a09e7a6a6f088
                                        • Opcode Fuzzy Hash: 83a826c0a971a6b19f084a7157531c6dedbf5e927fc5d4c9aeb4f3136c19ef17
                                        • Instruction Fuzzy Hash: 8301D6346093489FD7059FB899611AD7FB1EF82300F2048EFC444E7256DA349E0AC751
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Te]q
                                        • API String ID: 0-52440209
                                        • Opcode ID: 2413f463b0ff344a3d8a75cf7fc074ea6960a2557ef56225b3bc69435bda675d
                                        • Instruction ID: b4d7e48d21d82cbcc80aaa766738fccfdde74b19550bfbe65a2bd1f469ba95e0
                                        • Opcode Fuzzy Hash: 2413f463b0ff344a3d8a75cf7fc074ea6960a2557ef56225b3bc69435bda675d
                                        • Instruction Fuzzy Hash: DDF09035B1011A87DB09EBA8CA519FE72B3AFD8701B204079C406EB384EF358E03C792
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: =n>
                                        • API String ID: 0-3924685907
                                        • Opcode ID: fb535f1e7a6749859a1e421f6fa1bd814fcf6070609881ac18068244269d7574
                                        • Instruction ID: 1b147df4ac60e2c9fe4d1c8e9108a5dedd80061faa85414b554450e830ab6ee2
                                        • Opcode Fuzzy Hash: fb535f1e7a6749859a1e421f6fa1bd814fcf6070609881ac18068244269d7574
                                        • Instruction Fuzzy Hash: 9CD0123611011C9E5B80EE9AE840C5277DCFB147017008872F548C7521E621E929DB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3320018038cdd4f51be74818af40987d8268b18d65b6ee4ea0eeb836246143e1
                                        • Instruction ID: 6b785988117b8fa3c31cd1f45410087d8fe9d60fc9addb51ee88c8287f9bb293
                                        • Opcode Fuzzy Hash: 3320018038cdd4f51be74818af40987d8268b18d65b6ee4ea0eeb836246143e1
                                        • Instruction Fuzzy Hash: 84D1F470A04679CFC719AFA8D4506ADBFF1EF06312F148256E0A1DB2A1D334D941DB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3aff128d9f40385162421e1e416e30ebab341acfa6ae12a708e4ea44a55d689f
                                        • Instruction ID: fd94bca602a86ad6acdd9db0a5e9f09a16fddac19568d69b46aee33ae3d44799
                                        • Opcode Fuzzy Hash: 3aff128d9f40385162421e1e416e30ebab341acfa6ae12a708e4ea44a55d689f
                                        • Instruction Fuzzy Hash: A5E1E4B0804629DFCB019FA4E4557BE7FB1FF0530AF04899AD061DB692C77A9948CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8cf5541a5b552ecb74fbc624f4f287595acdc85b109e9d209b28b2560760a481
                                        • Instruction ID: 28415201e9b98a6bda058da4388813b069f7a9fac87710fdbd90a74bdfe22c6b
                                        • Opcode Fuzzy Hash: 8cf5541a5b552ecb74fbc624f4f287595acdc85b109e9d209b28b2560760a481
                                        • Instruction Fuzzy Hash: E3B14070E05229CFCB54DFA8D580AEDBBB9FF88304F109625E509EB755DB34A946CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3067a79bfc6a752518001b0d961ec73fc29644191b30e8ff660095aed943ebfe
                                        • Instruction ID: 5a3e0598bcdf976b865a78c8c8be597c86460144340eb2b8ad1581510a3d3397
                                        • Opcode Fuzzy Hash: 3067a79bfc6a752518001b0d961ec73fc29644191b30e8ff660095aed943ebfe
                                        • Instruction Fuzzy Hash: DEA1AD70A08979CFC719EBA9E450BBDBBF2EB04316F048167E095EB681D334E951CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7d09834d33b52dbbdc2f709ddb448dbab3b05366cb5503104a958bd2e81c5eca
                                        • Instruction ID: d034f98d34f5b79780210b62d81bbc4c2d6bd13ef52bb86fcb110761bb86fd8e
                                        • Opcode Fuzzy Hash: 7d09834d33b52dbbdc2f709ddb448dbab3b05366cb5503104a958bd2e81c5eca
                                        • Instruction Fuzzy Hash: 32A18131504229CFC708CF68D485A6ABBF1FF45321B1586A6D462DBAF6C771EC81CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c8077dbe4f5e4e5269df549c3b68744950f89a4462e7ae2612494a922b76a466
                                        • Instruction ID: 2c4a90c35d47f08a0535336d340b63d3da68a9b1ec6ff5da88d461645289ee25
                                        • Opcode Fuzzy Hash: c8077dbe4f5e4e5269df549c3b68744950f89a4462e7ae2612494a922b76a466
                                        • Instruction Fuzzy Hash: 59712930909269CFC7248F6DC84027ABBF1FF56316F14866BD5B6DB2A2D3349841CB99
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c54c304eb89d92cc7d6764aa551c3e50b990ad6a488c8a0dce1e408528a5b7c2
                                        • Instruction ID: 6e44b8eecb8124740bb32f4f5e58e25b9593c9c69e712f6af808127b139a26b8
                                        • Opcode Fuzzy Hash: c54c304eb89d92cc7d6764aa551c3e50b990ad6a488c8a0dce1e408528a5b7c2
                                        • Instruction Fuzzy Hash: E0816DB0C0462ADFDB018F95E4496BE7FB1FB0430AF04899AD4A1D7681C7BA9658DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d18eb20f11ba319a006a2762f1edd7de4115719405e98d7e35273b9dfac9e68
                                        • Instruction ID: 40a9f206bd3aa938f756496f49d6e536ec219182162b12d3666ba73a613c9ef0
                                        • Opcode Fuzzy Hash: 2d18eb20f11ba319a006a2762f1edd7de4115719405e98d7e35273b9dfac9e68
                                        • Instruction Fuzzy Hash: 9661BF70A04228DFCB158FA8DC85AEDBFB6FF46311F054156E552EB2E2C7B09946CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b3f6bd61f7c93a7ba34be90bd646264516bbf6c4a07095e0660589379f36614c
                                        • Instruction ID: 73ab94b1ecacd1f04a1b4988c3962136e118caf5b5ed79bca841197ad7128f77
                                        • Opcode Fuzzy Hash: b3f6bd61f7c93a7ba34be90bd646264516bbf6c4a07095e0660589379f36614c
                                        • Instruction Fuzzy Hash: 48817CB0C0462ADFDB01CF95E4496BE7FB1FB0430AF04899AD4A1D7681C7BA9658DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c96dadbbd91413e7846823c3409c22d239a241274de7a6db514d9dce44820669
                                        • Instruction ID: fe5e0ec3c1f4144886d256df12629d91c4bd93c5bb454f882017379dbdc3f7c1
                                        • Opcode Fuzzy Hash: c96dadbbd91413e7846823c3409c22d239a241274de7a6db514d9dce44820669
                                        • Instruction Fuzzy Hash: E351F531919A78CFCB198F69D9006BBBBB4FF45312F008167E9E5DB291D3349941CBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eea27bd07de2109993773d1aec28c91542d1c079899c3459e9774f619b945a6d
                                        • Instruction ID: 24f9e1cbe229fa051a960d5196706b833c3cb8d7985f9268e2fec7cdb2dee7dc
                                        • Opcode Fuzzy Hash: eea27bd07de2109993773d1aec28c91542d1c079899c3459e9774f619b945a6d
                                        • Instruction Fuzzy Hash: 52615131A04228CFCB14CF68C588A6AF7F1FF44316F5586AAE452DB6A6C774E841CBD0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6bf4da283dc64da4a73d827a26c7836a58200c25bcdfd2d9453ad811e03f0179
                                        • Instruction ID: ef3320846025a387548caccefdab30889bf14467b79719ae32ae4ddf00974fd0
                                        • Opcode Fuzzy Hash: 6bf4da283dc64da4a73d827a26c7836a58200c25bcdfd2d9453ad811e03f0179
                                        • Instruction Fuzzy Hash: 9F715B35A00619DFCB14DFA8C454AADBBF2FF88315F108169E909EB361DB71AD85CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d337b1693a07d061b89027a896eb41c2753a3b5647fa7e92c12013bd49b16f29
                                        • Instruction ID: 616407ddb3c9dfd4d6f3f93ddf5e1803d9377d889b2c3cf4c26fe2454cdcab5f
                                        • Opcode Fuzzy Hash: d337b1693a07d061b89027a896eb41c2753a3b5647fa7e92c12013bd49b16f29
                                        • Instruction Fuzzy Hash: DF518D71A04228EFCB118FA8DC84AFEBFB6FF45312F04416AE505EB281D7B49945DB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: edb625620f4134663ca0e30144d689bb1d80206f2773dba59e41a923056444af
                                        • Instruction ID: 9d9a68739f162d7161f03792eb5a4a988e03e02b48e8a6ebcdf4a9356891dfe0
                                        • Opcode Fuzzy Hash: edb625620f4134663ca0e30144d689bb1d80206f2773dba59e41a923056444af
                                        • Instruction Fuzzy Hash: EB41E370D082698FCB219F79C884AE9BBF1BF45306F0841ABD461EB292D3749851CBE1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6c4886a65314a3aab361026347b6301bb4483f39061b3f5ddc112a6dba25eb55
                                        • Instruction ID: 5e0009880a8aac93cca75d7951492da6331208375190378f6653a62d5d201a3a
                                        • Opcode Fuzzy Hash: 6c4886a65314a3aab361026347b6301bb4483f39061b3f5ddc112a6dba25eb55
                                        • Instruction Fuzzy Hash: C2315D1285F3F05ED703A73C6A758E67F64AC5322570A01D7D0D0CF4B794588A9DC3AA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9aa39c977cccb33f40d1508fb29a51065b925c2c95ea91c7087bfd58cf5197d
                                        • Instruction ID: 60b6713c588d6d11bc915e4b268fcdde9ca3f9a30fc4b6e7bb56698a385e1189
                                        • Opcode Fuzzy Hash: b9aa39c977cccb33f40d1508fb29a51065b925c2c95ea91c7087bfd58cf5197d
                                        • Instruction Fuzzy Hash: 2A41D274D09129EFCB00CFA8C1849EDBBB9BB4D306F109555DA1AE6212DB35A985CFD0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6fdc976305d980fea9337e70cc2d4671f4f4729283cecff20098a7fc81f5f15
                                        • Instruction ID: bef46f704dfbb502725255807ceb51b492b9812e7f6f73a70994427e3549476e
                                        • Opcode Fuzzy Hash: f6fdc976305d980fea9337e70cc2d4671f4f4729283cecff20098a7fc81f5f15
                                        • Instruction Fuzzy Hash: 5F3192B5A04629CFCB50CFADD8406AAF7F5FF45236F04856BE019D7692E334EA018B91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2ea177520957a436f4ce34adae4ad50ef96e7ab462b86754e9dbe3a9e91158ef
                                        • Instruction ID: aef688cf8f3617d8fcd755b1e0a6fc0c04adb9083efcd2147ae2b06612e2caa7
                                        • Opcode Fuzzy Hash: 2ea177520957a436f4ce34adae4ad50ef96e7ab462b86754e9dbe3a9e91158ef
                                        • Instruction Fuzzy Hash: 5B3167B1900219AFCB10DFA9D844ADEBFF9FF49320F10842AE909E7310D774A940CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6610498a893509c701dde88e821b22db2508dda39e83778ed7077d29c01e0245
                                        • Instruction ID: 30d06c1ac4e7d5f4c0dcc66728d265aaeda800f9fcd1d680cf7716c65b30c05b
                                        • Opcode Fuzzy Hash: 6610498a893509c701dde88e821b22db2508dda39e83778ed7077d29c01e0245
                                        • Instruction Fuzzy Hash: D931E639A191248FC714CB68D8887B9BBE2EB42716F08867BE015CB792C775984287D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2050738742.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_eed000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3f669e37c790f1a2f40983831f27f4ddbc889fdc5456c7f9d567a777cb6f03e1
                                        • Instruction ID: 2a4334b7dfd51ea332f465edc2d2c72c2c268507109f587dc480d67bbecd344e
                                        • Opcode Fuzzy Hash: 3f669e37c790f1a2f40983831f27f4ddbc889fdc5456c7f9d567a777cb6f03e1
                                        • Instruction Fuzzy Hash: 7321F571508288DFCB15DF24D984B16BF66FB84314F28C569D9095B296C33AD807CA61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2050738742.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_eed000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 73f1e37908911882341d3f05dbb9bdb4d0aa94aed9f74ff197df511ab279648b
                                        • Instruction ID: d7c7b1a50037dcf904766408d12cae8fcd11c73434de4ddbb3a1040b8563cfe4
                                        • Opcode Fuzzy Hash: 73f1e37908911882341d3f05dbb9bdb4d0aa94aed9f74ff197df511ab279648b
                                        • Instruction Fuzzy Hash: 16213771508288DFCB05DF65D9C0F26BB65FB88318F20C56DDA095B3A6C33AD806CA61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5ec6086d568f47ae4e0fa59217e252ec4ade3815844ea88021d7d7a38f504000
                                        • Instruction ID: cd2f29d22a04b82116c00a629f4fcfd56153abae3d6e0d2fbb4ef1bd9ebb0d1a
                                        • Opcode Fuzzy Hash: 5ec6086d568f47ae4e0fa59217e252ec4ade3815844ea88021d7d7a38f504000
                                        • Instruction Fuzzy Hash: D33105B0D01258DFDB20DF99C584BDEBFF0AB08714F24846AE404AB740C3B55849CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 195f8893c87683461f251da41c507e3afc81bf9953cff9032ed66484ad1a4180
                                        • Instruction ID: 5b9ebd10ba7e2799d92b17568c9b5627ef1769c19919490cb7d58629ac90a399
                                        • Opcode Fuzzy Hash: 195f8893c87683461f251da41c507e3afc81bf9953cff9032ed66484ad1a4180
                                        • Instruction Fuzzy Hash: 39212570D08628CBDB18CF56D9442EEFBB6BFC9302F14D46AC51AA2264DF7559468E80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ae00b371110c7da6c3f302ee6bab8576e55c2bdef9eba40b1d0f4602792cb4d6
                                        • Instruction ID: 10c4cfe9dfb8d27e7d841c8ef53d0e00cad9e06b18f59f5ae06d925347433962
                                        • Opcode Fuzzy Hash: ae00b371110c7da6c3f302ee6bab8576e55c2bdef9eba40b1d0f4602792cb4d6
                                        • Instruction Fuzzy Hash: 4631A0B0D41318DFDB20DF99C588B9EBFF5AB08714F24846AE404BB750C7B9A845CBA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d63517cbc11495c21b90c77791d7d25ae3836f8a137a2cd0ced7e619c2a2b79f
                                        • Instruction ID: f1abbf83f6cab4bc585f8e87685c476576c8322dc0098c45412e1e2ff79d31ea
                                        • Opcode Fuzzy Hash: d63517cbc11495c21b90c77791d7d25ae3836f8a137a2cd0ced7e619c2a2b79f
                                        • Instruction Fuzzy Hash: F521CE78E09268DFCB40DFA4D895AEDBBB6BB49302F105429E409EB745D734A806CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9d4bf0f83babf7ca6540f195024deb12fc5da5d0b08df3dcefc8e6854a941445
                                        • Instruction ID: 737671676acfe2e373260db9ac47c1788d89f5318349fe43cc98d037006402a7
                                        • Opcode Fuzzy Hash: 9d4bf0f83babf7ca6540f195024deb12fc5da5d0b08df3dcefc8e6854a941445
                                        • Instruction Fuzzy Hash: D5110130D0E298DFC701DF69A8459F8BFB8EF86202F14999AD144CB5A3CB308949CBC1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2050738742.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_eed000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 67526475ddc136cc27d5262c8c6e9f9e769c1ca261280307e2220a7a8af6e323
                                        • Instruction ID: 4fe7bf22267baa7edf83e37f1305f1d7cd0b918b112bed2b05ba2cf136211ab7
                                        • Opcode Fuzzy Hash: 67526475ddc136cc27d5262c8c6e9f9e769c1ca261280307e2220a7a8af6e323
                                        • Instruction Fuzzy Hash: 6921507550D3C48FDB12CF24D994715BF72EB46314F28C5EAD8498B6A7C33A980ACB62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b87bdec3e689ff617f1437c4be37b572cd2c739d1fd1ba8805e7c8be57eb842f
                                        • Instruction ID: 969ccb5278d0d20a2157e6e760415ac7ebeaa70b79208e647943d0227118c894
                                        • Opcode Fuzzy Hash: b87bdec3e689ff617f1437c4be37b572cd2c739d1fd1ba8805e7c8be57eb842f
                                        • Instruction Fuzzy Hash: 732147B0D056688BDB18CF6BC8447EEBFB6AFC9300F04C46AD509A6264DB740A49CF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 60fdb3ff625699db4d174eaf66394304cc94901ba6b8888b1f19c38d4aade4db
                                        • Instruction ID: 9622e465ac31863e7b06ba1165f26ba643c41efd30365dcb10f6677144fdeaad
                                        • Opcode Fuzzy Hash: 60fdb3ff625699db4d174eaf66394304cc94901ba6b8888b1f19c38d4aade4db
                                        • Instruction Fuzzy Hash: AB11E075A007254F8B15EB799C408BFBBFAEFC4261B24892DE814E3340EB309D0687E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a21aa96107e6cc9e9aea2f8508c775ee3d2608e8168aec58576cdf26451c1a51
                                        • Instruction ID: 78a29096c35659445f5dd46717b670c13961f13f829d78a19bfe2e47b0abaf34
                                        • Opcode Fuzzy Hash: a21aa96107e6cc9e9aea2f8508c775ee3d2608e8168aec58576cdf26451c1a51
                                        • Instruction Fuzzy Hash: 5611E570781628DFD7184E29880ABBA3697AF85B21F208869E102CF3D6DB65EC01C7C1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: deaecd4350d5aa983b2c26dadc1df27c64f586c86f4b1c55cde95d42745691f6
                                        • Instruction ID: abd60bad5683a25d609426e957224529c36a60e1a4bc9581bb7b1ef6f9578dc7
                                        • Opcode Fuzzy Hash: deaecd4350d5aa983b2c26dadc1df27c64f586c86f4b1c55cde95d42745691f6
                                        • Instruction Fuzzy Hash: 442112B58003499FCB10DF9AC888ADEBFF8FB49310F10841AE919A7310C378A955CFA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 67bd74901b0e5d9df0b85be8918eb55de1838b7912cfc582fa741e5bb20f5fd0
                                        • Instruction ID: b8cdc6363183250f8feef446c627a0dcfb3914da2606db77d9b0b5a7bee3833a
                                        • Opcode Fuzzy Hash: 67bd74901b0e5d9df0b85be8918eb55de1838b7912cfc582fa741e5bb20f5fd0
                                        • Instruction Fuzzy Hash: C41128B0D046288BDB18CF6BC9447EEFAF7AFC8301F04C46AD50AB6264DB751A45CE80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2050738742.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_eed000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                        • Instruction ID: b364829fee392a2a6c870231575de244ed384b08687afe4b398073a64e4fc5d2
                                        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                        • Instruction Fuzzy Hash: 8811BB75508284DFCB02CF50C9C4B15BBA1FB88318F24C6A9D9494B2A6C33AD81ACB62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6080e4c72a4eec0700dadebf6cff1d6a36eb28fdbc893955f1e4e24b0cee9b20
                                        • Instruction ID: bdd52463d0a849323682d78377a78ad6a5ec764a5153852e32a2904010a8cf6d
                                        • Opcode Fuzzy Hash: 6080e4c72a4eec0700dadebf6cff1d6a36eb28fdbc893955f1e4e24b0cee9b20
                                        • Instruction Fuzzy Hash: 9001A775B0122A5B8B14EE5DDD804AFBBBAEFC5212B14483AF905D3340EB70DA0587E2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a8746becd359a33f01cfd812bfe1eeb496a287c93f4e8dfdf45f1e6944b47721
                                        • Instruction ID: aabc3c4a181a4bf6b23cbae45cfc47afdb661fb225dd66ac5ddc70c7ca6e140c
                                        • Opcode Fuzzy Hash: a8746becd359a33f01cfd812bfe1eeb496a287c93f4e8dfdf45f1e6944b47721
                                        • Instruction Fuzzy Hash: 1E1184B060452CDBC780DF94F4412B67BB4F74831AB2048E9D48AC6241EB77EA66D782
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 009ce2735595cfa9512f2c072ac11d69b685ba38495ec31ef524e38eb1e2f846
                                        • Instruction ID: 5b730f4bda4e655f87589f13e4c6d8c9ed834e190e0550f3dd3fe62d2e06c62c
                                        • Opcode Fuzzy Hash: 009ce2735595cfa9512f2c072ac11d69b685ba38495ec31ef524e38eb1e2f846
                                        • Instruction Fuzzy Hash: 07012934E09118EFCB04DFA8C685AA8BFF5EB4A301F159095E509DB262CB359E04EB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0e5b3bdb0107ce55982ca663ba1099669edcf38c3933a95f8b012d0246605478
                                        • Instruction ID: 80bdcf4ba4aa181475c244354a919d7d9415f8872dc6a3d1fd33b7502de891cf
                                        • Opcode Fuzzy Hash: 0e5b3bdb0107ce55982ca663ba1099669edcf38c3933a95f8b012d0246605478
                                        • Instruction Fuzzy Hash: DF01527060442CDBC780DF94F4416767BB4F74831AB6048EDD48AC6241EB77EA6AD786
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2050663923.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_edd000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5ddf1e308e574289b565e2a69ec2cc2dd8fe09aadffc87b37935679865165838
                                        • Instruction ID: 0270b69b34bab14cae5da2c645df246dbcd95dbb7c4593dbc34cbfe46e5f495b
                                        • Opcode Fuzzy Hash: 5ddf1e308e574289b565e2a69ec2cc2dd8fe09aadffc87b37935679865165838
                                        • Instruction Fuzzy Hash: 40012B310087049AD7209A1ACC84BA7FF9CEF55324F18C4ABED081A386C3399C41CA71
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0ec021184d7d458ea991587d130166c3a0e020afd62ca3b6064b76cb65a52e24
                                        • Instruction ID: ca839dc6e7e5b4e12c9ec551d85685be3909520e92b02835d492648f397bd8df
                                        • Opcode Fuzzy Hash: 0ec021184d7d458ea991587d130166c3a0e020afd62ca3b6064b76cb65a52e24
                                        • Instruction Fuzzy Hash: FC111BB0D0020DAFCB45EFE8D9516EEBBF5FF48300F1089A6D115AB355EB345A069B81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6545cf30d502990ae5850389a5a8c075cf30418806b94e13ca264a196a849ef0
                                        • Instruction ID: 372e1fd2d6d206c4ddd90618e6080360d487c6d6be42dc6409adc431ba19ce08
                                        • Opcode Fuzzy Hash: 6545cf30d502990ae5850389a5a8c075cf30418806b94e13ca264a196a849ef0
                                        • Instruction Fuzzy Hash: 2BF0BE727042142F93148AAA9C91CA7BBEDEBC93603258076F408DB311C9208D0183F0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48f81ff091e772275f1f7161f72155124b345870173d66b979b2825d913096f1
                                        • Instruction ID: d479da2493e87beb6cc1a2887e2898656f92471af050e2ecfb29ac37d5b90dab
                                        • Opcode Fuzzy Hash: 48f81ff091e772275f1f7161f72155124b345870173d66b979b2825d913096f1
                                        • Instruction Fuzzy Hash: 1EF06930D09228EBC704CF5AD545AB8BBBCAF89306F14A1A4D109DB212DB309A04EBC0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: decc22a86041ee095a22bc4b07d1e8e776eec7a64cf9f6474750d23e2ad4d58f
                                        • Instruction ID: 346f517e64a5d9ae04d2d0071ccc0956337e693921b33de124a9e37678dadae7
                                        • Opcode Fuzzy Hash: decc22a86041ee095a22bc4b07d1e8e776eec7a64cf9f6474750d23e2ad4d58f
                                        • Instruction Fuzzy Hash: F5010875900229DEEB14DF69C9047EEBAB2BF49311F148269E464EA291C3794A80CBD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d17cfa89ec877e47dd8efed817209c201f08649b710d432924a8a4de289e59e
                                        • Instruction ID: 974b0e2c6bfb517be8c4408b1c82719eaad9af52effc1cb11a58f9df2a054b13
                                        • Opcode Fuzzy Hash: 2d17cfa89ec877e47dd8efed817209c201f08649b710d432924a8a4de289e59e
                                        • Instruction Fuzzy Hash: 27F03CB0E0422AAFE754DFA8D845ABEBFF9EB48200F108569E440D7241D7748A44CBE1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4c0da8890a2577be055a91b81145c494416bde442da107f8d6a7bb80018b1715
                                        • Instruction ID: 7180e74d086bf2674a7409189600746fb4de7def1a75bcde420abf45fc226414
                                        • Opcode Fuzzy Hash: 4c0da8890a2577be055a91b81145c494416bde442da107f8d6a7bb80018b1715
                                        • Instruction Fuzzy Hash: 0D01B6B1D04618CBDB08CF97C9446EEFBF7BFD9305F14D06AC50AA6268EB7515468E80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2050663923.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_edd000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 820c4fce64c77c23b7df7b743bcf75c567680e1f90105f790b1a04d79e2d4252
                                        • Instruction ID: 9e7de3f2f30b5683d84c1480d6e4a171fc9792f09bdbd50a1b2116843d0913f5
                                        • Opcode Fuzzy Hash: 820c4fce64c77c23b7df7b743bcf75c567680e1f90105f790b1a04d79e2d4252
                                        • Instruction Fuzzy Hash: C6F062714097449EE7208E1ADC84B62FFA8EF55738F18C49BED485A386C279A845CAB1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db3b2aee6b707bfcf5499ec4716fde2d1042efa1302f860f85f418128b66c6de
                                        • Instruction ID: 5d9befb40d5b71098efd7f3c54ddfcbb32d5fe3a99aeec37729fa91fd890f356
                                        • Opcode Fuzzy Hash: db3b2aee6b707bfcf5499ec4716fde2d1042efa1302f860f85f418128b66c6de
                                        • Instruction Fuzzy Hash: 17F0E232A041197FEF04DFACED5189ABFAAEF54224B00817BF408E7255EA31D85087A2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8cc2bb000a9b313e3208789a9764acda6e9b72d4ee3d1dbcbe75567c9e3efd0e
                                        • Instruction ID: acba72113e8ae0bca1954bbcf2b0ac40ba652e9f02af4ef0fe61dd1d915a7ed3
                                        • Opcode Fuzzy Hash: 8cc2bb000a9b313e3208789a9764acda6e9b72d4ee3d1dbcbe75567c9e3efd0e
                                        • Instruction Fuzzy Hash: 4E01FB70800229DFDB14DF6AC9043EEBAF2BF48351F148229E824EA290D7794A40CFD0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8c6a4965b86384babe6154ac1679365d1320fa57c7ac85cf0279e3be3ff4e5f2
                                        • Instruction ID: ee04f77ed1466fc1a28185109f3aaf735b6aa1bafd1771856b03f3374da35fff
                                        • Opcode Fuzzy Hash: 8c6a4965b86384babe6154ac1679365d1320fa57c7ac85cf0279e3be3ff4e5f2
                                        • Instruction Fuzzy Hash: E9E03972B001286F93049AAED884C6BBBEDEBCC660361807AF508D7310DA319C0186A0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ecce62f45973d392c067e5a532295e07dfccb0c36b5bdb27cdeca1730531030d
                                        • Instruction ID: 1751c80e8d47294103b451f59efee644310675059f75a4876eec1f9e15673898
                                        • Opcode Fuzzy Hash: ecce62f45973d392c067e5a532295e07dfccb0c36b5bdb27cdeca1730531030d
                                        • Instruction Fuzzy Hash: 13F0A075945629EFD300DF789945AAEBFF5AF09200F1084A9D044D7311D7714A45CBE2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e8abbbc882ff16b414de2bbca42afce2208fdb556cee84365845a8c9bfd16c0a
                                        • Instruction ID: c601df1f6553d87d535c9a66d689d71cd01f4ad64bdde9d29914eb858d960c95
                                        • Opcode Fuzzy Hash: e8abbbc882ff16b414de2bbca42afce2208fdb556cee84365845a8c9bfd16c0a
                                        • Instruction Fuzzy Hash: 19F0DAB0D0431EDFDB48DFA9D845AAEBBF4EB48601F1085A9D918E7341EB7495448BD0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b74a51062e5a47eddd3163f9a964df876996bd28fe814f62fc4de374a29c948d
                                        • Instruction ID: d571b5b997f5877fbd6d4d5c4ffe5fefe174f30d92be681344803952405e829c
                                        • Opcode Fuzzy Hash: b74a51062e5a47eddd3163f9a964df876996bd28fe814f62fc4de374a29c948d
                                        • Instruction Fuzzy Hash: 22F0C4B4A05228EFDB519FA4C844BEEBBF5BB0A305F108499E149A6251DB341A898F52
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7ee5b9df95621504cc95d77bba01db20f9bc0d1bd76310f7701e5341b526cf7
                                        • Instruction ID: 156d229f866084c25be75a567e737b2e9d642bf8cd7c7e11319d751c665d5fd5
                                        • Opcode Fuzzy Hash: c7ee5b9df95621504cc95d77bba01db20f9bc0d1bd76310f7701e5341b526cf7
                                        • Instruction Fuzzy Hash: 16E01A762009246BC714EE5EE8116EABBABEFD4720B14812AE849D3350DA35A91286D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cadb581365acf63ae5a15e98e8cf6ac3a492cf538604a74ba668b7cc04bae7b4
                                        • Instruction ID: 023b532072f0f133ed61b64e48a61d76804c946a816587b08383ce1f9b3a8ec5
                                        • Opcode Fuzzy Hash: cadb581365acf63ae5a15e98e8cf6ac3a492cf538604a74ba668b7cc04bae7b4
                                        • Instruction Fuzzy Hash: 4FD01236300924578B18AA1EA80489EFB9BDFC5721714C13BE80DC7350CE75590286D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e97723fd14025f068e07b2c04beb1101ec94c25310129f9d933b3552d6456a44
                                        • Instruction ID: 7794ace8a78ae7a9620dfdbfd07304bf518d1043a835776c96df18233981b56b
                                        • Opcode Fuzzy Hash: e97723fd14025f068e07b2c04beb1101ec94c25310129f9d933b3552d6456a44
                                        • Instruction Fuzzy Hash: 4BD05B3004B394DFD3132B64B8592F17F746703212F44459BF548D1D52961A55ACD7E6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c13b9fc2b40153267f5d25c96ef48fea6b143e6b7b7ed9c66a9405738048664a
                                        • Instruction ID: e19471d789ff1dddb8ea9fcddcb5ddedfa2befb927d36b1669728df09ec61f60
                                        • Opcode Fuzzy Hash: c13b9fc2b40153267f5d25c96ef48fea6b143e6b7b7ed9c66a9405738048664a
                                        • Instruction Fuzzy Hash: 75D05E70A093618FD7361B60981A3507B70FB62242F6600A7D142C6992E7654418CBAA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 300f6ce34fc59830195cbb9848a6b514384b381b9b9fb2b0779355fec94dc703
                                        • Instruction ID: ea748e6ed90917cd5e341bed7e19b4bfb3f8be628588545ebff78e063389b4cc
                                        • Opcode Fuzzy Hash: 300f6ce34fc59830195cbb9848a6b514384b381b9b9fb2b0779355fec94dc703
                                        • Instruction Fuzzy Hash: 31D09E35A4611DDFCB10DB58E9417E8B779EB85315F0011A2D60D96115DB311A55CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 560f963db2bbe4d684a886b6e2993446ff423dd3cd039756b4e5ad6279598797
                                        • Instruction ID: 5b28351edeb91865b488935725cca737a8c7f9a8f2b38bedae8b1a476a632d36
                                        • Opcode Fuzzy Hash: 560f963db2bbe4d684a886b6e2993446ff423dd3cd039756b4e5ad6279598797
                                        • Instruction Fuzzy Hash: F2D0126A10E3D0AEE2132A3428928A0BF60DE67A00F680CDFE6D4C6853C01814DEC323
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 005f63a356a0a95b83da17ca60c989488213ca0a0d974ed9600a2a3771ccbbf2
                                        • Instruction ID: f620e8396129b876f3d9475272fb2af28c3438fac6afe6123e1e57c9f5fd13b3
                                        • Opcode Fuzzy Hash: 005f63a356a0a95b83da17ca60c989488213ca0a0d974ed9600a2a3771ccbbf2
                                        • Instruction Fuzzy Hash: 24B012E3880F295BCD402261EC4FBE27B6CD388112F448DB3E00E84EC3DD1AE103484A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cc7fb54848cb42fa9c4f1ff7fdb3f2b801ef5090584629ef5d554f098904a7a0
                                        • Instruction ID: 5b6ad097ad9bdda1d9b6e703464afe063b51bcb005b752ee7824fcae0cc245bf
                                        • Opcode Fuzzy Hash: cc7fb54848cb42fa9c4f1ff7fdb3f2b801ef5090584629ef5d554f098904a7a0
                                        • Instruction Fuzzy Hash: 0DC08C30042614CBC2002BA8F80D3F437A8A702313F401019E20D80551AB6A7068EAD5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 87aa4a197e5504e8611a40a18c10d5259af6d212e4aff080ba5df6c55ee79a76
                                        • Instruction ID: 354de37fe0ddd43bffbafeddecc1fff0afee4bc716c2d2a167304d27b69b381c
                                        • Opcode Fuzzy Hash: 87aa4a197e5504e8611a40a18c10d5259af6d212e4aff080ba5df6c55ee79a76
                                        • Instruction Fuzzy Hash: 3EC04CB1240620CFC718DF5DD048954B7F4FF48715B1105DAE159CB672C7B2D840CB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 108faaf896635c308f53e65548c4d70a27d2e7fad80b932133c888270f182220
                                        • Instruction ID: 24845f943a88867c9d1081b6a71d66e29a26550f6de155f07d6a24e3379f90c5
                                        • Opcode Fuzzy Hash: 108faaf896635c308f53e65548c4d70a27d2e7fad80b932133c888270f182220
                                        • Instruction Fuzzy Hash: BDB012BA9E4230B5400462784F50DBFA844FFB2703B509C21B304C0414C4698438D15B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6a4e4797799f0f9808207a1c387b021a02fa67b8cfdd82fc09337eac1c3a195b
                                        • Instruction ID: 6fddf92cb72ea0fea7046a0e32330a40a0dc71850e1b9b74f9799fb7ac0790e3
                                        • Opcode Fuzzy Hash: 6a4e4797799f0f9808207a1c387b021a02fa67b8cfdd82fc09337eac1c3a195b
                                        • Instruction Fuzzy Hash: 25B09230504274DFC3549F20C144AA837BABF4A206F4044D8E00A96212C776DC85CE40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f395f324cbae09c9cee9e79ba58d0e201094160120fc4be4298f0dc4934f8391
                                        • Instruction ID: db40004febd47a03a0473273cebf9bc9d695b63b8ed1098cc423ac8890c22f90
                                        • Opcode Fuzzy Hash: f395f324cbae09c9cee9e79ba58d0e201094160120fc4be4298f0dc4934f8391
                                        • Instruction Fuzzy Hash: B590023104461C8BC5802796784A5A5B75C9588516B904852A50D419826A6B65155995
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q
                                        • API String ID: 0-1007455737
                                        • Opcode ID: bcc537a56d08ba6e8a26de96abc6e6fc103a38190c25a3e4784c60533058825b
                                        • Instruction ID: 5cd073ca52bfd38d24ddab2ac3705ae3b1316b07bb147ec9c335340d8a690616
                                        • Opcode Fuzzy Hash: bcc537a56d08ba6e8a26de96abc6e6fc103a38190c25a3e4784c60533058825b
                                        • Instruction Fuzzy Hash: 76E1F570908769CFD7158F68E8412AABBB1FF42316F04826BD4B6DB7A2D3349941CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 586251c3b147e0ef6851a1f19dd665cdaa1338d81e8bda18ede2f5ddfa559c0d
                                        • Instruction ID: fe6925cf756c16b1d6db13dca010b834f724f78cb384220688496a8db8cfd013
                                        • Opcode Fuzzy Hash: 586251c3b147e0ef6851a1f19dd665cdaa1338d81e8bda18ede2f5ddfa559c0d
                                        • Instruction Fuzzy Hash: BCD19AF47006058FDBA9EB79C560BAEB7EAAF89700F144569D186DB390CF35E801CB52
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0c03637f92b0238fdb1d6903235f0a3c1aac6698f6098b32e6e13764a33757a6
                                        • Instruction ID: e3c1701eb8a93b206f86e69e2aa340e4ee79ce02b174ceee081a82e86650cf9b
                                        • Opcode Fuzzy Hash: 0c03637f92b0238fdb1d6903235f0a3c1aac6698f6098b32e6e13764a33757a6
                                        • Instruction Fuzzy Hash: 73E13EB4E0425A8FCB54DFA8C5809AEFBF2FF89305F248269E454AB355C731A941CF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a52bd76f0d250392121dad2ccdd153567fb6f146ad360682b58e289ca3e41689
                                        • Instruction ID: c579d88d7e16430e0078d0735dfec4fed9cf807638e8ed8501e3557273503e5d
                                        • Opcode Fuzzy Hash: a52bd76f0d250392121dad2ccdd153567fb6f146ad360682b58e289ca3e41689
                                        • Instruction Fuzzy Hash: C7E12CB4E102198FCB54DFA8C5809AEFBF2FF89305F248269D554AB356C731A981CF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e23b8e28e67f2ada34fedfe34a07e5b68435d4649fd9d5a24405af0cda3be2b8
                                        • Instruction ID: fac3890a5405dd1dea2fe1877ccb7846e43409d7e28d28a60808b631a8b340ee
                                        • Opcode Fuzzy Hash: e23b8e28e67f2ada34fedfe34a07e5b68435d4649fd9d5a24405af0cda3be2b8
                                        • Instruction Fuzzy Hash: 24E12BB4E0015A8FCB54DFA8C5809AEFBF2FF89305F248269E454AB356D731A941CF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23217f2e436a9fa9c20096a3fd7fba1219c99f657e33213ccfe036a6a1497b72
                                        • Instruction ID: 231e092d671cc0ce447a08cbcbf86ff53bcf898d2bd82f743560646423fc4d4d
                                        • Opcode Fuzzy Hash: 23217f2e436a9fa9c20096a3fd7fba1219c99f657e33213ccfe036a6a1497b72
                                        • Instruction Fuzzy Hash: 42E12DB4E001198FCB54DFA9C5809AEFBF2FF89305F248269D454AB356D731A942CF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 77d2f9bad34c6294d131c08657f531fa998d454de41f6a4bb93f888f47d0faf0
                                        • Instruction ID: 3a24c6acca3360fcae7c8be5adacfefc90ea20ddebde2c2b2f23c668690fa57d
                                        • Opcode Fuzzy Hash: 77d2f9bad34c6294d131c08657f531fa998d454de41f6a4bb93f888f47d0faf0
                                        • Instruction Fuzzy Hash: 1DE11BB4E001198FCB54EFA9C5809AEFBF2FF89305F248269D454AB356D731A981CF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 153d480daf89888a9f9d164ab3a2ed7c722c9c7767d99cfe5398d822c849f3a1
                                        • Instruction ID: e60aaa570d47b52e71fbd5e21e626d99426cb2b8c2641d1b13bd44fd914a1e27
                                        • Opcode Fuzzy Hash: 153d480daf89888a9f9d164ab3a2ed7c722c9c7767d99cfe5398d822c849f3a1
                                        • Instruction Fuzzy Hash: 23D11931D1465ACACB11EF78D950AEDB7B5FF95300F20979AE0097B214EB706AC9CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2051489930.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2860000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b993a694ef139eb6a83a0e3ecb4ca91a914aeb0842edc826e4dd4a9986462372
                                        • Instruction ID: 6ff53a72459864d59f3554f919c86512188073561ce17c86638768658142fe6d
                                        • Opcode Fuzzy Hash: b993a694ef139eb6a83a0e3ecb4ca91a914aeb0842edc826e4dd4a9986462372
                                        • Instruction Fuzzy Hash: 2AA1913AE002098FCF05DFB5D9449AEB7B2FF85305B19456AE906EB264DB31E916CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2592547003b51b7fc65ae057b9607ec8b0c71384af28b96ddc037ebacee391fe
                                        • Instruction ID: 1d4a0a99d42a054ec005316ef79c2e37320114e9363f3a77d792d19e69284d6f
                                        • Opcode Fuzzy Hash: 2592547003b51b7fc65ae057b9607ec8b0c71384af28b96ddc037ebacee391fe
                                        • Instruction Fuzzy Hash: 78D1E935D1065A8ACB11EF78D950AEDB7B5FF95300F10D79AE0097B214EB70AAC9CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 68ac55800daef8f797ae1b0a7b8f255820154388ccbcd0fb620ed28be1070e0a
                                        • Instruction ID: 0e01ebd40b7395229233d3d7e0a82285665265746736a0b39e068e78cdb777f2
                                        • Opcode Fuzzy Hash: 68ac55800daef8f797ae1b0a7b8f255820154388ccbcd0fb620ed28be1070e0a
                                        • Instruction Fuzzy Hash: 95513BB4E052198FCB14DFA9C9805AEFBF2BF89304F24C16AD518AB316D7319942CF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2058961926.0000000007080000.00000040.00000800.00020000.00000000.sdmp, Offset: 07080000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7080000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 659f7d10d499e8d019859d3bdf43f27fc53406061ab41c1341681a873fd288a6
                                        • Instruction ID: 7830bbeed3ad048d2ca0dc002c56f168404b08c65e7f2d417fe2527c78866aec
                                        • Opcode Fuzzy Hash: 659f7d10d499e8d019859d3bdf43f27fc53406061ab41c1341681a873fd288a6
                                        • Instruction Fuzzy Hash: BE513AB4E0521A8FCB54DFA9C5805AEFBF2BF89304F24816AD458AB316D7319942CF61
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q
                                        • API String ID: 0-692194742
                                        • Opcode ID: 96ba0628567360680fc981deb2d9c6c3114c172a6d8958a15594f6db35cee872
                                        • Instruction ID: 8d36d07b24228bea35d887c91e5000c54b23c7c7b57abd1495664c04fb43ed8e
                                        • Opcode Fuzzy Hash: 96ba0628567360680fc981deb2d9c6c3114c172a6d8958a15594f6db35cee872
                                        • Instruction Fuzzy Hash: 64317030A0010A8FCF0DEFB9E9919DD7BB5FF80604B11456AC045BB264DF356E0ACBA2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q
                                        • API String ID: 0-692194742
                                        • Opcode ID: 4e1374d30acea69dcd91cd87f858a25eecd902bedd45fa065060ba985abd2bbc
                                        • Instruction ID: dba0b2f2bbfaf5a619296d8c082e6753b6d0ce4753a8cd25330980447580a786
                                        • Opcode Fuzzy Hash: 4e1374d30acea69dcd91cd87f858a25eecd902bedd45fa065060ba985abd2bbc
                                        • Instruction Fuzzy Hash: 24311A30A0010A8FCF0DEFB9E9919ED7BB5FF84604B11456AD0557B264DF356E0A8BA2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2059082543.0000000008830000.00000040.00000800.00020000.00000000.sdmp, Offset: 08830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_8830000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR]q$LR]q$LR]q$LR]q$$]q$$]q
                                        • API String ID: 0-2875722158
                                        • Opcode ID: 132bb2eda9ddb636ca587428930921b499b25b1a6bc42e836947050c0c79ae08
                                        • Instruction ID: 1aac750ec45ac9df49ed3856a2d156f81ceb293ab5af65dd380e84729a9534dd
                                        • Opcode Fuzzy Hash: 132bb2eda9ddb636ca587428930921b499b25b1a6bc42e836947050c0c79ae08
                                        • Instruction Fuzzy Hash: 5AC10970E04228DFCB18DF98C584AADB7F2BF48306F158569E416AB355D734EC82CB91

                                        Execution Graph

                                        Execution Coverage:11.2%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:173
                                        Total number of Limit Nodes:20
                                        execution_graph 41189 f10848 41190 f1084e 41189->41190 41191 f1091b 41190->41191 41195 68b1cf0 41190->41195 41199 68b1d00 41190->41199 41203 f1138c 41190->41203 41196 68b1d0f 41195->41196 41207 68b14d4 41196->41207 41200 68b1d0f 41199->41200 41201 68b14d4 3 API calls 41200->41201 41202 68b1d30 41201->41202 41202->41190 41205 f11393 41203->41205 41204 f11488 41204->41190 41205->41204 41309 f17eb8 41205->41309 41208 68b14df 41207->41208 41211 68b2c34 41208->41211 41210 68b36b6 41210->41210 41212 68b2c3f 41211->41212 41213 68b3ddc 41212->41213 41216 68b5a5e 41212->41216 41220 68b5a60 41212->41220 41213->41210 41217 68b5a65 41216->41217 41218 68b5aa5 41217->41218 41224 68b5c10 41217->41224 41218->41213 41221 68b5a81 41220->41221 41222 68b5aa5 41221->41222 41223 68b5c10 3 API calls 41221->41223 41222->41213 41223->41222 41225 68b5c1d 41224->41225 41227 68b5c56 41225->41227 41228 68b495c 41225->41228 41227->41218 41229 68b4967 41228->41229 41231 68b5cc8 41229->41231 41232 68b4990 41229->41232 41233 68b499b 41232->41233 41239 68b49a0 41233->41239 41235 68b5d37 41243 68baf60 41235->41243 41251 68baf48 41235->41251 41236 68b5d71 41236->41231 41242 68b49ab 41239->41242 41240 68b6ed8 41240->41235 41241 68b5a60 3 API calls 41241->41240 41242->41240 41242->41241 41245 68bb091 41243->41245 41246 68baf91 41243->41246 41244 68baf9d 41244->41236 41245->41236 41246->41244 41247 68bafdd 41246->41247 41259 68bb1d8 41246->41259 41263 68bc4d8 41247->41263 41270 68bc4c9 41247->41270 41252 68baf91 41251->41252 41254 68bb091 41251->41254 41253 68baf9d 41252->41253 41255 68bafdd 41252->41255 41256 68bb1d8 3 API calls 41252->41256 41253->41236 41254->41236 41257 68bc4c9 GetModuleHandleW 41255->41257 41258 68bc4d8 GetModuleHandleW 41255->41258 41256->41255 41257->41254 41258->41254 41277 68bb218 41259->41277 41286 68bb228 41259->41286 41260 68bb1e2 41260->41247 41264 68bc503 41263->41264 41295 68bca30 41264->41295 41300 68bca40 41264->41300 41265 68bc586 41266 68ba17c GetModuleHandleW 41265->41266 41267 68bc5b2 41265->41267 41266->41267 41271 68bc4d8 41270->41271 41275 68bca30 GetModuleHandleW 41271->41275 41276 68bca40 GetModuleHandleW 41271->41276 41272 68bc586 41274 68bc5b2 41272->41274 41305 68ba17c 41272->41305 41275->41272 41276->41272 41278 68bb21d 41277->41278 41279 68ba17c GetModuleHandleW 41278->41279 41281 68bb25c 41278->41281 41280 68bb244 41279->41280 41280->41281 41285 68bb4b1 GetModuleHandleW 41280->41285 41281->41260 41282 68bb254 41282->41281 41283 68bb460 GetModuleHandleW 41282->41283 41284 68bb48d 41283->41284 41284->41260 41285->41282 41287 68bb239 41286->41287 41290 68bb25c 41286->41290 41288 68ba17c GetModuleHandleW 41287->41288 41289 68bb244 41288->41289 41289->41290 41294 68bb4b1 GetModuleHandleW 41289->41294 41290->41260 41291 68bb254 41291->41290 41292 68bb460 GetModuleHandleW 41291->41292 41293 68bb48d 41292->41293 41293->41260 41294->41291 41296 68bca40 41295->41296 41297 68bcaee 41296->41297 41298 68bcfa8 GetModuleHandleW 41296->41298 41299 68bcfb8 GetModuleHandleW 41296->41299 41298->41297 41299->41297 41301 68bca6d 41300->41301 41302 68bcaee 41301->41302 41303 68bcfa8 GetModuleHandleW 41301->41303 41304 68bcfb8 GetModuleHandleW 41301->41304 41303->41302 41304->41302 41306 68bb418 GetModuleHandleW 41305->41306 41308 68bb48d 41306->41308 41308->41274 41310 f17ec2 41309->41310 41311 f17edc 41310->41311 41314 68cfae0 41310->41314 41318 68cfad1 41310->41318 41311->41205 41316 68cfaf5 41314->41316 41315 68cfd06 41315->41311 41316->41315 41317 68cfd20 GlobalMemoryStatusEx 41316->41317 41317->41316 41319 68cfaf5 41318->41319 41320 68cfd06 41319->41320 41321 68cfd20 GlobalMemoryStatusEx 41319->41321 41320->41311 41321->41319 41116 68bb680 41117 68bb6c8 LoadLibraryExW 41116->41117 41118 68bb6c2 41116->41118 41119 68bb6f9 41117->41119 41118->41117 41322 68bd810 41323 68bd878 CreateWindowExW 41322->41323 41325 68bd934 41323->41325 41326 68b3050 DuplicateHandle 41327 68b30e6 41326->41327 41120 e8d044 41121 e8d05c 41120->41121 41122 e8d0b6 41121->41122 41128 68bda18 41121->41128 41133 68bcc44 41121->41133 41142 68bd9b7 41121->41142 41146 68be718 41121->41146 41155 68bd9c8 41121->41155 41129 68bda07 41128->41129 41130 68bda26 41128->41130 41131 68bcc44 CallWindowProcW 41129->41131 41130->41122 41132 68bda0f 41131->41132 41132->41122 41134 68bcc4f 41133->41134 41135 68be789 41134->41135 41137 68be779 41134->41137 41175 68bcd6c 41135->41175 41159 68be97c 41137->41159 41165 68be8b0 41137->41165 41170 68be8a0 41137->41170 41138 68be787 41143 68bd9c5 41142->41143 41144 68bda0f 41143->41144 41145 68bcc44 CallWindowProcW 41143->41145 41144->41122 41145->41144 41148 68be728 41146->41148 41147 68be789 41149 68bcd6c CallWindowProcW 41147->41149 41148->41147 41150 68be779 41148->41150 41151 68be787 41149->41151 41152 68be97c CallWindowProcW 41150->41152 41153 68be8a0 CallWindowProcW 41150->41153 41154 68be8b0 CallWindowProcW 41150->41154 41152->41151 41153->41151 41154->41151 41156 68bd9ee 41155->41156 41157 68bda0f 41156->41157 41158 68bcc44 CallWindowProcW 41156->41158 41157->41122 41158->41157 41160 68be93a 41159->41160 41161 68be98a 41159->41161 41179 68be958 41160->41179 41183 68be968 41160->41183 41162 68be950 41162->41138 41167 68be8b2 41165->41167 41166 68be950 41166->41138 41168 68be958 CallWindowProcW 41167->41168 41169 68be968 CallWindowProcW 41167->41169 41168->41166 41169->41166 41172 68be8ae 41170->41172 41171 68be950 41171->41138 41173 68be958 CallWindowProcW 41172->41173 41174 68be968 CallWindowProcW 41172->41174 41173->41171 41174->41171 41176 68bcd77 41175->41176 41177 68bfe6a CallWindowProcW 41176->41177 41178 68bfe19 41176->41178 41177->41178 41178->41138 41180 68be968 41179->41180 41181 68be979 41180->41181 41186 68bfdad 41180->41186 41181->41162 41184 68be979 41183->41184 41185 68bfdad CallWindowProcW 41183->41185 41184->41162 41185->41184 41187 68bcd6c CallWindowProcW 41186->41187 41188 68bfdba 41187->41188 41188->41181
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-3723351465
                                        • Opcode ID: 9fa13991097236663b38560556b08f86f66e5350801d3344b9c9a2f8d299d994
                                        • Instruction ID: 9e0670d8166ec2219298f3f30f5939607e774d283f0abe6c5a83d39ad07f9a94
                                        • Opcode Fuzzy Hash: 9fa13991097236663b38560556b08f86f66e5350801d3344b9c9a2f8d299d994
                                        • Instruction Fuzzy Hash: 41D25930E006098FDB64DF68C594A9DB7B2FF85314F54C56AE409EB2A5DB34ED86CB80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-3723351465
                                        • Opcode ID: d09f95f025d474de6bb3479e780f5aca365b649340a94fa62a5e0092933c0528
                                        • Instruction ID: 2eb89283f59e791ad122ed7f7a711d75ca497120c7b3a4bc0dad7c744268889a
                                        • Opcode Fuzzy Hash: d09f95f025d474de6bb3479e780f5aca365b649340a94fa62a5e0092933c0528
                                        • Instruction Fuzzy Hash: AC527130E006098FDF64CFA8D581BAEB7B6EF85320F10882AE549EB355DA35DD45CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2390 68c7e08-68c7e26 2391 68c7e28-68c7e2b 2390->2391 2392 68c7e4c-68c7e4f 2391->2392 2393 68c7e2d-68c7e47 2391->2393 2394 68c7e51-68c7e6d 2392->2394 2395 68c7e72-68c7e75 2392->2395 2393->2392 2394->2395 2396 68c7e77-68c7e81 2395->2396 2397 68c7e82-68c7e85 2395->2397 2400 68c7e9c-68c7e9e 2397->2400 2401 68c7e87-68c7e95 2397->2401 2402 68c7ea5-68c7ea8 2400->2402 2403 68c7ea0 2400->2403 2405 68c7eae-68c7ec4 2401->2405 2408 68c7e97 2401->2408 2402->2391 2402->2405 2403->2402 2410 68c80df-68c80e9 2405->2410 2411 68c7eca-68c7ed3 2405->2411 2408->2400 2412 68c7ed9-68c7ef6 2411->2412 2413 68c80ea-68c80fc 2411->2413 2422 68c80cc-68c80d9 2412->2422 2423 68c7efc-68c7f24 2412->2423 2416 68c80fe-68c810e 2413->2416 2417 68c8113-68c811f 2413->2417 2416->2417 2419 68c8121-68c8124 2417->2419 2420 68c812a-68c8136 2419->2420 2421 68c81d1-68c81d4 2419->2421 2426 68c8141-68c8143 2420->2426 2424 68c81d6-68c81f2 2421->2424 2425 68c81f7-68c81fa 2421->2425 2422->2410 2422->2411 2423->2422 2444 68c7f2a-68c7f33 2423->2444 2424->2425 2427 68c842f-68c8431 2425->2427 2428 68c8200-68c820f 2425->2428 2430 68c815b-68c815f 2426->2430 2431 68c8145-68c814b 2426->2431 2433 68c8438-68c843b 2427->2433 2434 68c8433 2427->2434 2442 68c822e-68c8272 2428->2442 2443 68c8211-68c822c 2428->2443 2437 68c816d 2430->2437 2438 68c8161-68c816b 2430->2438 2435 68c814d 2431->2435 2436 68c814f-68c8151 2431->2436 2433->2419 2439 68c8441-68c844a 2433->2439 2434->2433 2435->2430 2436->2430 2445 68c8172-68c8174 2437->2445 2438->2445 2453 68c8278-68c8289 2442->2453 2454 68c8403-68c8419 2442->2454 2443->2442 2444->2413 2447 68c7f39-68c7f55 2444->2447 2448 68c818b-68c81c4 2445->2448 2449 68c8176-68c8179 2445->2449 2458 68c80ba-68c80c6 2447->2458 2459 68c7f5b-68c7f85 2447->2459 2448->2428 2471 68c81c6-68c81d0 2448->2471 2449->2439 2464 68c83ee-68c83fd 2453->2464 2465 68c828f-68c82ac 2453->2465 2454->2427 2458->2422 2458->2444 2475 68c7f8b-68c7fb3 2459->2475 2476 68c80b0-68c80b5 2459->2476 2464->2453 2464->2454 2465->2464 2474 68c82b2-68c83a8 call 68c6628 2465->2474 2525 68c83aa-68c83b4 2474->2525 2526 68c83b6 2474->2526 2475->2476 2482 68c7fb9-68c7fe7 2475->2482 2476->2458 2482->2476 2487 68c7fed-68c7ff6 2482->2487 2487->2476 2489 68c7ffc-68c802e 2487->2489 2497 68c8039-68c8055 2489->2497 2498 68c8030-68c8034 2489->2498 2497->2458 2499 68c8057-68c80ae call 68c6628 2497->2499 2498->2476 2500 68c8036 2498->2500 2499->2458 2500->2497 2527 68c83bb-68c83bd 2525->2527 2526->2527 2527->2464 2528 68c83bf-68c83c4 2527->2528 2529 68c83c6-68c83d0 2528->2529 2530 68c83d2 2528->2530 2531 68c83d7-68c83d9 2529->2531 2530->2531 2531->2464 2532 68c83db-68c83e7 2531->2532 2532->2464
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q
                                        • API String ID: 0-127220927
                                        • Opcode ID: a13b966355699a7587cf6785a9adf9283b9d1c23cd7590dfaec4d3f2145d88d0
                                        • Instruction ID: be104c11aed1488dbcb4805db96b7460a1a9564dd5ec844241bfe47cdf94e503
                                        • Opcode Fuzzy Hash: a13b966355699a7587cf6785a9adf9283b9d1c23cd7590dfaec4d3f2145d88d0
                                        • Instruction Fuzzy Hash: 43028D31B002058FDB54DF68E490AAEBBE6FF84324F148529D50ADB395DB35ED46CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $
                                        • API String ID: 0-3993045852
                                        • Opcode ID: c7e49b446a6782806768e3ebfb84308e8063c43e8929a9cae2e57a7020a5cbd1
                                        • Instruction ID: 7273d9ef89b3f36d6d61ae03a78ffc0004ec360e16c808d18b3cdf39c39cb57e
                                        • Opcode Fuzzy Hash: c7e49b446a6782806768e3ebfb84308e8063c43e8929a9cae2e57a7020a5cbd1
                                        • Instruction Fuzzy Hash: 9C22D275E002058FDF60CBA4D4806AEBBF2EF84320F14856AD649EB355DA30ED55CB92
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fbe64d996e942322b31d33b993c118d4fc28d6b4755a1bf5cae726b5cffd706e
                                        • Instruction ID: 4d655bcaf1d4ec10ebbacc8d777d13ad97b49911af8033d26bb2ce5c47972c70
                                        • Opcode Fuzzy Hash: fbe64d996e942322b31d33b993c118d4fc28d6b4755a1bf5cae726b5cffd706e
                                        • Instruction Fuzzy Hash: B2629E34B002058FDB54DB68D594AADB7F2EF84324F148479E50AEB395EB35EC86CB81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 290106fe5c97b7aaaa0cf0e6cc9231b47cf4765e3bad6f57a54a755210210d97
                                        • Instruction ID: d7f6f208cfd8d64f5067a0685dedfdf171dd43601eb8373d5447a0c466cf98d3
                                        • Opcode Fuzzy Hash: 290106fe5c97b7aaaa0cf0e6cc9231b47cf4765e3bad6f57a54a755210210d97
                                        • Instruction Fuzzy Hash: 06329F31B002098FDB54DFA8D990BAEB7B2FB88324F109529E509E7355DB35EC46CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 526 68cad60-68cad7e 527 68cad80-68cad83 526->527 528 68cad85-68cad92 527->528 529 68cad97-68cad9a 527->529 528->529 530 68cad9c-68cada0 529->530 531 68cadab-68cadae 529->531 533 68caf8c-68caf96 530->533 534 68cada6 530->534 535 68caf7d-68caf86 531->535 536 68cadb4-68cadb7 531->536 534->531 535->533 539 68cadf2-68cadfb 535->539 537 68cadb9-68cadd5 536->537 538 68cadda-68caddd 536->538 537->538 542 68caded-68cadf0 538->542 543 68caddf-68cade8 538->543 540 68caf97-68cafce 539->540 541 68cae01-68cae05 539->541 557 68cafd0-68cafd3 540->557 544 68cae0a-68cae0d 541->544 542->539 542->544 543->542 546 68cae0f-68cae22 544->546 547 68cae27-68cae2a 544->547 546->547 550 68cae2c-68cae31 547->550 551 68cae34-68cae36 547->551 550->551 555 68cae3d-68cae40 551->555 556 68cae38 551->556 555->527 558 68cae46-68cae6a 555->558 556->555 559 68cafd5-68cafd9 557->559 560 68cafe0-68cafe3 557->560 573 68caf7a 558->573 574 68cae70-68cae7f 558->574 561 68cafdb 559->561 562 68cb031-68cb06c 559->562 563 68cafe5 560->563 564 68caff2-68caff5 560->564 561->560 576 68cb25f-68cb272 562->576 577 68cb072-68cb07e 562->577 652 68cafe5 call 68cb2c8 563->652 653 68cafe5 call 68cb2bb 563->653 566 68caff7-68cb001 564->566 567 68cb002-68cb005 564->567 571 68cb028-68cb02b 567->571 572 68cb007-68cb023 567->572 570 68cafeb-68cafed 570->564 571->562 575 68cb294-68cb296 571->575 572->571 573->535 587 68cae97-68caed2 call 68c6628 574->587 588 68cae81-68cae87 574->588 580 68cb29d-68cb2a0 575->580 581 68cb298 575->581 579 68cb274 576->579 589 68cb09e-68cb0e2 577->589 590 68cb080-68cb099 577->590 579->575 580->557 585 68cb2a6-68cb2b0 580->585 581->580 604 68caeea-68caf01 587->604 605 68caed4-68caeda 587->605 591 68cae89 588->591 592 68cae8b-68cae8d 588->592 606 68cb0fe-68cb13d 589->606 607 68cb0e4-68cb0f6 589->607 590->579 591->587 592->587 619 68caf19-68caf2a 604->619 620 68caf03-68caf09 604->620 608 68caedc 605->608 609 68caede-68caee0 605->609 613 68cb224-68cb239 606->613 614 68cb143-68cb21e call 68c6628 606->614 607->606 608->604 609->604 613->576 614->613 626 68caf2c-68caf32 619->626 627 68caf42-68caf73 619->627 622 68caf0d-68caf0f 620->622 623 68caf0b 620->623 622->619 623->619 629 68caf34 626->629 630 68caf36-68caf38 626->630 627->573 629->627 630->627 652->570 653->570
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: XM$XM$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-1012131581
                                        • Opcode ID: d77799249f5c70b98f1492205cd2725b389eec082e5d01e8713ef005a22a1723
                                        • Instruction ID: cf7ad0d64c07fd8e71ae07c1b6275b7f496f61d3c5c91a8dab0c8b135bb08ba0
                                        • Opcode Fuzzy Hash: d77799249f5c70b98f1492205cd2725b389eec082e5d01e8713ef005a22a1723
                                        • Instruction Fuzzy Hash: 12E1A030E102098FCB68DFA8D8916AEB7B6EF85314F10852DE909EB354DB75DC46CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1385 68bb228-68bb237 1386 68bb239-68bb246 call 68ba17c 1385->1386 1387 68bb263-68bb267 1385->1387 1394 68bb248-68bb256 call 68bb4b1 1386->1394 1395 68bb25c 1386->1395 1388 68bb27b-68bb2bc 1387->1388 1389 68bb269-68bb273 1387->1389 1396 68bb2c9-68bb2d7 1388->1396 1397 68bb2be-68bb2c6 1388->1397 1389->1388 1394->1395 1404 68bb398-68bb458 1394->1404 1395->1387 1398 68bb2fb-68bb2fd 1396->1398 1399 68bb2d9-68bb2de 1396->1399 1397->1396 1401 68bb300-68bb307 1398->1401 1402 68bb2e9 1399->1402 1403 68bb2e0-68bb2e7 call 68ba188 1399->1403 1405 68bb309-68bb311 1401->1405 1406 68bb314-68bb31b 1401->1406 1408 68bb2eb-68bb2f9 1402->1408 1403->1408 1436 68bb45a-68bb45d 1404->1436 1437 68bb460-68bb48b GetModuleHandleW 1404->1437 1405->1406 1409 68bb328-68bb331 call 68b399c 1406->1409 1410 68bb31d-68bb325 1406->1410 1408->1401 1416 68bb33e-68bb343 1409->1416 1417 68bb333-68bb33b 1409->1417 1410->1409 1418 68bb361-68bb36e 1416->1418 1419 68bb345-68bb34c 1416->1419 1417->1416 1425 68bb391-68bb397 1418->1425 1426 68bb370-68bb38e 1418->1426 1419->1418 1421 68bb34e-68bb35e call 68b9ff8 call 68ba198 1419->1421 1421->1418 1426->1425 1436->1437 1438 68bb48d-68bb493 1437->1438 1439 68bb494-68bb4a8 1437->1439 1438->1439
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248872482.00000000068B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68b0000_Payment List.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID: |b$|b
                                        • API String ID: 4139908857-2757074553
                                        • Opcode ID: b0461b4a9e7e662f918641b1b4137e59390a214dfe0df0a49d0ceb2788ee38a3
                                        • Instruction ID: 59dc2305c8547ebbbe5797d58fea698fdd4ad20c9ed3abeac639b8469d6866aa
                                        • Opcode Fuzzy Hash: b0461b4a9e7e662f918641b1b4137e59390a214dfe0df0a49d0ceb2788ee38a3
                                        • Instruction Fuzzy Hash: 12812170A00B058FD7A4DF6AD4447AABBF1FF88204F009A29D59AD7B50DB74E849CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1442 68c91d8-68c91fd 1443 68c91ff-68c9202 1442->1443 1444 68c9208-68c921d 1443->1444 1445 68c9ac0-68c9ac3 1443->1445 1452 68c921f-68c9225 1444->1452 1453 68c9235-68c924b 1444->1453 1446 68c9ae9-68c9aeb 1445->1446 1447 68c9ac5-68c9ae4 1445->1447 1448 68c9aed 1446->1448 1449 68c9af2-68c9af5 1446->1449 1447->1446 1448->1449 1449->1443 1451 68c9afb-68c9b05 1449->1451 1455 68c9229-68c922b 1452->1455 1456 68c9227 1452->1456 1459 68c9256-68c9258 1453->1459 1455->1453 1456->1453 1460 68c925a-68c9260 1459->1460 1461 68c9270-68c92e1 1459->1461 1462 68c9264-68c9266 1460->1462 1463 68c9262 1460->1463 1472 68c930d-68c9329 1461->1472 1473 68c92e3-68c9306 1461->1473 1462->1461 1463->1461 1478 68c932b-68c934e 1472->1478 1479 68c9355-68c9370 1472->1479 1473->1472 1478->1479 1484 68c939b-68c93b6 1479->1484 1485 68c9372-68c9394 1479->1485 1490 68c93b8-68c93d4 1484->1490 1491 68c93db-68c93e9 1484->1491 1485->1484 1490->1491 1492 68c93f9-68c9473 1491->1492 1493 68c93eb-68c93f4 1491->1493 1499 68c9475-68c9493 1492->1499 1500 68c94c0-68c94d5 1492->1500 1493->1451 1504 68c94af-68c94be 1499->1504 1505 68c9495-68c94a4 1499->1505 1500->1445 1504->1499 1504->1500 1505->1504
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q
                                        • API String ID: 0-858218434
                                        • Opcode ID: 4533c0880f548e01b5b4b3d2e27edc815a1f2552a3f7a2098f6059d6ef1c3141
                                        • Instruction ID: de5680d7fd12f0aba8b8087f58eb6185c9a29fd043220694324ce6ef02d76d9c
                                        • Opcode Fuzzy Hash: 4533c0880f548e01b5b4b3d2e27edc815a1f2552a3f7a2098f6059d6ef1c3141
                                        • Instruction Fuzzy Hash: 44914E31B0021A9FDB54DF69D8507AEB3F6BB84314F1084A9D91DEB348EB70DD468B91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1508 68ccfe8-68cd003 1509 68cd005-68cd008 1508->1509 1510 68cd00a-68cd00f 1509->1510 1511 68cd012-68cd015 1509->1511 1510->1511 1512 68cd017-68cd02d 1511->1512 1513 68cd032-68cd035 1511->1513 1512->1513 1514 68cd07e-68cd081 1513->1514 1515 68cd037-68cd046 1513->1515 1519 68cd4d4-68cd4e0 1514->1519 1520 68cd087-68cd08a 1514->1520 1517 68cd048-68cd04d 1515->1517 1518 68cd055-68cd061 1515->1518 1517->1518 1521 68cda05-68cda3e 1518->1521 1522 68cd067-68cd079 1518->1522 1519->1515 1525 68cd4e6-68cd7d3 1519->1525 1523 68cd08c-68cd09b 1520->1523 1524 68cd0d3-68cd0d6 1520->1524 1538 68cda40-68cda43 1521->1538 1522->1514 1529 68cd09d-68cd0a2 1523->1529 1530 68cd0aa-68cd0b6 1523->1530 1527 68cd11f-68cd122 1524->1527 1528 68cd0d8-68cd11a 1524->1528 1720 68cd7d9-68cd7df 1525->1720 1721 68cd9fa-68cda04 1525->1721 1532 68cd16b-68cd16e 1527->1532 1533 68cd124-68cd166 1527->1533 1528->1527 1529->1530 1530->1521 1534 68cd0bc-68cd0ce 1530->1534 1539 68cd170-68cd18c 1532->1539 1540 68cd191-68cd194 1532->1540 1533->1532 1534->1524 1546 68cda45-68cda71 1538->1546 1547 68cda76-68cda79 1538->1547 1539->1540 1544 68cd1dd-68cd1e0 1540->1544 1545 68cd196-68cd1d8 1540->1545 1551 68cd1ef-68cd1f2 1544->1551 1552 68cd1e2-68cd1e4 1544->1552 1545->1544 1546->1547 1549 68cda88-68cda8b 1547->1549 1550 68cda7b 1547->1550 1556 68cda8d-68cdaa9 1549->1556 1557 68cdaae-68cdab0 1549->1557 1767 68cda7b call 68cdb5d 1550->1767 1768 68cda7b call 68cdb70 1550->1768 1558 68cd23b-68cd23e 1551->1558 1559 68cd1f4-68cd236 1551->1559 1554 68cd38f-68cd398 1552->1554 1555 68cd1ea 1552->1555 1565 68cd39a-68cd39f 1554->1565 1566 68cd3a7-68cd3b3 1554->1566 1555->1551 1556->1557 1567 68cdab7-68cdaba 1557->1567 1568 68cdab2 1557->1568 1570 68cd287-68cd28a 1558->1570 1571 68cd240-68cd282 1558->1571 1559->1558 1563 68cda81-68cda83 1563->1549 1565->1566 1574 68cd3b9-68cd3cd 1566->1574 1575 68cd4c4-68cd4c9 1566->1575 1567->1538 1577 68cdabc-68cdacb 1567->1577 1568->1567 1580 68cd28c-68cd2ce 1570->1580 1581 68cd2d3-68cd2d6 1570->1581 1571->1570 1589 68cd4d1 1574->1589 1599 68cd3d3-68cd3e5 1574->1599 1575->1589 1600 68cdacd-68cdb30 call 68c6628 1577->1600 1601 68cdb32-68cdb47 1577->1601 1580->1581 1582 68cd2d8-68cd2da 1581->1582 1583 68cd2e5-68cd2e8 1581->1583 1588 68cd2e0 1582->1588 1582->1589 1590 68cd2ea-68cd32c 1583->1590 1591 68cd331-68cd334 1583->1591 1588->1583 1589->1519 1590->1591 1603 68cd37d-68cd37f 1591->1603 1604 68cd336-68cd378 1591->1604 1622 68cd409-68cd40b 1599->1622 1623 68cd3e7-68cd3ed 1599->1623 1600->1601 1606 68cd386-68cd389 1603->1606 1607 68cd381 1603->1607 1604->1603 1606->1509 1606->1554 1607->1606 1632 68cd415-68cd421 1622->1632 1627 68cd3ef 1623->1627 1628 68cd3f1-68cd3fd 1623->1628 1636 68cd3ff-68cd407 1627->1636 1628->1636 1647 68cd42f 1632->1647 1648 68cd423-68cd42d 1632->1648 1636->1632 1649 68cd434-68cd436 1647->1649 1648->1649 1649->1589 1654 68cd43c-68cd458 call 68c6628 1649->1654 1664 68cd45a-68cd45f 1654->1664 1665 68cd467-68cd473 1654->1665 1664->1665 1665->1575 1667 68cd475-68cd4c2 1665->1667 1667->1589 1722 68cd7ee-68cd7f7 1720->1722 1723 68cd7e1-68cd7e6 1720->1723 1722->1521 1724 68cd7fd-68cd810 1722->1724 1723->1722 1726 68cd9ea-68cd9f4 1724->1726 1727 68cd816-68cd81c 1724->1727 1726->1720 1726->1721 1728 68cd81e-68cd823 1727->1728 1729 68cd82b-68cd834 1727->1729 1728->1729 1729->1521 1730 68cd83a-68cd85b 1729->1730 1733 68cd85d-68cd862 1730->1733 1734 68cd86a-68cd873 1730->1734 1733->1734 1734->1521 1735 68cd879-68cd896 1734->1735 1735->1726 1738 68cd89c-68cd8a2 1735->1738 1738->1521 1739 68cd8a8-68cd8c1 1738->1739 1741 68cd9dd-68cd9e4 1739->1741 1742 68cd8c7-68cd8ee 1739->1742 1741->1726 1741->1738 1742->1521 1745 68cd8f4-68cd8fe 1742->1745 1745->1521 1746 68cd904-68cd91b 1745->1746 1748 68cd91d-68cd928 1746->1748 1749 68cd92a-68cd945 1746->1749 1748->1749 1749->1741 1754 68cd94b-68cd964 call 68c6628 1749->1754 1758 68cd966-68cd96b 1754->1758 1759 68cd973-68cd97c 1754->1759 1758->1759 1759->1521 1760 68cd982-68cd9d6 1759->1760 1760->1741 1767->1563 1768->1563
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q
                                        • API String ID: 0-182748909
                                        • Opcode ID: a25035705a8b701a1838bfb214dfd7fc2f7d1f71a2c74a3029853ecae617ec15
                                        • Instruction ID: caee09aedfd6f8df0686b48b0bfef3ebf98cf15e0d771a107302d53465e56c82
                                        • Opcode Fuzzy Hash: a25035705a8b701a1838bfb214dfd7fc2f7d1f71a2c74a3029853ecae617ec15
                                        • Instruction Fuzzy Hash: 2A622C3460020A8FCB55EF68E580A5DB7E6FF84314B20CA79D009DF269EB75ED46CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1769 68c4c08-68c4c2c 1770 68c4c2e-68c4c31 1769->1770 1771 68c4c52-68c4c55 1770->1771 1772 68c4c33-68c4c4d 1770->1772 1773 68c4c5b-68c4d53 1771->1773 1774 68c5334-68c5336 1771->1774 1772->1771 1792 68c4d59-68c4da1 1773->1792 1793 68c4dd6-68c4ddd 1773->1793 1775 68c533d-68c5340 1774->1775 1776 68c5338 1774->1776 1775->1770 1778 68c5346-68c5353 1775->1778 1776->1775 1814 68c4da6 call 68c54c0 1792->1814 1815 68c4da6 call 68c54b1 1792->1815 1794 68c4e61-68c4e6a 1793->1794 1795 68c4de3-68c4e53 1793->1795 1794->1778 1812 68c4e5e 1795->1812 1813 68c4e55 1795->1813 1806 68c4dac-68c4dc8 1809 68c4dca 1806->1809 1810 68c4dd3 1806->1810 1809->1810 1810->1793 1812->1794 1813->1812 1814->1806 1815->1806
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fbq$XPbq$\Obq
                                        • API String ID: 0-4057264190
                                        • Opcode ID: dcebd90075e4cdd238034a5a0d9097105bab96fe83b0b461efad299b20a88738
                                        • Instruction ID: 5dbec4610cebcdb894e7c636ba0a17b9c17e954f3ccb93760ae579999faf7e7a
                                        • Opcode Fuzzy Hash: dcebd90075e4cdd238034a5a0d9097105bab96fe83b0b461efad299b20a88738
                                        • Instruction Fuzzy Hash: CA617E30F002099FEB549FA4C8557AEBBF6EF88710F208429E50AEB395DF759C458B91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2890 68c91d6-68c91fd 2891 68c91ff-68c9202 2890->2891 2892 68c9208-68c921d 2891->2892 2893 68c9ac0-68c9ac3 2891->2893 2900 68c921f-68c9225 2892->2900 2901 68c9235-68c924b 2892->2901 2894 68c9ae9-68c9aeb 2893->2894 2895 68c9ac5-68c9ae4 2893->2895 2896 68c9aed 2894->2896 2897 68c9af2-68c9af5 2894->2897 2895->2894 2896->2897 2897->2891 2899 68c9afb-68c9b05 2897->2899 2903 68c9229-68c922b 2900->2903 2904 68c9227 2900->2904 2907 68c9256-68c9258 2901->2907 2903->2901 2904->2901 2908 68c925a-68c9260 2907->2908 2909 68c9270-68c92e1 2907->2909 2910 68c9264-68c9266 2908->2910 2911 68c9262 2908->2911 2920 68c930d-68c9329 2909->2920 2921 68c92e3-68c9306 2909->2921 2910->2909 2911->2909 2926 68c932b-68c934e 2920->2926 2927 68c9355-68c9370 2920->2927 2921->2920 2926->2927 2932 68c939b-68c93b6 2927->2932 2933 68c9372-68c9394 2927->2933 2938 68c93b8-68c93d4 2932->2938 2939 68c93db-68c93e9 2932->2939 2933->2932 2938->2939 2940 68c93f9-68c9473 2939->2940 2941 68c93eb-68c93f4 2939->2941 2947 68c9475-68c9493 2940->2947 2948 68c94c0-68c94d5 2940->2948 2941->2899 2952 68c94af-68c94be 2947->2952 2953 68c9495-68c94a4 2947->2953 2948->2893 2952->2947 2952->2948 2953->2952
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q
                                        • API String ID: 0-127220927
                                        • Opcode ID: d2f055399051c73479cbba2d28084902bfcc12cab7a1617bb4b5e4560443b8ba
                                        • Instruction ID: f9f55c97fc305d659eb2db965bbbcc1109a18befe7c7bd0db8a26ea3d50adce6
                                        • Opcode Fuzzy Hash: d2f055399051c73479cbba2d28084902bfcc12cab7a1617bb4b5e4560443b8ba
                                        • Instruction Fuzzy Hash: E0514F31B001059FDF58DB78D8A0BAEB3F6AB88714F10846AD51DEB398DA71DC068B91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2956 68c4bf8-68c4c2c 2957 68c4c2e-68c4c31 2956->2957 2958 68c4c52-68c4c55 2957->2958 2959 68c4c33-68c4c4d 2957->2959 2960 68c4c5b-68c4d53 2958->2960 2961 68c5334-68c5336 2958->2961 2959->2958 2979 68c4d59-68c4da1 2960->2979 2980 68c4dd6-68c4ddd 2960->2980 2962 68c533d-68c5340 2961->2962 2963 68c5338 2961->2963 2962->2957 2965 68c5346-68c5353 2962->2965 2963->2962 3001 68c4da6 call 68c54c0 2979->3001 3002 68c4da6 call 68c54b1 2979->3002 2981 68c4e61-68c4e6a 2980->2981 2982 68c4de3-68c4e53 2980->2982 2981->2965 2999 68c4e5e 2982->2999 3000 68c4e55 2982->3000 2993 68c4dac-68c4dc8 2996 68c4dca 2993->2996 2997 68c4dd3 2993->2997 2996->2997 2997->2980 2999->2981 3000->2999 3001->2993 3002->2993
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fbq$XPbq
                                        • API String ID: 0-2292610095
                                        • Opcode ID: d907534907ca666e0a2d772526a63dac7f8d7e9a18347d66590ae768e637d210
                                        • Instruction ID: bbc429d037a48b62fc97f8d30945cc6ecae764cf870ad12a7166be64b16f02e1
                                        • Opcode Fuzzy Hash: d907534907ca666e0a2d772526a63dac7f8d7e9a18347d66590ae768e637d210
                                        • Instruction Fuzzy Hash: B1517F70F002089FDB549FB4C8557AEBBF6AF88700F208529E50AEB395DE758C419B91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3235898801.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_f10000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 20921537332761caa0a272c02843ea5c534c9f0a99b493db29a903e9530b2387
                                        • Instruction ID: 81752eaf2ea74459decaa6bff5aa240a0cc327930b5cddae6a2395f5b889e0ce
                                        • Opcode Fuzzy Hash: 20921537332761caa0a272c02843ea5c534c9f0a99b493db29a903e9530b2387
                                        • Instruction Fuzzy Hash: 59513571D087858FC715CF78D8542EABFF1AF89320F0585ABD849E7282DB389985CB91
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 068BD922
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248872482.00000000068B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68b0000_Payment List.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: c6c7f6b5460c188a146ddd74f09f34f77879d6f9a32be370a7b77de62b3f5a4a
                                        • Instruction ID: a402daafe9d03b79b77697f2f1477713aab9ebd01bb7e73a36128fcf90fab721
                                        • Opcode Fuzzy Hash: c6c7f6b5460c188a146ddd74f09f34f77879d6f9a32be370a7b77de62b3f5a4a
                                        • Instruction Fuzzy Hash: 7D51CFB1D00349AFDB14CFA9C884ADEBBF5BF49310F24952AE819AB210D7759845CF90
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 068BD922
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248872482.00000000068B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68b0000_Payment List.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: a344604d5734435481e1cfd8f2b03bd632b91442f8d54e0d4a312292946682cf
                                        • Instruction ID: b52f1c4f393cacfd0e292a91004a99aad76379bd1c7738d26f54039e203cb58f
                                        • Opcode Fuzzy Hash: a344604d5734435481e1cfd8f2b03bd632b91442f8d54e0d4a312292946682cf
                                        • Instruction Fuzzy Hash: 4041A0B1D00309AFDB14CFA9C894ADEBBF5BF48310F24952AE419AB210D7759845CF90
                                        APIs
                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 068BFE91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248872482.00000000068B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68b0000_Payment List.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: ac66c1d0d07de24b097672b6d68e91597beca64869418a455e5e76f058150ab4
                                        • Instruction ID: 56795502e66c80aef8cc13b47b48edb7951a6107a608f609d2c2399e188841c3
                                        • Opcode Fuzzy Hash: ac66c1d0d07de24b097672b6d68e91597beca64869418a455e5e76f058150ab4
                                        • Instruction Fuzzy Hash: F84117B49003099FDB54CF99C888AAEBBF5FF88314F24C459D619AB321D374A845CFA0
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 068B30D7
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248872482.00000000068B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68b0000_Payment List.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: eec8eb6aac470b7de6dbbe0d9e01ab33b3f126e000045a04370a444b3b70a92d
                                        • Instruction ID: 45214d1d3887859f4be2071cb7b55e89cc3a0232b31d3a4a194388aa106d9f82
                                        • Opcode Fuzzy Hash: eec8eb6aac470b7de6dbbe0d9e01ab33b3f126e000045a04370a444b3b70a92d
                                        • Instruction Fuzzy Hash: E121B3B59002489FDB10CFAAD984ADEBBF9EB48310F14841AE918A3350D379A944CFA5
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 068B30D7
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248872482.00000000068B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68b0000_Payment List.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: eb250c73b4f20b458292a25dcac478735328850e2ff3a81cc9eacc49f55b1218
                                        • Instruction ID: 4f03371565a3a0060886532784534be22decbcd36d51636ae21868f726ac5e8f
                                        • Opcode Fuzzy Hash: eb250c73b4f20b458292a25dcac478735328850e2ff3a81cc9eacc49f55b1218
                                        • Instruction Fuzzy Hash: 1421E0B5D00209DFDB10CFAAD584AEEBBF5EF48310F14845AE919A3350C379A944CFA1
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 068BB6EA
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248872482.00000000068B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68b0000_Payment List.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 1aec52fce988047592873ebc040a7c66c2173829e7c11e9c8fa38c5f0c009307
                                        • Instruction ID: 0653bda055595646ddbfeb37cffbd7994c4583f7c5d2f88dec7b717bbd9bd1bb
                                        • Opcode Fuzzy Hash: 1aec52fce988047592873ebc040a7c66c2173829e7c11e9c8fa38c5f0c009307
                                        • Instruction Fuzzy Hash: BC1106B6C002099FDB10CF9AD844ADEFBF5EB89310F10841AD519A7210C775A545CFA5
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 068BB6EA
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248872482.00000000068B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68b0000_Payment List.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 7d73485646fc5bbac1585289610686a91f4bead5ae60903639538b04e8ad62df
                                        • Instruction ID: 13f6cbf004892e23ff84951fed7834fbd0312147207d34ed8bcd0762c4531979
                                        • Opcode Fuzzy Hash: 7d73485646fc5bbac1585289610686a91f4bead5ae60903639538b04e8ad62df
                                        • Instruction Fuzzy Hash: 9811F3B6C003099FDB10CFAAD844ADEFBF8EB49320F10842AD519A7310C779A945CFA5
                                        APIs
                                        • GlobalMemoryStatusEx.KERNELBASE ref: 00F1ECA7
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3235898801.0000000000F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_f10000_Payment List.jbxd
                                        Similarity
                                        • API ID: GlobalMemoryStatus
                                        • String ID:
                                        • API String ID: 1890195054-0
                                        • Opcode ID: 17420a7872d59036c85d7280ec92e693733d885bad0b459054f10e0f2ca3351e
                                        • Instruction ID: 606a59b30ab288b949f7c7594e2177d92c7d3582a038c56674da79d92e6233db
                                        • Opcode Fuzzy Hash: 17420a7872d59036c85d7280ec92e693733d885bad0b459054f10e0f2ca3351e
                                        • Instruction Fuzzy Hash: 3311EFB1C006599BDB10DFAAD944ADEFBF4EF48320F14816AD818A7241D778A944CFE5
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,068BB244), ref: 068BB47E
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248872482.00000000068B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68b0000_Payment List.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 5e2c1d5b1e4ccb51a2f48a0ee5e1cddcf9c391e3762cc9542e7fa559a79e59ac
                                        • Instruction ID: 2dbfa3507ec02393960eedd6bade3fde769b5c9ac3df0a3cd5dd12f27f0ba03e
                                        • Opcode Fuzzy Hash: 5e2c1d5b1e4ccb51a2f48a0ee5e1cddcf9c391e3762cc9542e7fa559a79e59ac
                                        • Instruction Fuzzy Hash: 7D11FDB5C007498FDB24DF9AC844ADEFBF4FB88224F10846AD919A7311C379A545CFA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH]q
                                        • API String ID: 0-3168235125
                                        • Opcode ID: 0e1dd5ef9e9876cdecfaef1c08bcd216ff3843dd9c689b83c6fd17ae0c7c9f8e
                                        • Instruction ID: 9fb529739854a36706070486e8c34a2f6f6dc20519536b88836bb2ea3db7eb67
                                        • Opcode Fuzzy Hash: 0e1dd5ef9e9876cdecfaef1c08bcd216ff3843dd9c689b83c6fd17ae0c7c9f8e
                                        • Instruction Fuzzy Hash: 07419D30E102099FDB54EF65C89469EBBB6BF85350F10893AE505EB340EB70E946CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH]q
                                        • API String ID: 0-3168235125
                                        • Opcode ID: 9a247f461678d953aad7ebc05361e64e0febf62abf3e98ce9e517ebf122f0528
                                        • Instruction ID: 7cbf89dffcf2eaf28ffedd3ec7f746fd0a541a28614599646e1c55628833dd8b
                                        • Opcode Fuzzy Hash: 9a247f461678d953aad7ebc05361e64e0febf62abf3e98ce9e517ebf122f0528
                                        • Instruction Fuzzy Hash: 33418E70E102099FDB55EF65C98069EBBB2AF85310F10893AE505EB340EB70D906CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH]q
                                        • API String ID: 0-3168235125
                                        • Opcode ID: b9f2b8a26726634632f03255cbc1cf58c0bbaa58a776085e5c4303888ebaaccf
                                        • Instruction ID: b125415bc0d836c7d11643e990ac71e7352a49a37a8eca5aae0f4bdc0cf3f7da
                                        • Opcode Fuzzy Hash: b9f2b8a26726634632f03255cbc1cf58c0bbaa58a776085e5c4303888ebaaccf
                                        • Instruction Fuzzy Hash: 1131E330B002058FDB59AB74C56066E7BE6BF89214F10847ED406DB3A5DF39CE46CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH]q
                                        • API String ID: 0-3168235125
                                        • Opcode ID: 630776a5f8897476eb8885855029d530b1fd387b146bbf0c6f0763aa03cfec03
                                        • Instruction ID: 11d3d8293bfc78717c0fa0eeb7f6d8f61deeb282fb6fb0a4e525caa902cc2637
                                        • Opcode Fuzzy Hash: 630776a5f8897476eb8885855029d530b1fd387b146bbf0c6f0763aa03cfec03
                                        • Instruction Fuzzy Hash: C231D030B002058FDB58AB74D46466E7BE6BF89220F20843DD406EB3A4DF35DE46CB95
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 12c05d4818d3793be786e1fe2fd94963f1fc8b0850b33c12dc983b3fd019270d
                                        • Instruction ID: ab86f53f00f9fbbc1a98647d725c79ba8f7bf20b95518e541680839db7ee0f5c
                                        • Opcode Fuzzy Hash: 12c05d4818d3793be786e1fe2fd94963f1fc8b0850b33c12dc983b3fd019270d
                                        • Instruction Fuzzy Hash: 50B19770F105098FDF64DBADD491BAE77E6EB89320F204829E509E7395CA39DC41CB52
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cce1a90b013a0d49579644f6689cdacab74b5a88426a6ab5cca176bc0aba27c6
                                        • Instruction ID: d70bd3aed2e40c5f35d554f9386e1dfe3e160ee29d25f36fe06f49998004d7b4
                                        • Opcode Fuzzy Hash: cce1a90b013a0d49579644f6689cdacab74b5a88426a6ab5cca176bc0aba27c6
                                        • Instruction Fuzzy Hash: 8C61D071F000214FDB54AA7AC890A5FBADBAFD4220F144439D90EDB364EE75DD0287D2
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6883d6cb7eeb0e952e3a03c175531cebee5fe5ccaab76adcc48a33f431b24542
                                        • Instruction ID: 6b22f011f2634df5ad910b4f69ef568f7aaa7c528294563edcf7569f6da710a4
                                        • Opcode Fuzzy Hash: 6883d6cb7eeb0e952e3a03c175531cebee5fe5ccaab76adcc48a33f431b24542
                                        • Instruction Fuzzy Hash: A4913C30E006198FDF60DF68C890B9DB7B1FF89310F208599D54DEB295DB70AA86CB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f5ce32b0ef1396cc1f14ccbfcc74c9e195a5a9aa1b672b85cdd72928535b3e0a
                                        • Instruction ID: a607cd8c46c4843a886fbca5b7859b17c3fb7bcc2918ce7f0f9fc7fa76dd66f8
                                        • Opcode Fuzzy Hash: f5ce32b0ef1396cc1f14ccbfcc74c9e195a5a9aa1b672b85cdd72928535b3e0a
                                        • Instruction Fuzzy Hash: B9815F31B006068FDB54DFB9D46469EB7F2AF85314F108429E90ADB399DF35EC868B81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8c383810c1df6a0c2eab751f0f82ea469e383f491490af5779bd2fab74ed0b84
                                        • Instruction ID: 7bbe669abf589de7af2ffafa5de63d3afea114d094ceb7ad791dbc0a021ca826
                                        • Opcode Fuzzy Hash: 8c383810c1df6a0c2eab751f0f82ea469e383f491490af5779bd2fab74ed0b84
                                        • Instruction Fuzzy Hash: 5A911A30E0061A8BDF60DF68C890B9DB7B1FF89310F208599D54DAB255DB70AA86CB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7675550974807c76e9ef04d575401916cc296a3b1d906dd63048aea059a68064
                                        • Instruction ID: 40699fab20a28a3640b67deedcd04eef34df5bd20550f14a4ff8632040b6ca6c
                                        • Opcode Fuzzy Hash: 7675550974807c76e9ef04d575401916cc296a3b1d906dd63048aea059a68064
                                        • Instruction Fuzzy Hash: 12816F30A002499FDB94DFA8D984AADBBF6FF84310F148429E509EB355DB34ED46CB41
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c89cbeb20d2e8e99fafc2076a035140e16f64c14508de7e0cfdbae7f9062605e
                                        • Instruction ID: 2e3950fdc514037a6b2a7906fdf463c937d52857f5746ecdbb3032eab56a26e5
                                        • Opcode Fuzzy Hash: c89cbeb20d2e8e99fafc2076a035140e16f64c14508de7e0cfdbae7f9062605e
                                        • Instruction Fuzzy Hash: 3D712C30A002099FDB94DFA8D994AADBBF6FF88310F148429E509EB355DB34ED46CB51
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8f9a66acec0cfa26a88addb2461af6d52ed2670f3f20fcb1c118d6a03272d3b9
                                        • Instruction ID: c0b806370907534b39fa9e1469985b296c28b235b8c9a3a0a10cf599024b1371
                                        • Opcode Fuzzy Hash: 8f9a66acec0cfa26a88addb2461af6d52ed2670f3f20fcb1c118d6a03272d3b9
                                        • Instruction Fuzzy Hash: FD51B331E101058FEB54AB78E8546ADB7B3FF85325F10886EE30ADB290DB35D855CB81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 877aca97c6645cbc44d10ef17548d42d4fe8b37f746e7d391e7e3757ce9a9598
                                        • Instruction ID: 4ab52e2f5c31ff03403c046895a50adb025107d69fef7f745cbb986bb8b42452
                                        • Opcode Fuzzy Hash: 877aca97c6645cbc44d10ef17548d42d4fe8b37f746e7d391e7e3757ce9a9598
                                        • Instruction Fuzzy Hash: 0451E874B102148FFFA4666CE95476F265FDF89320F20442EEA0AC3395CA3CCC568392
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74d1c4dba40da29977fd74c4b326ae905924720057178c06534519c40cda4093
                                        • Instruction ID: 567bf0601ff3d8818c09ac8d5dd3c283dc975d56ce21d5d0a85f8eb8c3ee411b
                                        • Opcode Fuzzy Hash: 74d1c4dba40da29977fd74c4b326ae905924720057178c06534519c40cda4093
                                        • Instruction Fuzzy Hash: BD51C674B102148FFFA4666CE95476F265FDF89320F204829EA0AC3399CA38CC468392
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9c7f66ebb7851f194b3771ad5c38441cf5882a7374521ce74b0e20947ca9d658
                                        • Instruction ID: 70ba68c2572f5c5ceefca7d3e62af2e3431698470a2823b1415c2d9487277051
                                        • Opcode Fuzzy Hash: 9c7f66ebb7851f194b3771ad5c38441cf5882a7374521ce74b0e20947ca9d658
                                        • Instruction Fuzzy Hash: BB413D71E006099FDF70CEA9D880AAFFBB6EB84320F10492AD616D7650D731F9558B92
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b08189b44525a1f43df0714149059c71a4c9a89dba6a97f6516473b756be1707
                                        • Instruction ID: d7e8384dab719a020d185f3fbbd9926dbea5bead08fdc084df322bbdd088b0a2
                                        • Opcode Fuzzy Hash: b08189b44525a1f43df0714149059c71a4c9a89dba6a97f6516473b756be1707
                                        • Instruction Fuzzy Hash: B8319C34E10209CBCB59CFA8D86469EB7F2BF89310F10852AE906E7290DB71E946CB41
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ae204df3cd9c5714431be4248ca5258ef0072b822a6f191d2efc8609545e06f0
                                        • Instruction ID: 2f6f0a674c8395a9bf38fbea339e5839bada953370646d891c2c9ac02afbede9
                                        • Opcode Fuzzy Hash: ae204df3cd9c5714431be4248ca5258ef0072b822a6f191d2efc8609545e06f0
                                        • Instruction Fuzzy Hash: 07317375E105058FDF60CFA9C481BAEFBF1EB45320F10892ED25AD7291D634E991CB92
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dd47620a06952af0791c9028bc23516197dcc79382557e79ec3d7db61489eca2
                                        • Instruction ID: 15fc655234a381513977317b9e11207d94d4f491028854a139d3658e3fd8657a
                                        • Opcode Fuzzy Hash: dd47620a06952af0791c9028bc23516197dcc79382557e79ec3d7db61489eca2
                                        • Instruction Fuzzy Hash: 06317C34E102098BCB59DFA8D86469EB7F2BF89310F108529E906E7390DB71ED46CB50
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 81bda09e1ae1dcd61295fc9c37373bfe1f780a2ec9c7a007059736e0f57d3851
                                        • Instruction ID: 49229a80928352cb1a79fb63ce6ad379d98827df6fb85e772da5ab8c4bbea22d
                                        • Opcode Fuzzy Hash: 81bda09e1ae1dcd61295fc9c37373bfe1f780a2ec9c7a007059736e0f57d3851
                                        • Instruction Fuzzy Hash: 71218D75E012199FDB50DF79D841BEEBBF5AB88720F10802AE905E7395DB34DD428B90
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d1c368f3fc2c7475f188e6f7e581a8810cc111ee5b8fda6ef47f81e8fe989934
                                        • Instruction ID: 2655c841abc259adc4cb7d1451660c825e961bda097fcbb5b36d155382a5f29b
                                        • Opcode Fuzzy Hash: d1c368f3fc2c7475f188e6f7e581a8810cc111ee5b8fda6ef47f81e8fe989934
                                        • Instruction Fuzzy Hash: 51218E75F016199FDB50DF79D881AAEBBF5EB48720F10802AEA05E7340EB30DD028B91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3235530456.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_e8d000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2e57dd8524e0f69c397a95928d2d9175e9dea710ee144365e0ebbd5850e6b02e
                                        • Instruction ID: a1c4bcc69a8b2937145ec5c15147fe62b82feb0a7dd450e974828795004a2d61
                                        • Opcode Fuzzy Hash: 2e57dd8524e0f69c397a95928d2d9175e9dea710ee144365e0ebbd5850e6b02e
                                        • Instruction Fuzzy Hash: 3C21F271508204AFCB15EF24CDC4B26BB66FB84318F20C569E94D5B292C73AD846DB62
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 03b9999fbcf2e4085f98ea6570aa19e0cfddb072b6ee91baca65eee91d95e121
                                        • Instruction ID: 7a74a2ec068177b8c2b79e04864127ef0af50eefcef407b1c223b40161100332
                                        • Opcode Fuzzy Hash: 03b9999fbcf2e4085f98ea6570aa19e0cfddb072b6ee91baca65eee91d95e121
                                        • Instruction Fuzzy Hash: 6B21AF30B101199BDF94EA69E8506ADB7B7EB84324F24843AE509E7344EB31ED568B81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 209f13d907c6c9e6e2fcacc15e9c023228a0233958e248e8f67cfed2eb0bd933
                                        • Instruction ID: bf2155d6891f5f4c962f82af69b3666ff3dd69e4e6a629fa03f7526c4a5ef56b
                                        • Opcode Fuzzy Hash: 209f13d907c6c9e6e2fcacc15e9c023228a0233958e248e8f67cfed2eb0bd933
                                        • Instruction Fuzzy Hash: 8211B170E002189FCB58DB6DD8405DEF7B5EB89324F00856EE10AEB200DA31DA46CB91
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b388ee64bf92be1286dc13565b83ee15ec55c95fccde905f19482e4ad8d60465
                                        • Instruction ID: 7de4f2af1cc848d6732013c3f71b4c1e10167ea9a6bf3b4a7e42f6b1b652a219
                                        • Opcode Fuzzy Hash: b388ee64bf92be1286dc13565b83ee15ec55c95fccde905f19482e4ad8d60465
                                        • Instruction Fuzzy Hash: 0D11E132B100298BDB54D678DC146AE73E6ABC8721F008139D90AE7344DE34DC028BD1
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c65b377ce4d437511316ac8ba5fd3069dd119624cf2a1b27cd8e234c8ebbe2a
                                        • Instruction ID: 6bbab3f878bd045d98626469401eb4b1c17af131861fbcf96c74067fc5019240
                                        • Opcode Fuzzy Hash: 7c65b377ce4d437511316ac8ba5fd3069dd119624cf2a1b27cd8e234c8ebbe2a
                                        • Instruction Fuzzy Hash: 0A01F531B001110FDB6686BC9420B6FBBE6DBCA720F14843EE50ACB356CA65CD468391
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eb20d24356c49a0fc0789f43995360d79458567ff301e2e7e110edd07c4f57cd
                                        • Instruction ID: 95b2583c30f087b813fbbafaf9e14d30c4af7c978bd9cb352b527b67a45fb45b
                                        • Opcode Fuzzy Hash: eb20d24356c49a0fc0789f43995360d79458567ff301e2e7e110edd07c4f57cd
                                        • Instruction Fuzzy Hash: 68014731B012144FC7A99A7DE82871E7BE6DF87720F10846EE60AC7351EE21DC028381
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 310c56b2ba2612822bcfe1aff5a73cd544ba45b2860797e648f198d2a258f766
                                        • Instruction ID: c08b456988339d7c3c60e762de69116d0feb27e246a160a1af300d1b527a7dbb
                                        • Opcode Fuzzy Hash: 310c56b2ba2612822bcfe1aff5a73cd544ba45b2860797e648f198d2a258f766
                                        • Instruction Fuzzy Hash: C5014536F101654BDB518678DC103AE3BE6ABC5225F08067FCA05D32D0DE34CC068782
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3235530456.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_e8d000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                        • Instruction ID: a67f6e979730a326eef1e4491a5d7bf1d95d2a9034dffe496514bde59cb246dc
                                        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                        • Instruction Fuzzy Hash: 0A11DD75508284CFCB12DF10C9C4B16BFA2FB84318F24C6A9D84D4B292C33AD84ACF62
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 82ba49d00c9f1b0fcb50d6a8fd9be8f3def53b39c7a71c2e3abbf47f103cde8d
                                        • Instruction ID: e8741987d3a11ac47b6da0a097486d23b0d809915525f50b4db664b987a4dece
                                        • Opcode Fuzzy Hash: 82ba49d00c9f1b0fcb50d6a8fd9be8f3def53b39c7a71c2e3abbf47f103cde8d
                                        • Instruction Fuzzy Hash: 8611B3B5D012599FCB00DF9AD884ADEFBB4FF49324F10852AE518A7340C375A554CFA5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a1b6eddec24d6e3d2045b52f69d8e6341d6e5cbf851f5272ba6d4f901cf21154
                                        • Instruction ID: fdee29b5a3f55fb1122349634c619d3fba432cc403063db6f4f16b3a4ab82f4f
                                        • Opcode Fuzzy Hash: a1b6eddec24d6e3d2045b52f69d8e6341d6e5cbf851f5272ba6d4f901cf21154
                                        • Instruction Fuzzy Hash: 40016D35B000110BDB6595BDE425B2EB6DADBCA721F10843DE60EC7359DA65DC424791
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c5c5ba04d387e9ea2fdff78826c0643399c033925d87fab41a2e93b2176a92b
                                        • Instruction ID: ac66509bf56cb54aa3d390c7a226136e85af4e344a886994ee7c1561d2f4d47e
                                        • Opcode Fuzzy Hash: 3c5c5ba04d387e9ea2fdff78826c0643399c033925d87fab41a2e93b2176a92b
                                        • Instruction Fuzzy Hash: 2A017C31B110114FDBA5EA6C9458B2E6BE6EBCA620F14882EE54ACB341DE31ED064385
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 407d61067671da1aefd5a3065d94b6a69adeec4df4865037a035a895bbfd4d71
                                        • Instruction ID: 8c7d4e5ddabfb811989d6554576b7eb17ee851ca85cad8a81099ec1e95e8fda6
                                        • Opcode Fuzzy Hash: 407d61067671da1aefd5a3065d94b6a69adeec4df4865037a035a895bbfd4d71
                                        • Instruction Fuzzy Hash: B421CFB5D012599FCB00CFA9D984ADEFBF4FB09324F10862AE518A7240C378A544CFA5
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cbb2dcf008d5640d662bda0000b797ae16a78cc40d4f013b42bf5d1eedce9c21
                                        • Instruction ID: 354708cbba489ec330cc3baeef3a88eb0ec082e9e3de015eeaa6b988fa239b39
                                        • Opcode Fuzzy Hash: cbb2dcf008d5640d662bda0000b797ae16a78cc40d4f013b42bf5d1eedce9c21
                                        • Instruction Fuzzy Hash: 62018C31B104154BDBA5AA6D9458B2EA7DADBCA660F24883DF60AC7340DE35EC024385
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 10eb1cfc0c8b92eef3787e477fbfa2412d0b5171d2c6f647824306b2a82682b6
                                        • Instruction ID: 1d1325bf85652db16fb8e96356ecdb69ec953597eddc71d9d51c96b938b7c14e
                                        • Opcode Fuzzy Hash: 10eb1cfc0c8b92eef3787e477fbfa2412d0b5171d2c6f647824306b2a82682b6
                                        • Instruction Fuzzy Hash: BF018135B115184FCBA8AA7DE858B2E77D6EB86720F108439E60AD7354DE31EC424381
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7ef0b85bb0888b24aeb341f9f8bce242240cb7b1c9cbefc009fb78c98d3c2b8a
                                        • Instruction ID: 381d86958f84ba6f090d12ddcc9b2282ef065329275c53f984a68998a6dd7750
                                        • Opcode Fuzzy Hash: 7ef0b85bb0888b24aeb341f9f8bce242240cb7b1c9cbefc009fb78c98d3c2b8a
                                        • Instruction Fuzzy Hash: 89F0E572F2022C8BEF748569D80979EBBA8E745370F00483FEA1AE7340D671EC858781
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c360c71f96a2792d5320b2aae11643927ebb3524404838cf3ce370b3eec19bd4
                                        • Instruction ID: 4204f3669ba6a796a1bf20fcd654e8e6a1f3fa73167ff0c16341bb0ff2a5db73
                                        • Opcode Fuzzy Hash: c360c71f96a2792d5320b2aae11643927ebb3524404838cf3ce370b3eec19bd4
                                        • Instruction Fuzzy Hash: DBF0A032E21268ABDB54A9B6EC05A9EB739E784764F004429FA05F7344DA76AC04CBC0
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: da8de7ff5bd230311015a09e61b2824181c6d71441435ca54be22e07ba9846f7
                                        • Instruction ID: e123bab2413131c2488993b27b6acb897ff4afb9e12e03a07c2f7f7313f1b23f
                                        • Opcode Fuzzy Hash: da8de7ff5bd230311015a09e61b2824181c6d71441435ca54be22e07ba9846f7
                                        • Instruction Fuzzy Hash: 21E0D8B0D183845BEB118A64C90975D7B64974222CF2487AED544CB182E67ACE06CB81
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aff06f97b8ae29cbbafe7b777b9a0c3b9abbc76b52a7c3517cc9004b6f22fea2
                                        • Instruction ID: 1b4ebcd6d9d58846bb2806540ebcdfc87be9f3e72cd92ce70e0592888138a542
                                        • Opcode Fuzzy Hash: aff06f97b8ae29cbbafe7b777b9a0c3b9abbc76b52a7c3517cc9004b6f22fea2
                                        • Instruction Fuzzy Hash: 2FE0C2B1E10108ABDF60CEB4C90575E77ECDB01228F7084B8D608C7202F272CE418780
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-2843079600
                                        • Opcode ID: 89946a7fd736b3ddbd45a1923a0c4cb5b983b35251c2b959b372d0c81a3b7ad0
                                        • Instruction ID: ac589d5406d7db8d946534ed1b21aa2906ede2e94e76559cd44098ee54b944eb
                                        • Opcode Fuzzy Hash: 89946a7fd736b3ddbd45a1923a0c4cb5b983b35251c2b959b372d0c81a3b7ad0
                                        • Instruction Fuzzy Hash: 1C121A30E002198FDB68DF69C994AADB7B2BF84314F208969D50AEB355DB34DD85CF81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-1273862796
                                        • Opcode ID: e487da1d512fc30abe790459cbe63fde975c87b6ea8eb89a3585ae175f1c6a5e
                                        • Instruction ID: edfa8ea78ac8d0d21f82fd07f663cfebaa9e0982409598ac469819cca9936445
                                        • Opcode Fuzzy Hash: e487da1d512fc30abe790459cbe63fde975c87b6ea8eb89a3585ae175f1c6a5e
                                        • Instruction Fuzzy Hash: A1916C30A0020D9FDB6CDB69D995BAE7BB6AF84314F10852DE901E7394DB79DC45CB80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-981061697
                                        • Opcode ID: ed4b490d68d0b178279ba18bc378f1af99ad46c3a066f587502556e8cd46e3f3
                                        • Instruction ID: 83cbe5b8b5c5b4fe268af6a2b330578fefa58980a0effae4c96a89b029952e41
                                        • Opcode Fuzzy Hash: ed4b490d68d0b178279ba18bc378f1af99ad46c3a066f587502556e8cd46e3f3
                                        • Instruction Fuzzy Hash: 50F13030A00208CFDB59EF69D994A6EB7B6BF84310F148569E406DB369DB75DC82CB40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q
                                        • API String ID: 0-858218434
                                        • Opcode ID: 437675f8c245fd9291cb5c96c4d187e3879d3bba2a1b63cd81a93c20a5f2bd46
                                        • Instruction ID: 92b12efeecfd7db439d1d0b199ebd6c1cbb940fd18a99a6d353cb0d4d3da3b4e
                                        • Opcode Fuzzy Hash: 437675f8c245fd9291cb5c96c4d187e3879d3bba2a1b63cd81a93c20a5f2bd46
                                        • Instruction Fuzzy Hash: F8B15E70A40208CFDB58DFA4D984AAEBBB6FF84314F24842AD406DB355DB75DC82CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q
                                        • API String ID: 0-858218434
                                        • Opcode ID: 50e3d48716ddcae1e824036ece2be591e05615b95934266214073cdbc39a3409
                                        • Instruction ID: 835390937aac9d15c92ec9dded3fa0ab8c4999d16f7474a0d7283a30775aba3e
                                        • Opcode Fuzzy Hash: 50e3d48716ddcae1e824036ece2be591e05615b95934266214073cdbc39a3409
                                        • Instruction Fuzzy Hash: 0A519130E1020D9FDB69DB68E980AADB7B2EF84321F14852EE505E7254DB75DC41CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000009.00000002.3248992203.00000000068C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_9_2_68c0000_Payment List.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR]q$LR]q$$]q$$]q
                                        • API String ID: 0-3527005858
                                        • Opcode ID: 4826ddf9a7ccc57806e8830faa0e942cf89be8594d34fdab7aba8df8f20e2621
                                        • Instruction ID: 03775bf7804e3b77e8ee72fe4aa49d41db3ed5a5885205a3bd92178fe8bc4ff7
                                        • Opcode Fuzzy Hash: 4826ddf9a7ccc57806e8830faa0e942cf89be8594d34fdab7aba8df8f20e2621
                                        • Instruction Fuzzy Hash: 1151D030B402058FDB58DB68E980A6EBBE6FF84314F14856DE506EB3A5DB30EC45CB91

                                        Execution Graph

                                        Execution Coverage:9.9%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:253
                                        Total number of Limit Nodes:12
                                        execution_graph 33639 58021d0 33640 5802238 CreateWindowExW 33639->33640 33642 58022f4 33640->33642 33643 167b3f0 33646 167b4d9 33643->33646 33644 167b3ff 33647 167b4f9 33646->33647 33648 167b51c 33646->33648 33647->33648 33654 167b771 33647->33654 33658 167b780 33647->33658 33648->33644 33649 167b720 GetModuleHandleW 33651 167b74d 33649->33651 33650 167b514 33650->33648 33650->33649 33651->33644 33655 167b794 33654->33655 33657 167b7b9 33655->33657 33662 167b208 33655->33662 33657->33650 33659 167b794 33658->33659 33660 167b208 LoadLibraryExW 33659->33660 33661 167b7b9 33659->33661 33660->33661 33661->33650 33663 167b960 LoadLibraryExW 33662->33663 33665 167b9d9 33663->33665 33665->33657 33673 167d780 33674 167d7c6 GetCurrentProcess 33673->33674 33676 167d811 33674->33676 33677 167d818 GetCurrentThread 33674->33677 33676->33677 33678 167d855 GetCurrentProcess 33677->33678 33679 167d84e 33677->33679 33680 167d88b GetCurrentThreadId 33678->33680 33679->33678 33682 167d8e4 33680->33682 33666 77e8360 33667 77e8386 33666->33667 33668 77e84eb 33666->33668 33667->33668 33670 77e5a44 33667->33670 33671 77e85e0 PostMessageW 33670->33671 33672 77e864c 33671->33672 33672->33667 33685 162d01c 33686 162d034 33685->33686 33687 162d08e 33686->33687 33692 5802377 33686->33692 33696 580163c 33686->33696 33705 58030ea 33686->33705 33714 5802388 33686->33714 33693 5802388 33692->33693 33694 580163c CallWindowProcW 33693->33694 33695 58023cf 33694->33695 33695->33687 33697 5801647 33696->33697 33698 5803159 33697->33698 33701 5803149 33697->33701 33734 5801764 33698->33734 33700 5803157 33718 5803280 33701->33718 33723 580334c 33701->33723 33729 5803271 33701->33729 33706 5803125 33705->33706 33707 5803159 33706->33707 33709 5803149 33706->33709 33708 5801764 CallWindowProcW 33707->33708 33710 5803157 33708->33710 33711 5803280 CallWindowProcW 33709->33711 33712 5803271 CallWindowProcW 33709->33712 33713 580334c CallWindowProcW 33709->33713 33711->33710 33712->33710 33713->33710 33715 58023ae 33714->33715 33716 580163c CallWindowProcW 33715->33716 33717 58023cf 33716->33717 33717->33687 33720 5803294 33718->33720 33719 5803320 33719->33700 33738 5803327 33720->33738 33742 5803338 33720->33742 33724 580330a 33723->33724 33725 580335a 33723->33725 33727 5803327 CallWindowProcW 33724->33727 33728 5803338 CallWindowProcW 33724->33728 33726 5803320 33726->33700 33727->33726 33728->33726 33731 5803277 33729->33731 33730 5803320 33730->33700 33732 5803327 CallWindowProcW 33731->33732 33733 5803338 CallWindowProcW 33731->33733 33732->33730 33733->33730 33735 580176f 33734->33735 33736 58047e9 33735->33736 33737 580483a CallWindowProcW 33735->33737 33736->33700 33737->33736 33739 580332f 33738->33739 33740 5803349 33739->33740 33745 580477b 33739->33745 33740->33719 33743 5803349 33742->33743 33744 580477b CallWindowProcW 33742->33744 33743->33719 33744->33743 33746 5801764 CallWindowProcW 33745->33746 33747 580478a 33746->33747 33747->33740 33619 1674668 33620 1674672 33619->33620 33622 1674758 33619->33622 33623 167477d 33622->33623 33627 1674868 33623->33627 33631 1674858 33623->33631 33629 167488f 33627->33629 33628 167496c 33628->33628 33629->33628 33635 16744b0 33629->33635 33633 167488f 33631->33633 33632 167496c 33632->33632 33633->33632 33634 16744b0 CreateActCtxA 33633->33634 33634->33632 33636 16758f8 CreateActCtxA 33635->33636 33638 16759bb 33636->33638 33683 167d9c8 DuplicateHandle 33684 167da5e 33683->33684 33748 77e4fc1 33749 77e4fcb 33748->33749 33750 77e50ca 33748->33750 33754 77e713e 33749->33754 33775 77e70d0 33749->33775 33795 77e70e0 33749->33795 33755 77e70cc 33754->33755 33757 77e7141 33754->33757 33756 77e711e 33755->33756 33815 77e7bb5 33755->33815 33820 77e751c 33755->33820 33825 77e765e 33755->33825 33829 77e7ca1 33755->33829 33833 77e7c44 33755->33833 33837 77e7784 33755->33837 33841 77e760b 33755->33841 33846 77e74ca 33755->33846 33851 77e76af 33755->33851 33856 77e79ee 33755->33856 33861 77e7f6e 33755->33861 33866 77e7b31 33755->33866 33871 77e7711 33755->33871 33876 77e77f1 33755->33876 33881 77e78d3 33755->33881 33886 77e7a92 33755->33886 33890 77e7832 33755->33890 33756->33750 33757->33750 33776 77e70fa 33775->33776 33777 77e765e 2 API calls 33776->33777 33778 77e751c 2 API calls 33776->33778 33779 77e711e 33776->33779 33780 77e7bb5 2 API calls 33776->33780 33781 77e7832 2 API calls 33776->33781 33782 77e7a92 2 API calls 33776->33782 33783 77e78d3 2 API calls 33776->33783 33784 77e77f1 2 API calls 33776->33784 33785 77e7711 2 API calls 33776->33785 33786 77e7b31 2 API calls 33776->33786 33787 77e7f6e 2 API calls 33776->33787 33788 77e79ee 2 API calls 33776->33788 33789 77e76af 2 API calls 33776->33789 33790 77e74ca 2 API calls 33776->33790 33791 77e760b 2 API calls 33776->33791 33792 77e7784 2 API calls 33776->33792 33793 77e7c44 2 API calls 33776->33793 33794 77e7ca1 2 API calls 33776->33794 33777->33779 33778->33779 33779->33750 33780->33779 33781->33779 33782->33779 33783->33779 33784->33779 33785->33779 33786->33779 33787->33779 33788->33779 33789->33779 33790->33779 33791->33779 33792->33779 33793->33779 33794->33779 33796 77e70fa 33795->33796 33797 77e711e 33796->33797 33798 77e765e 2 API calls 33796->33798 33799 77e751c 2 API calls 33796->33799 33800 77e7bb5 2 API calls 33796->33800 33801 77e7832 2 API calls 33796->33801 33802 77e7a92 2 API calls 33796->33802 33803 77e78d3 2 API calls 33796->33803 33804 77e77f1 2 API calls 33796->33804 33805 77e7711 2 API calls 33796->33805 33806 77e7b31 2 API calls 33796->33806 33807 77e7f6e 2 API calls 33796->33807 33808 77e79ee 2 API calls 33796->33808 33809 77e76af 2 API calls 33796->33809 33810 77e74ca 2 API calls 33796->33810 33811 77e760b 2 API calls 33796->33811 33812 77e7784 2 API calls 33796->33812 33813 77e7c44 2 API calls 33796->33813 33814 77e7ca1 2 API calls 33796->33814 33797->33750 33798->33797 33799->33797 33800->33797 33801->33797 33802->33797 33803->33797 33804->33797 33805->33797 33806->33797 33807->33797 33808->33797 33809->33797 33810->33797 33811->33797 33812->33797 33813->33797 33814->33797 33816 77e7bd0 33815->33816 33895 77e44ca 33816->33895 33899 77e44d0 33816->33899 33817 77e7bf1 33821 77e74ca 33820->33821 33903 77e4b90 33821->33903 33907 77e4b84 33821->33907 33827 77e44ca WriteProcessMemory 33825->33827 33828 77e44d0 WriteProcessMemory 33825->33828 33826 77e768c 33826->33756 33827->33826 33828->33826 33830 77e7a91 33829->33830 33830->33829 33911 77e4338 33830->33911 33915 77e4332 33830->33915 33834 77e7de7 33833->33834 33919 77e440a 33834->33919 33923 77e4410 33834->33923 33839 77e4338 Wow64SetThreadContext 33837->33839 33840 77e4332 Wow64SetThreadContext 33837->33840 33838 77e779e 33838->33756 33839->33838 33840->33838 33842 77e7617 33841->33842 33843 77e7a54 33842->33843 33844 77e44ca WriteProcessMemory 33842->33844 33845 77e44d0 WriteProcessMemory 33842->33845 33843->33756 33844->33842 33845->33842 33847 77e74d8 33846->33847 33849 77e4b84 CreateProcessA 33847->33849 33850 77e4b90 CreateProcessA 33847->33850 33848 77e75ec 33848->33756 33849->33848 33850->33848 33852 77e76c4 33851->33852 33927 77e3e48 33852->33927 33931 77e3e50 33852->33931 33853 77e7a21 33857 77e79f4 33856->33857 33859 77e3e48 ResumeThread 33857->33859 33860 77e3e50 ResumeThread 33857->33860 33858 77e7a21 33859->33858 33860->33858 33862 77e7617 33861->33862 33863 77e7a54 33862->33863 33864 77e44ca WriteProcessMemory 33862->33864 33865 77e44d0 WriteProcessMemory 33862->33865 33863->33756 33864->33862 33865->33862 33867 77e7b37 33866->33867 33869 77e44ca WriteProcessMemory 33867->33869 33870 77e44d0 WriteProcessMemory 33867->33870 33868 77e7bf1 33869->33868 33870->33868 33874 77e44ca WriteProcessMemory 33871->33874 33875 77e44d0 WriteProcessMemory 33871->33875 33872 77e7a54 33872->33756 33873 77e7617 33873->33871 33873->33872 33874->33873 33875->33873 33877 77e7839 33876->33877 33935 77e49f8 33877->33935 33939 77e49f1 33877->33939 33878 77e785b 33882 77e78f1 33881->33882 33883 77e7a21 33882->33883 33884 77e3e48 ResumeThread 33882->33884 33885 77e3e50 ResumeThread 33882->33885 33883->33756 33884->33883 33885->33883 33888 77e4338 Wow64SetThreadContext 33886->33888 33889 77e4332 Wow64SetThreadContext 33886->33889 33887 77e7a91 33887->33886 33888->33887 33889->33887 33891 77e7838 33890->33891 33892 77e785b 33891->33892 33893 77e49f8 ReadProcessMemory 33891->33893 33894 77e49f1 ReadProcessMemory 33891->33894 33893->33892 33894->33892 33896 77e44d0 WriteProcessMemory 33895->33896 33898 77e456f 33896->33898 33898->33817 33900 77e4518 WriteProcessMemory 33899->33900 33902 77e456f 33900->33902 33902->33817 33904 77e4c19 CreateProcessA 33903->33904 33906 77e4ddb 33904->33906 33908 77e4b90 CreateProcessA 33907->33908 33910 77e4ddb 33908->33910 33910->33910 33912 77e437d Wow64SetThreadContext 33911->33912 33914 77e43c5 33912->33914 33914->33830 33916 77e4338 Wow64SetThreadContext 33915->33916 33918 77e43c5 33916->33918 33918->33830 33920 77e4410 VirtualAllocEx 33919->33920 33922 77e448d 33920->33922 33922->33834 33924 77e4450 VirtualAllocEx 33923->33924 33926 77e448d 33924->33926 33926->33834 33928 77e3e50 ResumeThread 33927->33928 33930 77e3ec1 33928->33930 33930->33853 33932 77e3e90 ResumeThread 33931->33932 33934 77e3ec1 33932->33934 33934->33853 33936 77e4a43 ReadProcessMemory 33935->33936 33938 77e4a87 33936->33938 33938->33878 33940 77e49f8 ReadProcessMemory 33939->33940 33942 77e4a87 33940->33942 33942->33878

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1975 167d780-167d80f GetCurrentProcess 1979 167d811-167d817 1975->1979 1980 167d818-167d84c GetCurrentThread 1975->1980 1979->1980 1981 167d855-167d889 GetCurrentProcess 1980->1981 1982 167d84e-167d854 1980->1982 1984 167d892-167d8aa 1981->1984 1985 167d88b-167d891 1981->1985 1982->1981 1988 167d8b3-167d8e2 GetCurrentThreadId 1984->1988 1985->1984 1989 167d8e4-167d8ea 1988->1989 1990 167d8eb-167d94d 1988->1990 1989->1990
                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0167D7FE
                                        • GetCurrentThread.KERNEL32 ref: 0167D83B
                                        • GetCurrentProcess.KERNEL32 ref: 0167D878
                                        • GetCurrentThreadId.KERNEL32 ref: 0167D8D1
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2087033693.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_1670000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 7a3921731a3667dd3dc8000873c3e871098233e6b2503c931868c9511546fcbe
                                        • Instruction ID: 6187e435bd03a9969d40b8899c6257e37b27e3ea823fb61db2e0d9504e8ca11b
                                        • Opcode Fuzzy Hash: 7a3921731a3667dd3dc8000873c3e871098233e6b2503c931868c9511546fcbe
                                        • Instruction Fuzzy Hash: E35154B09013098FDB18DFA9D948BAEBFF5FF89314F208459E109A7364D738A944CB65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2034 77e4b84-77e4c25 2037 77e4c5e-77e4c7e 2034->2037 2038 77e4c27-77e4c31 2034->2038 2043 77e4cb7-77e4ce6 2037->2043 2044 77e4c80-77e4c8a 2037->2044 2038->2037 2039 77e4c33-77e4c35 2038->2039 2041 77e4c58-77e4c5b 2039->2041 2042 77e4c37-77e4c41 2039->2042 2041->2037 2045 77e4c45-77e4c54 2042->2045 2046 77e4c43 2042->2046 2054 77e4d1f-77e4dd9 CreateProcessA 2043->2054 2055 77e4ce8-77e4cf2 2043->2055 2044->2043 2047 77e4c8c-77e4c8e 2044->2047 2045->2045 2048 77e4c56 2045->2048 2046->2045 2049 77e4c90-77e4c9a 2047->2049 2050 77e4cb1-77e4cb4 2047->2050 2048->2041 2052 77e4c9e-77e4cad 2049->2052 2053 77e4c9c 2049->2053 2050->2043 2052->2052 2056 77e4caf 2052->2056 2053->2052 2066 77e4ddb-77e4de1 2054->2066 2067 77e4de2-77e4e68 2054->2067 2055->2054 2057 77e4cf4-77e4cf6 2055->2057 2056->2050 2058 77e4cf8-77e4d02 2057->2058 2059 77e4d19-77e4d1c 2057->2059 2061 77e4d06-77e4d15 2058->2061 2062 77e4d04 2058->2062 2059->2054 2061->2061 2063 77e4d17 2061->2063 2062->2061 2063->2059 2066->2067 2077 77e4e6a-77e4e6e 2067->2077 2078 77e4e78-77e4e7c 2067->2078 2077->2078 2079 77e4e70 2077->2079 2080 77e4e7e-77e4e82 2078->2080 2081 77e4e8c-77e4e90 2078->2081 2079->2078 2080->2081 2082 77e4e84 2080->2082 2083 77e4e92-77e4e96 2081->2083 2084 77e4ea0-77e4ea4 2081->2084 2082->2081 2083->2084 2085 77e4e98 2083->2085 2086 77e4eb6-77e4ebd 2084->2086 2087 77e4ea6-77e4eac 2084->2087 2085->2084 2088 77e4ebf-77e4ece 2086->2088 2089 77e4ed4 2086->2089 2087->2086 2088->2089 2091 77e4ed5 2089->2091 2091->2091
                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 077E4DC6
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: 14ebcd520e84b538479313368f32b9ac1eb479aacc96cff35481ff6e0c42c89f
                                        • Instruction ID: ab16c71ecd29c54bca5190dbbf6c7d70dac1137a877276cb048fcfba13299636
                                        • Opcode Fuzzy Hash: 14ebcd520e84b538479313368f32b9ac1eb479aacc96cff35481ff6e0c42c89f
                                        • Instruction Fuzzy Hash: 83A18BB1D0025ADFDF24DFA8C841BEDBBB6BF48314F148569E808A7250DB749985CF92

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2092 77e4b90-77e4c25 2094 77e4c5e-77e4c7e 2092->2094 2095 77e4c27-77e4c31 2092->2095 2100 77e4cb7-77e4ce6 2094->2100 2101 77e4c80-77e4c8a 2094->2101 2095->2094 2096 77e4c33-77e4c35 2095->2096 2098 77e4c58-77e4c5b 2096->2098 2099 77e4c37-77e4c41 2096->2099 2098->2094 2102 77e4c45-77e4c54 2099->2102 2103 77e4c43 2099->2103 2111 77e4d1f-77e4dd9 CreateProcessA 2100->2111 2112 77e4ce8-77e4cf2 2100->2112 2101->2100 2104 77e4c8c-77e4c8e 2101->2104 2102->2102 2105 77e4c56 2102->2105 2103->2102 2106 77e4c90-77e4c9a 2104->2106 2107 77e4cb1-77e4cb4 2104->2107 2105->2098 2109 77e4c9e-77e4cad 2106->2109 2110 77e4c9c 2106->2110 2107->2100 2109->2109 2113 77e4caf 2109->2113 2110->2109 2123 77e4ddb-77e4de1 2111->2123 2124 77e4de2-77e4e68 2111->2124 2112->2111 2114 77e4cf4-77e4cf6 2112->2114 2113->2107 2115 77e4cf8-77e4d02 2114->2115 2116 77e4d19-77e4d1c 2114->2116 2118 77e4d06-77e4d15 2115->2118 2119 77e4d04 2115->2119 2116->2111 2118->2118 2120 77e4d17 2118->2120 2119->2118 2120->2116 2123->2124 2134 77e4e6a-77e4e6e 2124->2134 2135 77e4e78-77e4e7c 2124->2135 2134->2135 2136 77e4e70 2134->2136 2137 77e4e7e-77e4e82 2135->2137 2138 77e4e8c-77e4e90 2135->2138 2136->2135 2137->2138 2139 77e4e84 2137->2139 2140 77e4e92-77e4e96 2138->2140 2141 77e4ea0-77e4ea4 2138->2141 2139->2138 2140->2141 2142 77e4e98 2140->2142 2143 77e4eb6-77e4ebd 2141->2143 2144 77e4ea6-77e4eac 2141->2144 2142->2141 2145 77e4ebf-77e4ece 2143->2145 2146 77e4ed4 2143->2146 2144->2143 2145->2146 2148 77e4ed5 2146->2148 2148->2148
                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 077E4DC6
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: 2d7de303efbab65c863d4376acc8e2806909dff46d497441c9d21e8c9595399f
                                        • Instruction ID: 9fe22f056c356a86f8ca153f8e8f9c028331d3e006e7242b7e3cd0bb40487e64
                                        • Opcode Fuzzy Hash: 2d7de303efbab65c863d4376acc8e2806909dff46d497441c9d21e8c9595399f
                                        • Instruction Fuzzy Hash: C3917AB1D0025ADFDF24CFA8C841BEDBBB6BF48314F148569E809A7250DB749985CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2149 167b4d9-167b4f7 2150 167b523-167b527 2149->2150 2151 167b4f9-167b506 call 167b1a0 2149->2151 2152 167b53b-167b57c 2150->2152 2153 167b529-167b533 2150->2153 2158 167b51c 2151->2158 2159 167b508 2151->2159 2160 167b57e-167b586 2152->2160 2161 167b589-167b597 2152->2161 2153->2152 2158->2150 2205 167b50e call 167b771 2159->2205 2206 167b50e call 167b780 2159->2206 2160->2161 2163 167b5bb-167b5bd 2161->2163 2164 167b599-167b59e 2161->2164 2162 167b514-167b516 2162->2158 2165 167b658-167b718 2162->2165 2166 167b5c0-167b5c7 2163->2166 2167 167b5a0-167b5a7 call 167b1ac 2164->2167 2168 167b5a9 2164->2168 2200 167b720-167b74b GetModuleHandleW 2165->2200 2201 167b71a-167b71d 2165->2201 2170 167b5d4-167b5db 2166->2170 2171 167b5c9-167b5d1 2166->2171 2169 167b5ab-167b5b9 2167->2169 2168->2169 2169->2166 2173 167b5dd-167b5e5 2170->2173 2174 167b5e8-167b5f1 call 167b1bc 2170->2174 2171->2170 2173->2174 2180 167b5f3-167b5fb 2174->2180 2181 167b5fe-167b603 2174->2181 2180->2181 2182 167b605-167b60c 2181->2182 2183 167b621-167b62e 2181->2183 2182->2183 2185 167b60e-167b61e call 167b1cc call 167b1dc 2182->2185 2189 167b651-167b657 2183->2189 2190 167b630-167b64e 2183->2190 2185->2183 2190->2189 2202 167b754-167b768 2200->2202 2203 167b74d-167b753 2200->2203 2201->2200 2203->2202 2205->2162 2206->2162
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0167B73E
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2087033693.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_1670000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: dd193ac1a737106963f2e97db4d89d0d37a5a99b55d395e63950fa187154c5c2
                                        • Instruction ID: 20b9a7fe31308dccdbe62e02ce7f282a79cd42aebeabafb98e33ba89433c4d96
                                        • Opcode Fuzzy Hash: dd193ac1a737106963f2e97db4d89d0d37a5a99b55d395e63950fa187154c5c2
                                        • Instruction Fuzzy Hash: DB810070A00B458FE724DF29D8447AABBF1BF88310F048A2DD58ADBB50DB75E945CB94

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2207 58021c5-58021cd 2208 58021f2-5802236 2207->2208 2209 58021cf-58021ed 2207->2209 2210 5802241-5802248 2208->2210 2211 5802238-580223e 2208->2211 2209->2208 2212 5802253-580228b 2210->2212 2213 580224a-5802250 2210->2213 2211->2210 2214 5802293-58022f2 CreateWindowExW 2212->2214 2213->2212 2215 58022f4-58022fa 2214->2215 2216 58022fb-5802333 2214->2216 2215->2216 2220 5802340 2216->2220 2221 5802335-5802338 2216->2221 2222 5802341 2220->2222 2221->2220 2222->2222
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 058022E2
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2090135305.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_5800000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: c57a8c00193d417421f5ac0b0e193dd831218fd9115a10519b09067670187dac
                                        • Instruction ID: f12cb1a292eb372b25803585cca2125c3345f15a6ebe353c00408de1626143ac
                                        • Opcode Fuzzy Hash: c57a8c00193d417421f5ac0b0e193dd831218fd9115a10519b09067670187dac
                                        • Instruction Fuzzy Hash: 1951C1B5D00359AFDB14CFA9C884ADEFFB5BF48310F24812AE819AB250D774A945CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2223 58021d0-5802236 2224 5802241-5802248 2223->2224 2225 5802238-580223e 2223->2225 2226 5802253-58022f2 CreateWindowExW 2224->2226 2227 580224a-5802250 2224->2227 2225->2224 2229 58022f4-58022fa 2226->2229 2230 58022fb-5802333 2226->2230 2227->2226 2229->2230 2234 5802340 2230->2234 2235 5802335-5802338 2230->2235 2236 5802341 2234->2236 2235->2234 2236->2236
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 058022E2
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2090135305.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_5800000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: b9b2ee1fa7d7701f9caad177856ff9289a9c46639c764729a507f9a54feac841
                                        • Instruction ID: 86f5284f7f85f670cc68e9f783945020c6c9b15899244d8f1f52dab69c016ab7
                                        • Opcode Fuzzy Hash: b9b2ee1fa7d7701f9caad177856ff9289a9c46639c764729a507f9a54feac841
                                        • Instruction Fuzzy Hash: A641C0B5D00309AFDB14CF99C884ADEFBF5BF48310F24812AE819AB250D774A885CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2237 16758ec-16759b9 CreateActCtxA 2239 16759c2-1675a1c 2237->2239 2240 16759bb-16759c1 2237->2240 2247 1675a1e-1675a21 2239->2247 2248 1675a2b-1675a2f 2239->2248 2240->2239 2247->2248 2249 1675a31-1675a3d 2248->2249 2250 1675a40 2248->2250 2249->2250 2252 1675a41 2250->2252 2252->2252
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 016759A9
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2087033693.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_1670000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 9e59a3274d6cbde0c473b460af6681990c3471f3fb37769ac00fd299bba36385
                                        • Instruction ID: a62993c65fe211a766e970b868b965101c84d9d893945c9db3a21c8e094af2d8
                                        • Opcode Fuzzy Hash: 9e59a3274d6cbde0c473b460af6681990c3471f3fb37769ac00fd299bba36385
                                        • Instruction Fuzzy Hash: F441D4B0C00719CFDB25DFA9C884ADDBBB5BF89304F20806AD409AB255D7756946CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2253 5801764-58047dc 2258 58047e2-58047e7 2253->2258 2259 580488c-58048ac call 580163c 2253->2259 2261 58047e9-5804820 2258->2261 2262 580483a-5804872 CallWindowProcW 2258->2262 2266 58048af-58048bc 2259->2266 2268 5804822-5804828 2261->2268 2269 5804829-5804838 2261->2269 2263 5804874-580487a 2262->2263 2264 580487b-580488a 2262->2264 2263->2264 2264->2266 2268->2269 2269->2266
                                        APIs
                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 05804861
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2090135305.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_5800000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: d1a27e1893fd6653c8cd7f3c99b81fdf507ae9339a09c89887d4cc0c6388d476
                                        • Instruction ID: 645b22c2d2511a0969752726d87c2a6ab82ff7b0be607a7bc36152fb58452583
                                        • Opcode Fuzzy Hash: d1a27e1893fd6653c8cd7f3c99b81fdf507ae9339a09c89887d4cc0c6388d476
                                        • Instruction Fuzzy Hash: AC412CB4900349DFDB54CF99C849AAAFBF5FF88314F24C859D619A7361D374A841CBA0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2272 16744b0-16759b9 CreateActCtxA 2275 16759c2-1675a1c 2272->2275 2276 16759bb-16759c1 2272->2276 2283 1675a1e-1675a21 2275->2283 2284 1675a2b-1675a2f 2275->2284 2276->2275 2283->2284 2285 1675a31-1675a3d 2284->2285 2286 1675a40 2284->2286 2285->2286 2288 1675a41 2286->2288 2288->2288
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 016759A9
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2087033693.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_1670000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: ca7fe6d76afdceef7430dafed0782cace3d7b8ae442832fe0498e6b978d725ce
                                        • Instruction ID: 75887a8c54cc757c5569a732a5ab9fd73d36a05089fd382717fd1160cdd4bad0
                                        • Opcode Fuzzy Hash: ca7fe6d76afdceef7430dafed0782cace3d7b8ae442832fe0498e6b978d725ce
                                        • Instruction Fuzzy Hash: 4F41D4B0C0071DCBDB24DFA9C844B9DBBF5BF89304F20806AD409AB255DB756946CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2289 77e44ca-77e451e 2292 77e452e-77e456d WriteProcessMemory 2289->2292 2293 77e4520-77e452c 2289->2293 2295 77e456f-77e4575 2292->2295 2296 77e4576-77e45a6 2292->2296 2293->2292 2295->2296
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 077E4560
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: ac7b15e6f89caf10739706fd803595175d6a4cf66c7b1636ee7f524d6671d408
                                        • Instruction ID: b1442588ff6124723934561b49f6d9ecbc6b2b710ed677a3ac71b30c679e21cd
                                        • Opcode Fuzzy Hash: ac7b15e6f89caf10739706fd803595175d6a4cf66c7b1636ee7f524d6671d408
                                        • Instruction Fuzzy Hash: 192128B59003599FCB10DFA9C845BEEBBF5FF48310F10882AE959A7240D7789554CBA0
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 077E4560
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: 70bc309019653dabc3fad31ae2da3f05b45dc6e247b0ce08135714ff6f5bbb71
                                        • Instruction ID: 799e11bae160d302e1c0122f804b35583f6fbb600c41860e89a0f4ff0a6e6b74
                                        • Opcode Fuzzy Hash: 70bc309019653dabc3fad31ae2da3f05b45dc6e247b0ce08135714ff6f5bbb71
                                        • Instruction Fuzzy Hash: F82119B5D003599FCB10DFA9C885BEEBBF5FF48310F10882AE959A7240D7789954CBA4
                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 077E4A78
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 93d076560deaefc7d4bcc822b86d02ba84e00826de03898009b240f127c38e6a
                                        • Instruction ID: a39fda9e7df8a2a901960fdf13a7ef5940911377692569af1adc342400a6dd19
                                        • Opcode Fuzzy Hash: 93d076560deaefc7d4bcc822b86d02ba84e00826de03898009b240f127c38e6a
                                        • Instruction Fuzzy Hash: 992128B1C013599FCB10DFAAC885AEEFBF5FF48310F108429E519A7250D7789941CBA5
                                        APIs
                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 077E43B6
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: ContextThreadWow64
                                        • String ID:
                                        • API String ID: 983334009-0
                                        • Opcode ID: 4ca35647097ddff8ffe7a4cca10c38fea357e18e256c17ca8c6b0a1c24c6db37
                                        • Instruction ID: cb577b9aa6284f80684f8def9fdf245600c58a89d4f39850f079f77b24478d1d
                                        • Opcode Fuzzy Hash: 4ca35647097ddff8ffe7a4cca10c38fea357e18e256c17ca8c6b0a1c24c6db37
                                        • Instruction Fuzzy Hash: 992157B1D003099FCB10DFAAC4857EEBBF4EF48354F148429D559A7240CB78A944CFA0
                                        APIs
                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 077E43B6
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: ContextThreadWow64
                                        • String ID:
                                        • API String ID: 983334009-0
                                        • Opcode ID: 1a7543e6dae205e12dd4cd06fc0e02b5aa923a7e716add3a411f34d4eb635b97
                                        • Instruction ID: d40420171540f4b09676142ef34302cb3834ad1277ff1f3150eee1a0d2ebd9b6
                                        • Opcode Fuzzy Hash: 1a7543e6dae205e12dd4cd06fc0e02b5aa923a7e716add3a411f34d4eb635b97
                                        • Instruction Fuzzy Hash: 4D2135B1D003099FDB10DFAAC4857EEBBF8EF48354F14842AD559A7240CB78A944CFA0
                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 077E4A78
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 6449a178489220ee1283abe9a0ef2e04554f55ad6d6ce786597829b29e98fe68
                                        • Instruction ID: 7fc0a4d0fa4882128d2910a08a6ba3e7b17ae39821e6c9fa15834d54fcfda2b6
                                        • Opcode Fuzzy Hash: 6449a178489220ee1283abe9a0ef2e04554f55ad6d6ce786597829b29e98fe68
                                        • Instruction Fuzzy Hash: A52139B1C003599FCB10DFAAC845AEEFBF5FF48310F108429E519A7250C7389540CBA5
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0167DA4F
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2087033693.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_1670000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 611072ea094dc2bf135fa627e2bd9e3d2956011d6ed959c5ef11a5e18fbd6d1f
                                        • Instruction ID: dd3687b8e1a4ca774dafd7aaa74abd8a7574177481cfb69e434263159bef33f4
                                        • Opcode Fuzzy Hash: 611072ea094dc2bf135fa627e2bd9e3d2956011d6ed959c5ef11a5e18fbd6d1f
                                        • Instruction Fuzzy Hash: 1A21C6B59012489FDB10DF9AD984ADEBFF9FF48310F14841AE918A3350D378A954CFA5
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0167B7B9,00000800,00000000,00000000), ref: 0167B9CA
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2087033693.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_1670000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 5738b006ff4495986805c470c124e9e3801e63219a8860413bd5a5d27703ae66
                                        • Instruction ID: b45ca064427243f015951634c652945bb23d79c9062431c1292790f5d849baf0
                                        • Opcode Fuzzy Hash: 5738b006ff4495986805c470c124e9e3801e63219a8860413bd5a5d27703ae66
                                        • Instruction Fuzzy Hash: 9E11E4B69003099FDB10DF9AC844ADEFBF4EB89310F10842AD569A7310C379A945CFA5
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0167B7B9,00000800,00000000,00000000), ref: 0167B9CA
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2087033693.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_1670000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 24badc9331857ca7bfede375a287d3bec6c0c839957b389734ba4578b4a53c9a
                                        • Instruction ID: f163b69affe58ec06341e0dee108c12b27a42ee050c507d78582b7d88491abc7
                                        • Opcode Fuzzy Hash: 24badc9331857ca7bfede375a287d3bec6c0c839957b389734ba4578b4a53c9a
                                        • Instruction Fuzzy Hash: 812103B6C002099FDB10CF9AC844ADEFBF4EB89310F10842AD569A7210D379A545CFA5
                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 077E447E
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: f539d7e8cbc6a9a227632d240eec8e71ee21903ef963c610f9678f4cfb9110b3
                                        • Instruction ID: d5f5d3df8fe38d22a2f84d6b6f38d6d137b2f99b5814b7043de9f929496d5b0c
                                        • Opcode Fuzzy Hash: f539d7e8cbc6a9a227632d240eec8e71ee21903ef963c610f9678f4cfb9110b3
                                        • Instruction Fuzzy Hash: C21167B29002499FCB10DFAAC845AEFBFF9EF49314F208819E559A7250C779A540CFA0
                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 077E447E
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: cc25f7a80901421dd85b1529243b521c1851d490e5383b96b12102b965fcd30a
                                        • Instruction ID: 5b5d7bc271e8decb70e754eb9fecce39862d0de7350de6caad82f555133a5f11
                                        • Opcode Fuzzy Hash: cc25f7a80901421dd85b1529243b521c1851d490e5383b96b12102b965fcd30a
                                        • Instruction Fuzzy Hash: 151137B59002499FCB10DFAAC845AEFBFF9EF49314F108819E519A7250C779A540CFA0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 30af3bc1e61d91e82e148c3b41a453ba1e35248b1e4e303d554aa3de67abdff8
                                        • Instruction ID: 979afe7c5f69d4e090b413e09cbd32ee0e1711a6b1fae31c1556a0b0295952c4
                                        • Opcode Fuzzy Hash: 30af3bc1e61d91e82e148c3b41a453ba1e35248b1e4e303d554aa3de67abdff8
                                        • Instruction Fuzzy Hash: FE1149B18002488FCB20DFAAC4456EEFFF8EB88314F148419D559A7240C639A544CBA0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: b8e857591166a34e48493d0dde35410e8eae17e8bb2e0847210e3d448f3d98ea
                                        • Instruction ID: c07b04c106924ddd77204bb0d39d9238e64c416e463c9813a471ba7dd56d819d
                                        • Opcode Fuzzy Hash: b8e857591166a34e48493d0dde35410e8eae17e8bb2e0847210e3d448f3d98ea
                                        • Instruction Fuzzy Hash: 9D1128B19002498FCB20DFAAC4457AEFBF9EF88314F208419D519A7240CB79A944CFA0
                                        APIs
                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 077E863D
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: 25d559fc06395e0cfe94ee2bcfbcef12826d5570673cedcf01472c104c7354fc
                                        • Instruction ID: 80847832100c7c24e0b49b2f895cb04926edd549274da7ffcd96605a8473510d
                                        • Opcode Fuzzy Hash: 25d559fc06395e0cfe94ee2bcfbcef12826d5570673cedcf01472c104c7354fc
                                        • Instruction Fuzzy Hash: D41103B58003499FCB10DF9AC945BDEFBF8FB49314F10881AE918A7250D379A944CFA5
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0167B73E
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2087033693.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_1670000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 3e87455650988f7adff7075b9dc5c4c4e8d82d0831081b2bd0e9584b7e5fa7cb
                                        • Instruction ID: 7cdf87615c1531825866fd29cff748fcef2bc3a66638475c3b60b7b5a782b2fc
                                        • Opcode Fuzzy Hash: 3e87455650988f7adff7075b9dc5c4c4e8d82d0831081b2bd0e9584b7e5fa7cb
                                        • Instruction Fuzzy Hash: 371110B5C002498FDB10DF9AC844AEEFBF9EF88310F14841AD518A7200C379A545CFA1
                                        APIs
                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 077E863D
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2091015874.00000000077E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 077E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_77e0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: 0ab5afb38fb0164c86866f94da92531b600447a2835308f63287b036408366f3
                                        • Instruction ID: f15fe122c1ed3cdeb72302931516828a223d2882ecaee549610b9f65ec80e6d6
                                        • Opcode Fuzzy Hash: 0ab5afb38fb0164c86866f94da92531b600447a2835308f63287b036408366f3
                                        • Instruction Fuzzy Hash: 8F1133B5800348AFCB10DF9AC849BDEFBF8FB59314F10881AE518A3200D379A940CFA1
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2086750749.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_161d000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ee8f3c12b8c04e736e11b32cc88346ca84477ab3c83604f12144f34c50ed26a6
                                        • Instruction ID: 304bef777a1df034789c7fcf2ef23e47925cf48686a283e79868d90b15bb5a79
                                        • Opcode Fuzzy Hash: ee8f3c12b8c04e736e11b32cc88346ca84477ab3c83604f12144f34c50ed26a6
                                        • Instruction Fuzzy Hash: 5A210371500240DFDB15DF58D9C8F26BF65FB88318F28C569E9090B35AC33AD416CAB2
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2086824184.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_162d000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ae41f10142875ba5cec88d863fc42dd7110328efb1f9b3ca6f288a5f3a3b1723
                                        • Instruction ID: 5ff20902cc0443fdadc33a7f3f16bdc84b6a522332ae8a045047a80763311d4f
                                        • Opcode Fuzzy Hash: ae41f10142875ba5cec88d863fc42dd7110328efb1f9b3ca6f288a5f3a3b1723
                                        • Instruction Fuzzy Hash: 46210471504604EFDB05DFA8D9C4F26BBA5FB89324F20C56DEA094B356C33AD406CE62
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2086824184.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_162d000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a9dc9fcbec3d980bd36b740d0bdd3b6cdcf58b7405d66dd2367b03122e76338
                                        • Instruction ID: 59371b2310a8543dd02393c898ab6c635fc85cc8dcb4487daa115640e8894e04
                                        • Opcode Fuzzy Hash: 1a9dc9fcbec3d980bd36b740d0bdd3b6cdcf58b7405d66dd2367b03122e76338
                                        • Instruction Fuzzy Hash: 31212271604640DFCB15DFA8D980B26BF65FB88314F20C56DD90A0B3A6C33ED407CAA2
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2086824184.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_162d000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7ef7b8e4224fc53ecf4a6982f6888f52807adf0e49d85f1b2aec2d761cd81500
                                        • Instruction ID: 535c91a6894da9d5e68817863c9614fd4ca81d9e9c1ec5e4fde73277a9cc5cf2
                                        • Opcode Fuzzy Hash: 7ef7b8e4224fc53ecf4a6982f6888f52807adf0e49d85f1b2aec2d761cd81500
                                        • Instruction Fuzzy Hash: 072180755087809FCB03CF64D994B11BF71EB46314F28C5DAD8498F2A7C33A981ACB62
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2086750749.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_161d000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                        • Instruction ID: ebc930416363498c4c3de84a50f8ee3876bd6cadfc5f1087a1c2030327405329
                                        • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                        • Instruction Fuzzy Hash: 6111E172404280CFCB06CF54D9C4B16BF71FB88314F28C6A9D9490B25BC336D45ACBA2
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2086824184.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_162d000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                        • Instruction ID: 96a1f188e7e31e2686b1c4bd7b8e4946c0671506a0fbf58c41d22d20bca0d8fc
                                        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                        • Instruction Fuzzy Hash: 5A11BB75504680DFDB02CF54C9C4B15BFA1FB85224F24C6A9D9494B396C33AD40ACF62
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2086750749.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_161d000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7ac1e56c85cf18acbae0f5d726c7409d6ba7d8bb33d3da331d6cdeabb029a10c
                                        • Instruction ID: 90826ad51dae03169e760d4cb8f71cd833d900ff85ebbfeccb7ee8384dfd5f6a
                                        • Opcode Fuzzy Hash: 7ac1e56c85cf18acbae0f5d726c7409d6ba7d8bb33d3da331d6cdeabb029a10c
                                        • Instruction Fuzzy Hash: 5B01DB71005384AEE7208A99DD88B77FFDCEF45320F1CC92AED494A39AC3799841CA71
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.2086750749.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_161d000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 98ad1a7da09a86a85608147ecf0a52a2a07303b5e6e88a3dc367c29ad432a0d2
                                        • Instruction ID: fdbd30d3d6eec6c2675968c97e3f407ff0de510d9d78ddd5e0bc3035bed7ba0c
                                        • Opcode Fuzzy Hash: 98ad1a7da09a86a85608147ecf0a52a2a07303b5e6e88a3dc367c29ad432a0d2
                                        • Instruction Fuzzy Hash: 45F06871405344AEE7218A1ADC88766FFA8EF55624F18C55AED484B386C3795844CA71

                                        Execution Graph

                                        Execution Coverage:9.1%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:127
                                        Total number of Limit Nodes:14
                                        execution_graph 38076 fed044 38077 fed05c 38076->38077 38078 fed0b6 38077->38078 38084 58fda18 38077->38084 38089 58fd9c8 38077->38089 38093 58fcc44 38077->38093 38102 58fd9b7 38077->38102 38106 58fe718 38077->38106 38085 58fda07 38084->38085 38086 58fda26 38084->38086 38087 58fda0f 38085->38087 38088 58fcc44 CallWindowProcW 38085->38088 38086->38086 38087->38078 38088->38087 38090 58fd9ee 38089->38090 38091 58fcc44 CallWindowProcW 38090->38091 38092 58fda0f 38091->38092 38092->38078 38094 58fcc4f 38093->38094 38095 58fe789 38094->38095 38097 58fe779 38094->38097 38131 58fcd6c 38095->38131 38115 58fe97c 38097->38115 38121 58fe8b0 38097->38121 38126 58fe8a0 38097->38126 38098 58fe787 38098->38098 38103 58fd9c5 38102->38103 38104 58fcc44 CallWindowProcW 38103->38104 38105 58fda0f 38104->38105 38105->38078 38107 58fe728 38106->38107 38108 58fe789 38107->38108 38110 58fe779 38107->38110 38109 58fcd6c CallWindowProcW 38108->38109 38111 58fe787 38109->38111 38112 58fe97c CallWindowProcW 38110->38112 38113 58fe8a0 CallWindowProcW 38110->38113 38114 58fe8b0 CallWindowProcW 38110->38114 38111->38111 38112->38111 38113->38111 38114->38111 38116 58fe93a 38115->38116 38117 58fe98a 38115->38117 38135 58fe958 38116->38135 38139 58fe968 38116->38139 38118 58fe950 38118->38098 38123 58fe8c4 38121->38123 38122 58fe950 38122->38098 38124 58fe958 CallWindowProcW 38123->38124 38125 58fe968 CallWindowProcW 38123->38125 38124->38122 38125->38122 38128 58fe8ae 38126->38128 38127 58fe950 38127->38098 38129 58fe958 CallWindowProcW 38128->38129 38130 58fe968 CallWindowProcW 38128->38130 38129->38127 38130->38127 38132 58fcd77 38131->38132 38133 58ffe6a CallWindowProcW 38132->38133 38134 58ffe19 38132->38134 38133->38134 38134->38098 38136 58fe968 38135->38136 38137 58fe979 38136->38137 38142 58ffdb0 38136->38142 38137->38118 38140 58fe979 38139->38140 38141 58ffdb0 CallWindowProcW 38139->38141 38140->38118 38141->38140 38143 58fcd6c CallWindowProcW 38142->38143 38144 58ffdba 38143->38144 38144->38137 37996 10cec40 37997 10cec86 GlobalMemoryStatusEx 37996->37997 37998 10cecb6 37997->37998 37999 58fb680 38000 58fb6c8 LoadLibraryExW 37999->38000 38001 58fb6c2 37999->38001 38002 58fb6f9 38000->38002 38001->38000 38003 58faf60 38005 58faf91 38003->38005 38006 58fb091 38003->38006 38004 58faf9d 38005->38004 38012 58fb1c8 38005->38012 38017 58fb1d8 38005->38017 38007 58fafdd 38021 58fc4d8 38007->38021 38028 58fc4d1 38007->38028 38013 58fb1d8 38012->38013 38035 58fb228 38013->38035 38044 58fb218 38013->38044 38014 58fb1e2 38014->38007 38019 58fb218 2 API calls 38017->38019 38020 58fb228 2 API calls 38017->38020 38018 58fb1e2 38018->38007 38019->38018 38020->38018 38022 58fc503 38021->38022 38060 58fca30 38022->38060 38064 58fca40 38022->38064 38023 58fc586 38024 58fa17c GetModuleHandleW 38023->38024 38025 58fc5b2 38023->38025 38024->38025 38029 58fc4d8 38028->38029 38033 58fca30 GetModuleHandleW 38029->38033 38034 58fca40 GetModuleHandleW 38029->38034 38030 58fc586 38031 58fa17c GetModuleHandleW 38030->38031 38032 58fc5b2 38030->38032 38031->38032 38033->38030 38034->38030 38036 58fb239 38035->38036 38039 58fb25c 38035->38039 38053 58fa17c 38036->38053 38039->38014 38040 58fb254 38040->38039 38041 58fb460 GetModuleHandleW 38040->38041 38042 58fb48d 38041->38042 38042->38014 38045 58fb21d 38044->38045 38046 58fa17c GetModuleHandleW 38045->38046 38048 58fb25c 38045->38048 38047 58fb244 38046->38047 38047->38048 38052 58fb4b2 GetModuleHandleW 38047->38052 38048->38014 38049 58fb254 38049->38048 38050 58fb460 GetModuleHandleW 38049->38050 38051 58fb48d 38050->38051 38051->38014 38052->38049 38054 58fb418 GetModuleHandleW 38053->38054 38056 58fb244 38054->38056 38056->38039 38057 58fb4b2 38056->38057 38058 58fa17c GetModuleHandleW 38057->38058 38059 58fb4d4 38058->38059 38059->38040 38061 58fca40 38060->38061 38062 58fcaee 38061->38062 38068 58fd017 38061->38068 38065 58fca6d 38064->38065 38066 58fcaee 38065->38066 38067 58fd017 GetModuleHandleW 38065->38067 38067->38066 38069 58fd022 38068->38069 38070 58fa17c GetModuleHandleW 38069->38070 38071 58fd133 38070->38071 38072 58fa17c GetModuleHandleW 38071->38072 38074 58fd1ad 38071->38074 38073 58fd181 38072->38073 38073->38074 38075 58fa17c GetModuleHandleW 38073->38075 38074->38062 38075->38074 38145 58fd810 38146 58fd878 CreateWindowExW 38145->38146 38148 58fd934 38146->38148

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 652 69030f8-6903119 653 690311b-690311e 652->653 654 6903120-690313f 653->654 655 6903144-6903147 653->655 654->655 656 69038e8-69038ea 655->656 657 690314d-690316c 655->657 658 69038f1-69038f4 656->658 659 69038ec 656->659 665 6903185-690318f 657->665 666 690316e-6903171 657->666 658->653 661 69038fa-6903903 658->661 659->658 670 6903195-69031a4 665->670 666->665 667 6903173-6903183 666->667 667->670 778 69031a6 call 6903910 670->778 779 69031a6 call 6903918 670->779 671 69031ab-69031b0 672 69031b2-69031b8 671->672 673 69031bd-690349a 671->673 672->661 694 69034a0-690354f 673->694 695 69038da-69038e7 673->695 704 6903551-6903576 694->704 705 6903578 694->705 706 6903581-6903594 704->706 705->706 709 69038c1-69038cd 706->709 710 690359a-69035bc 706->710 709->694 711 69038d3 709->711 710->709 713 69035c2-69035cc 710->713 711->695 713->709 714 69035d2-69035dd 713->714 714->709 715 69035e3-69036b9 714->715 727 69036c7-69036f7 715->727 728 69036bb-69036bd 715->728 732 6903705-6903711 727->732 733 69036f9-69036fb 727->733 728->727 734 6903771-6903775 732->734 735 6903713-6903717 732->735 733->732 736 69038b2-69038bb 734->736 737 690377b-69037b7 734->737 735->734 738 6903719-6903743 735->738 736->709 736->715 748 69037c5-69037d3 737->748 749 69037b9-69037bb 737->749 745 6903751-690376e 738->745 746 6903745-6903747 738->746 745->734 746->745 752 69037d5-69037e0 748->752 753 69037ea-69037f5 748->753 749->748 752->753 758 69037e2 752->758 756 69037f7-69037fd 753->756 757 690380d-690381e 753->757 759 6903801-6903803 756->759 760 69037ff 756->760 762 6903820-6903826 757->762 763 6903836-6903842 757->763 758->753 759->757 760->757 764 6903828 762->764 765 690382a-690382c 762->765 767 6903844-690384a 763->767 768 690385a-69038ab 763->768 764->763 765->763 769 690384c 767->769 770 690384e-6903850 767->770 768->736 769->768 770->768 778->671 779->671
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-3723351465
                                        • Opcode ID: 9d50392fa63a3bbc7d6b65bcd11f37897d902c4110fd229a27bce2cdf13b4590
                                        • Instruction ID: 063a5cf578de51e499218760d00b1778a5f599b0e06a32ddd61f9335228c2f17
                                        • Opcode Fuzzy Hash: 9d50392fa63a3bbc7d6b65bcd11f37897d902c4110fd229a27bce2cdf13b4590
                                        • Instruction Fuzzy Hash: 37325131E1061ACFDB15EF75D89459DB7B6FFC9304F20C6AAD409AB254EB30A985CB80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-3723351465
                                        • Opcode ID: b08e2cda95d61f9e727259fce1fce4e45f46edc52253a7e0ff82995a3ff4fc15
                                        • Instruction ID: 62d2f26a68506ea96595ff73b72c26948ca4dc5a20082f9475d5c2fe5af03e53
                                        • Opcode Fuzzy Hash: b08e2cda95d61f9e727259fce1fce4e45f46edc52253a7e0ff82995a3ff4fc15
                                        • Instruction Fuzzy Hash: 9F026F30E0021A8FEF64CF68D58066DB7FAEF45310F20892AD415DBA99DB36DD45CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1322 6907e08-6907e26 1323 6907e28-6907e2b 1322->1323 1324 6907e4c-6907e4f 1323->1324 1325 6907e2d-6907e47 1323->1325 1326 6907e51-6907e6d 1324->1326 1327 6907e72-6907e75 1324->1327 1325->1324 1326->1327 1329 6907e82-6907e85 1327->1329 1330 6907e77-6907e81 1327->1330 1331 6907e87-6907e95 1329->1331 1332 6907e9c-6907e9e 1329->1332 1338 6907eae-6907ec4 1331->1338 1340 6907e97 1331->1340 1334 6907ea0 1332->1334 1335 6907ea5-6907ea8 1332->1335 1334->1335 1335->1323 1335->1338 1342 6907eca-6907ed3 1338->1342 1343 69080df-69080e9 1338->1343 1340->1332 1344 6907ed9-6907ef6 1342->1344 1345 69080ea-690811f 1342->1345 1352 69080cc-69080d9 1344->1352 1353 6907efc-6907f24 1344->1353 1348 6908121-6908124 1345->1348 1349 69081d1-69081d4 1348->1349 1350 690812a-6908136 1348->1350 1354 69081d6-69081f2 1349->1354 1355 69081f7-69081fa 1349->1355 1358 6908141-6908143 1350->1358 1352->1342 1352->1343 1353->1352 1376 6907f2a-6907f33 1353->1376 1354->1355 1356 6908200-690820f 1355->1356 1357 690842f-6908431 1355->1357 1371 6908211-690822c 1356->1371 1372 690822e-6908272 1356->1372 1362 6908433 1357->1362 1363 6908438-690843b 1357->1363 1360 6908145-690814b 1358->1360 1361 690815b-690815f 1358->1361 1366 690814d 1360->1366 1367 690814f-6908151 1360->1367 1368 6908161-690816b 1361->1368 1369 690816d 1361->1369 1362->1363 1363->1348 1370 6908441-690844a 1363->1370 1366->1361 1367->1361 1374 6908172-6908174 1368->1374 1369->1374 1371->1372 1383 6908403-6908419 1372->1383 1384 6908278-6908289 1372->1384 1377 6908176-6908179 1374->1377 1378 690818b-69081c4 1374->1378 1376->1345 1380 6907f39-6907f55 1376->1380 1377->1370 1378->1356 1402 69081c6-69081d0 1378->1402 1389 69080ba-69080c6 1380->1389 1390 6907f5b-6907f85 1380->1390 1383->1357 1393 69083ee-69083fd 1384->1393 1394 690828f-69082ac 1384->1394 1389->1352 1389->1376 1405 69080b0-69080b5 1390->1405 1406 6907f8b-6907fb3 1390->1406 1393->1383 1393->1384 1394->1393 1403 69082b2-69083a8 call 6906628 1394->1403 1455 69083b6 1403->1455 1456 69083aa-69083b4 1403->1456 1405->1389 1406->1405 1412 6907fb9-6907fe7 1406->1412 1412->1405 1418 6907fed-6907ff6 1412->1418 1418->1405 1419 6907ffc-690802e 1418->1419 1427 6908030-6908034 1419->1427 1428 6908039-6908055 1419->1428 1427->1405 1429 6908036 1427->1429 1428->1389 1430 6908057-69080ae call 6906628 1428->1430 1429->1428 1430->1389 1457 69083bb-69083bd 1455->1457 1456->1457 1457->1393 1458 69083bf-69083c4 1457->1458 1459 69083d2 1458->1459 1460 69083c6-69083d0 1458->1460 1461 69083d7-69083d9 1459->1461 1460->1461 1461->1393 1462 69083db-69083e7 1461->1462 1462->1393
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q
                                        • API String ID: 0-127220927
                                        • Opcode ID: 44745da4c029bcb90c5d77e7564baa634cb91f5bd948e1c21367852f7e544ffd
                                        • Instruction ID: 756e7ae46d5fdc9ea280948be7e6ebb186c4484e0d4a1efdc76f4de5bde1fe4f
                                        • Opcode Fuzzy Hash: 44745da4c029bcb90c5d77e7564baa634cb91f5bd948e1c21367852f7e544ffd
                                        • Instruction Fuzzy Hash: A6029C30B002159FEF54DB68D594AAEB7FAFF84304F248529E4099B795DB35EC42CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2267 6905630-690564d 2268 690564f-6905652 2267->2268 2269 6905654-690566a 2268->2269 2270 690566f-6905672 2268->2270 2269->2270 2271 6905683-6905686 2270->2271 2272 6905674-6905678 2270->2272 2273 6905688-6905698 2271->2273 2274 690569d-69056a0 2271->2274 2276 69057f5-6905802 2272->2276 2277 690567e 2272->2277 2273->2274 2278 69056a2-69056a7 2274->2278 2279 69056aa-69056ad 2274->2279 2277->2271 2278->2279 2281 69056b3-69056b6 2279->2281 2282 69057b7-69057bd 2279->2282 2283 69056b8-69056be 2281->2283 2284 69056c9-69056cc 2281->2284 2285 6905780-6905786 2282->2285 2286 69057bf 2282->2286 2289 69056c4 2283->2289 2290 6905775-6905776 2283->2290 2291 69056e4-69056e7 2284->2291 2292 69056ce-69056df 2284->2292 2287 6905803-6905833 2285->2287 2288 6905788-6905793 2285->2288 2293 69057c4-69057c7 2286->2293 2316 690583d-6905840 2287->2316 2288->2287 2295 6905795-69057a2 2288->2295 2289->2284 2294 690577b-690577e 2290->2294 2296 69056e9-69056ea 2291->2296 2297 69056ef-69056f2 2291->2297 2292->2291 2298 69057e3-69057e5 2293->2298 2299 69057c9-69057de 2293->2299 2294->2285 2304 69057ad-69057b0 2294->2304 2295->2287 2306 69057a4-69057a8 2295->2306 2296->2297 2300 69056f4-69056f6 2297->2300 2301 69056f9-69056fc 2297->2301 2302 69057e7 2298->2302 2303 69057ec-69057ef 2298->2303 2299->2298 2300->2301 2309 6905709-690570c 2301->2309 2310 69056fe-6905704 2301->2310 2302->2303 2303->2268 2303->2276 2311 69057b2-69057b5 2304->2311 2312 6905766-6905769 2304->2312 2306->2304 2314 690570e-690571c 2309->2314 2315 690572b-690572e 2309->2315 2310->2309 2311->2282 2311->2293 2313 690576b 2312->2313 2312->2314 2317 6905770-6905773 2313->2317 2322 6905723-6905726 2314->2322 2318 6905730-6905739 2315->2318 2319 690573a-690573d 2315->2319 2320 6905842-6905849 2316->2320 2321 6905854-6905857 2316->2321 2317->2290 2317->2294 2323 6905761-6905764 2319->2323 2324 690573f-690575c 2319->2324 2325 690591e-6905925 2320->2325 2326 690584f 2320->2326 2327 6905879-690587c 2321->2327 2328 6905859-690585d 2321->2328 2322->2315 2323->2312 2323->2317 2324->2323 2326->2321 2329 6905894-6905897 2327->2329 2330 690587e-690588f 2327->2330 2331 6905863-690586b 2328->2331 2332 6905926-6905964 2328->2332 2334 69058a8-69058ab 2329->2334 2335 6905899-69058a3 2329->2335 2330->2329 2331->2332 2333 6905871-6905874 2331->2333 2345 6905966-6905969 2332->2345 2333->2327 2338 69058c5-69058c8 2334->2338 2339 69058ad-69058b1 2334->2339 2335->2334 2343 69058e2-69058e5 2338->2343 2344 69058ca-69058ce 2338->2344 2339->2332 2342 69058b3-69058bb 2339->2342 2342->2332 2349 69058bd-69058c0 2342->2349 2347 69058e7-69058ee 2343->2347 2348 69058ef-69058f2 2343->2348 2344->2332 2350 69058d0-69058d8 2344->2350 2351 6905973-6905976 2345->2351 2352 690596b-6905970 2345->2352 2356 69058f4-69058f8 2348->2356 2357 690590c-690590e 2348->2357 2349->2338 2350->2332 2353 69058da-69058dd 2350->2353 2354 6905a19-6905bad 2351->2354 2355 690597c-690597f 2351->2355 2352->2351 2353->2343 2416 6905ce3-6905cf6 2354->2416 2417 6905bb3-6905bba 2354->2417 2358 6905981-6905994 2355->2358 2359 6905997-690599a 2355->2359 2356->2332 2360 69058fa-6905902 2356->2360 2361 6905910 2357->2361 2362 6905915-6905918 2357->2362 2363 69059a8-69059ab 2359->2363 2364 690599c-69059a3 2359->2364 2360->2332 2365 6905904-6905907 2360->2365 2361->2362 2362->2316 2362->2325 2368 69059c5-69059c8 2363->2368 2369 69059ad-69059be 2363->2369 2364->2363 2365->2357 2370 69059e2-69059e5 2368->2370 2371 69059ca-69059db 2368->2371 2377 69059f8-6905a09 2369->2377 2378 69059c0 2369->2378 2373 69059f3-69059f6 2370->2373 2374 69059e7-69059ee 2370->2374 2371->2364 2381 69059dd 2371->2381 2376 6905a10-6905a13 2373->2376 2373->2377 2374->2373 2376->2354 2382 6905cf9-6905cfc 2376->2382 2377->2364 2387 6905a0b 2377->2387 2378->2368 2381->2370 2385 6905d1a-6905d1d 2382->2385 2386 6905cfe-6905d0f 2382->2386 2385->2354 2388 6905d23-6905d26 2385->2388 2386->2358 2395 6905d15 2386->2395 2387->2376 2391 6905d44-6905d46 2388->2391 2392 6905d28-6905d39 2388->2392 2393 6905d48 2391->2393 2394 6905d4d-6905d50 2391->2394 2392->2364 2399 6905d3f 2392->2399 2393->2394 2394->2345 2396 6905d56-6905d5f 2394->2396 2395->2385 2399->2391 2418 6905bc0-6905bf3 2417->2418 2419 6905c6e-6905c75 2417->2419 2429 6905bf5 2418->2429 2430 6905bf8-6905c39 2418->2430 2419->2416 2420 6905c77-6905caa 2419->2420 2432 6905cac 2420->2432 2433 6905caf-6905cdc 2420->2433 2429->2430 2441 6905c51-6905c58 2430->2441 2442 6905c3b-6905c4c 2430->2442 2432->2433 2433->2396 2444 6905c60-6905c62 2441->2444 2442->2396 2444->2396
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $
                                        • API String ID: 0-3993045852
                                        • Opcode ID: 4e0103e767335f97c8ba0850d792fecdcb79a1d59f5752ef514d62611befa14b
                                        • Instruction ID: 05f996de9aae2f7460b3f81492754f2368e54b5ca86ebf1ec01120f80d809cb7
                                        • Opcode Fuzzy Hash: 4e0103e767335f97c8ba0850d792fecdcb79a1d59f5752ef514d62611befa14b
                                        • Instruction Fuzzy Hash: 9622F475E002158FEF64CBA4C6806AEBBF5EF84320F21856AD459EB794DA31DC42CF91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4e281af81a64623329c6fca30208038df4e95313467fd8ebe1a472ef7ed96570
                                        • Instruction ID: 2cf5d64956ba673ba6e0c22a96bb1f7c8b85b2f044d0695c2064ecf7a0645fc1
                                        • Opcode Fuzzy Hash: 4e281af81a64623329c6fca30208038df4e95313467fd8ebe1a472ef7ed96570
                                        • Instruction Fuzzy Hash: D062BD34F002058FEB54DBA8D590AADB7F6EF84314F248569E40AEB794DB35EC46CB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 292409787c91d9bf1024427de503b793539e214f5c8773a0e0a7b78111949e27
                                        • Instruction ID: 9041105dda23ff62d76759ac4fefc593ea9e4706f32d7001e48eb9172c4bb53c
                                        • Opcode Fuzzy Hash: 292409787c91d9bf1024427de503b793539e214f5c8773a0e0a7b78111949e27
                                        • Instruction Fuzzy Hash: DE329034B00216DFEB54DB68D580BADB7B6FB88310F208629E415EB794DB35EC46CB91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 39c6891b62b852fe7632af6096ecd7ab289b7675f53ada02c2516a1bc8dbd8ba
                                        • Instruction ID: 27432daaba63c83e28c32b9d3b6c9cf33e81655d21259577c6398abcb5cccda6
                                        • Opcode Fuzzy Hash: 39c6891b62b852fe7632af6096ecd7ab289b7675f53ada02c2516a1bc8dbd8ba
                                        • Instruction Fuzzy Hash: 35226130E102098FEF64CB69D5807ADB7FAEB45310F308929E409EB799DA36DD81CB51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 526 690ad60-690ad7e 527 690ad80-690ad83 526->527 528 690ad85-690ad92 527->528 529 690ad97-690ad9a 527->529 528->529 530 690adab-690adae 529->530 531 690ad9c-690ada0 529->531 534 690adb4-690adb7 530->534 535 690af7d-690af86 530->535 532 690ada6 531->532 533 690af8c-690af96 531->533 532->530 538 690adb9-690add5 534->538 539 690adda-690addd 534->539 535->533 537 690adf2-690adfb 535->537 542 690ae01-690ae05 537->542 543 690af97-690afa9 537->543 538->539 540 690aded-690adf0 539->540 541 690addf-690ade8 539->541 540->537 545 690ae0a-690ae0d 540->545 541->540 542->545 552 690af38 543->552 553 690afab-690afce 543->553 547 690ae27-690ae2a 545->547 548 690ae0f-690ae22 545->548 549 690ae34-690ae36 547->549 550 690ae2c-690ae31 547->550 548->547 556 690ae38 549->556 557 690ae3d-690ae40 549->557 550->549 554 690af42-690af73 552->554 558 690afd0-690afd3 553->558 584 690af7a 554->584 556->557 557->527 561 690ae46-690ae6a 557->561 559 690afe0-690afe3 558->559 560 690afd5-690afd9 558->560 564 690aff2-690aff5 559->564 565 690afe5 call 690b2ba 559->565 562 690b031-690b06c 560->562 563 690afdb 560->563 583 690ae70-690ae7f 561->583 561->584 575 690b072-690b07e 562->575 576 690b25f-690b272 562->576 563->559 567 690b002-690b005 564->567 568 690aff7-690b001 564->568 571 690afeb-690afed 565->571 572 690b007-690b023 567->572 573 690b028-690b02b 567->573 571->564 572->573 573->562 578 690b294-690b296 573->578 589 690b080-690b099 575->589 590 690b09e-690b0e2 575->590 579 690b274 576->579 580 690b298 578->580 581 690b29d-690b2a0 578->581 579->578 580->581 581->558 587 690b2a6-690b2b0 581->587 593 690ae81-690ae87 583->593 594 690ae97-690aed2 call 6906628 583->594 584->535 589->579 608 690b0e4-690b0f6 590->608 609 690b0fe-690b13d 590->609 597 690ae89 593->597 598 690ae8b-690ae8d 593->598 611 690aed4-690aeda 594->611 612 690aeea-690af01 594->612 597->594 598->594 608->609 617 690b143-690b21e call 6906628 609->617 618 690b224-690b239 609->618 615 690aedc 611->615 616 690aede-690aee0 611->616 624 690af03-690af09 612->624 625 690af19-690af2a 612->625 615->612 616->612 617->618 618->576 627 690af0b 624->627 628 690af0d-690af0f 624->628 625->554 632 690af2c-690af32 625->632 627->625 628->625 633 690af34 632->633 634 690af36 632->634 633->554 634->552
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: XM$XM$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-1012131581
                                        • Opcode ID: 4dc23326ce666f07c1d2cd09039475a1873e068d2522ebcb5a9c29da0edc0166
                                        • Instruction ID: 785ca598ad07f08b2120dcce833eb5a41a2fede20fa92ca554db473b01b3f103
                                        • Opcode Fuzzy Hash: 4dc23326ce666f07c1d2cd09039475a1873e068d2522ebcb5a9c29da0edc0166
                                        • Instruction Fuzzy Hash: 79E16130E103098FDB65DF69D5906AEB7BAFF84304F208929E409AB795DB35DC46CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 950 69091d8-69091fd 951 69091ff-6909202 950->951 952 6909ac0-6909ac3 951->952 953 6909208-690921d 951->953 954 6909ac5-6909ae4 952->954 955 6909ae9-6909aeb 952->955 960 6909235-690924b 953->960 961 690921f-6909225 953->961 954->955 957 6909af2-6909af5 955->957 958 6909aed 955->958 957->951 962 6909afb-6909b05 957->962 958->957 967 6909256-6909258 960->967 963 6909227 961->963 964 6909229-690922b 961->964 963->960 964->960 968 6909270-69092e1 967->968 969 690925a-6909260 967->969 980 69092e3-6909306 968->980 981 690930d-6909329 968->981 970 6909262 969->970 971 6909264-6909266 969->971 970->968 971->968 980->981 986 6909355-6909370 981->986 987 690932b-690934e 981->987 992 6909372-6909394 986->992 993 690939b-69093b6 986->993 987->986 992->993 998 69093b8-69093d4 993->998 999 69093db-69093e9 993->999 998->999 1000 69093f9-6909473 999->1000 1001 69093eb-69093f4 999->1001 1007 69094c0-69094d5 1000->1007 1008 6909475-6909493 1000->1008 1001->962 1007->952 1012 6909495-69094a4 1008->1012 1013 69094af-69094be 1008->1013 1012->1013 1013->1007 1013->1008
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q
                                        • API String ID: 0-858218434
                                        • Opcode ID: b363e2551e6a7888fbd6b605a952d42ddb04eb76e9cffb61df4ed2e282eb4c2a
                                        • Instruction ID: aff4d0556090a4706f0c05c2a6e8027cd43e0d76187c973136d165c4a7f2e58b
                                        • Opcode Fuzzy Hash: b363e2551e6a7888fbd6b605a952d42ddb04eb76e9cffb61df4ed2e282eb4c2a
                                        • Instruction Fuzzy Hash: 07916230B1021A9FDB54DF69D850B9EB7F6BF89204F108569D40DEB389EE309D46CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1016 690cfe8-690d003 1017 690d005-690d008 1016->1017 1018 690d012-690d015 1017->1018 1019 690d00a-690d00f 1017->1019 1020 690d032-690d035 1018->1020 1021 690d017-690d02d 1018->1021 1019->1018 1022 690d037-690d046 1020->1022 1023 690d07e-690d081 1020->1023 1021->1020 1027 690d055-690d061 1022->1027 1028 690d048-690d04d 1022->1028 1024 690d4d4-690d4e0 1023->1024 1025 690d087-690d08a 1023->1025 1024->1022 1031 690d4e6-690d7d3 1024->1031 1029 690d0d3-690d0d6 1025->1029 1030 690d08c-690d09b 1025->1030 1032 690da05-690da3e 1027->1032 1033 690d067-690d079 1027->1033 1028->1027 1037 690d0d8-690d11a 1029->1037 1038 690d11f-690d122 1029->1038 1034 690d0aa-690d0b6 1030->1034 1035 690d09d-690d0a2 1030->1035 1228 690d7d9-690d7df 1031->1228 1229 690d9fa-690da04 1031->1229 1045 690da40-690da43 1032->1045 1033->1023 1034->1032 1042 690d0bc-690d0ce 1034->1042 1035->1034 1037->1038 1043 690d124-690d166 1038->1043 1044 690d16b-690d16e 1038->1044 1042->1029 1043->1044 1046 690d170-690d18c 1044->1046 1047 690d191-690d194 1044->1047 1049 690da45-690da71 1045->1049 1050 690da76-690da79 1045->1050 1046->1047 1052 690d196-690d1d8 1047->1052 1053 690d1dd-690d1e0 1047->1053 1049->1050 1057 690da88-690da8b 1050->1057 1058 690da7b call 690db5d 1050->1058 1052->1053 1060 690d1e2-690d1e4 1053->1060 1061 690d1ef-690d1f2 1053->1061 1064 690da8d-690daa9 1057->1064 1065 690daae-690dab0 1057->1065 1074 690da81-690da83 1058->1074 1062 690d1ea 1060->1062 1063 690d38f-690d398 1060->1063 1066 690d1f4-690d236 1061->1066 1067 690d23b-690d23e 1061->1067 1062->1061 1076 690d3a7-690d3b3 1063->1076 1077 690d39a-690d39f 1063->1077 1064->1065 1078 690dab2 1065->1078 1079 690dab7-690daba 1065->1079 1066->1067 1072 690d240-690d282 1067->1072 1073 690d287-690d28a 1067->1073 1072->1073 1080 690d2d3-690d2d6 1073->1080 1081 690d28c-690d2ce 1073->1081 1074->1057 1084 690d4c4-690d4c9 1076->1084 1085 690d3b9-690d3cd 1076->1085 1077->1076 1078->1079 1079->1045 1082 690dabc-690dacb 1079->1082 1091 690d2e5-690d2e8 1080->1091 1092 690d2d8-690d2da 1080->1092 1081->1080 1107 690db32-690db47 1082->1107 1108 690dacd-690db30 call 6906628 1082->1108 1099 690d4d1 1084->1099 1085->1099 1110 690d3d3-690d3e5 1085->1110 1100 690d331-690d334 1091->1100 1101 690d2ea-690d32c 1091->1101 1098 690d2e0 1092->1098 1092->1099 1098->1091 1099->1024 1112 690d336-690d378 1100->1112 1113 690d37d-690d37f 1100->1113 1101->1100 1108->1107 1133 690d3e7-690d3ed 1110->1133 1134 690d409-690d40b 1110->1134 1112->1113 1117 690d381 1113->1117 1118 690d386-690d389 1113->1118 1117->1118 1118->1017 1118->1063 1137 690d3f1-690d3fd 1133->1137 1138 690d3ef 1133->1138 1139 690d415-690d421 1134->1139 1145 690d3ff-690d407 1137->1145 1138->1145 1155 690d423-690d42d 1139->1155 1156 690d42f 1139->1156 1145->1139 1159 690d434-690d436 1155->1159 1156->1159 1159->1099 1162 690d43c-690d458 call 6906628 1159->1162 1171 690d467-690d473 1162->1171 1172 690d45a-690d45f 1162->1172 1171->1084 1174 690d475-690d4c2 1171->1174 1172->1171 1174->1099 1230 690d7e1-690d7e6 1228->1230 1231 690d7ee-690d7f7 1228->1231 1230->1231 1231->1032 1232 690d7fd-690d810 1231->1232 1234 690d816-690d81c 1232->1234 1235 690d9ea-690d9f4 1232->1235 1236 690d82b-690d834 1234->1236 1237 690d81e-690d823 1234->1237 1235->1228 1235->1229 1236->1032 1238 690d83a-690d85b 1236->1238 1237->1236 1241 690d86a-690d873 1238->1241 1242 690d85d-690d862 1238->1242 1241->1032 1243 690d879-690d896 1241->1243 1242->1241 1243->1235 1246 690d89c-690d8a2 1243->1246 1246->1032 1247 690d8a8-690d8c1 1246->1247 1249 690d8c7-690d8ee 1247->1249 1250 690d9dd-690d9e4 1247->1250 1249->1032 1253 690d8f4-690d8fe 1249->1253 1250->1235 1250->1246 1253->1032 1254 690d904-690d91b 1253->1254 1256 690d92a-690d945 1254->1256 1257 690d91d-690d928 1254->1257 1256->1250 1262 690d94b-690d964 call 6906628 1256->1262 1257->1256 1266 690d973-690d97c 1262->1266 1267 690d966-690d96b 1262->1267 1266->1032 1268 690d982-690d9d6 1266->1268 1267->1266 1268->1250
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q
                                        • API String ID: 0-182748909
                                        • Opcode ID: c7a1909a3c34ce10843d6aa3b068508cef8b4e4977ff335be3f3046543c4af64
                                        • Instruction ID: f1de3454919dec7f11440a445ac11c5dcfc9abe1a1159d20fc43a45456c7215a
                                        • Opcode Fuzzy Hash: c7a1909a3c34ce10843d6aa3b068508cef8b4e4977ff335be3f3046543c4af64
                                        • Instruction Fuzzy Hash: 64624230A002168FDB55EF68E590A5DB7F6FF84304B20CA68D0099F759DB75ED4ACB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1276 6904c08-6904c2c 1277 6904c2e-6904c31 1276->1277 1278 6904c52-6904c55 1277->1278 1279 6904c33-6904c4d 1277->1279 1280 6905334-6905336 1278->1280 1281 6904c5b-6904d53 1278->1281 1279->1278 1283 6905338 1280->1283 1284 690533d-6905340 1280->1284 1299 6904dd6-6904ddd 1281->1299 1300 6904d59-6904da6 call 69054b1 1281->1300 1283->1284 1284->1277 1285 6905346-6905353 1284->1285 1301 6904e61-6904e6a 1299->1301 1302 6904de3-6904e53 1299->1302 1313 6904dac-6904dc8 1300->1313 1301->1285 1319 6904e55 1302->1319 1320 6904e5e 1302->1320 1317 6904dd3 1313->1317 1318 6904dca 1313->1318 1317->1299 1318->1317 1319->1320 1320->1301
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fbq$XPbq$\Obq
                                        • API String ID: 0-4057264190
                                        • Opcode ID: 9f6412f58da3d7e225c0f8d60cb48f9a0115904e78ec14a590c48c5452b4ea52
                                        • Instruction ID: a0b04cd1a42f204caa8c96815297691fdc2d5b714e263316dd469089a3d9f61f
                                        • Opcode Fuzzy Hash: 9f6412f58da3d7e225c0f8d60cb48f9a0115904e78ec14a590c48c5452b4ea52
                                        • Instruction Fuzzy Hash: 7F615130E00219DFEB549FA5C855BAEBBF6FF88700F208429E109AB395DE758D458B91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2154 69091c8-69091fd 2155 69091ff-6909202 2154->2155 2156 6909ac0-6909ac3 2155->2156 2157 6909208-690921d 2155->2157 2158 6909ac5-6909ae4 2156->2158 2159 6909ae9-6909aeb 2156->2159 2164 6909235-690924b 2157->2164 2165 690921f-6909225 2157->2165 2158->2159 2161 6909af2-6909af5 2159->2161 2162 6909aed 2159->2162 2161->2155 2166 6909afb-6909b05 2161->2166 2162->2161 2171 6909256-6909258 2164->2171 2167 6909227 2165->2167 2168 6909229-690922b 2165->2168 2167->2164 2168->2164 2172 6909270-69092e1 2171->2172 2173 690925a-6909260 2171->2173 2184 69092e3-6909306 2172->2184 2185 690930d-6909329 2172->2185 2174 6909262 2173->2174 2175 6909264-6909266 2173->2175 2174->2172 2175->2172 2184->2185 2190 6909355-6909370 2185->2190 2191 690932b-690934e 2185->2191 2196 6909372-6909394 2190->2196 2197 690939b-69093b6 2190->2197 2191->2190 2196->2197 2202 69093b8-69093d4 2197->2202 2203 69093db-69093e9 2197->2203 2202->2203 2204 69093f9-6909473 2203->2204 2205 69093eb-69093f4 2203->2205 2211 69094c0-69094d5 2204->2211 2212 6909475-6909493 2204->2212 2205->2166 2211->2156 2216 6909495-69094a4 2212->2216 2217 69094af-69094be 2212->2217 2216->2217 2217->2211 2217->2212
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q
                                        • API String ID: 0-127220927
                                        • Opcode ID: 93462d56aa91056bc101ff09da47a2b4cb5384627a766bf9f24a03a7cbdf34b4
                                        • Instruction ID: e7890116e90175b4ad91875048370bee9e3b9c2dcdd10f294a121da5ec402cc1
                                        • Opcode Fuzzy Hash: 93462d56aa91056bc101ff09da47a2b4cb5384627a766bf9f24a03a7cbdf34b4
                                        • Instruction Fuzzy Hash: 1A514030B101159FDB54DB79D890BAEB7F6AF88604F108569D80DEB399EE309C47CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2220 6904bf8-6904c2c 2222 6904c2e-6904c31 2220->2222 2223 6904c52-6904c55 2222->2223 2224 6904c33-6904c4d 2222->2224 2225 6905334-6905336 2223->2225 2226 6904c5b-6904d53 2223->2226 2224->2223 2228 6905338 2225->2228 2229 690533d-6905340 2225->2229 2244 6904dd6-6904ddd 2226->2244 2245 6904d59-6904da6 call 69054b1 2226->2245 2228->2229 2229->2222 2230 6905346-6905353 2229->2230 2246 6904e61-6904e6a 2244->2246 2247 6904de3-6904e53 2244->2247 2258 6904dac-6904dc8 2245->2258 2246->2230 2264 6904e55 2247->2264 2265 6904e5e 2247->2265 2262 6904dd3 2258->2262 2263 6904dca 2258->2263 2262->2244 2263->2262 2264->2265 2265->2246
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fbq$XPbq
                                        • API String ID: 0-2292610095
                                        • Opcode ID: 613424e5db56bfc00d06743aa3b483c145e648ba4f8bbc911d99a4a39314fb02
                                        • Instruction ID: 7d7387be8558e2c8a2a7046f4d0c45859090ec146d95e2c8d16ba675670935f7
                                        • Opcode Fuzzy Hash: 613424e5db56bfc00d06743aa3b483c145e648ba4f8bbc911d99a4a39314fb02
                                        • Instruction Fuzzy Hash: C0516030F002199FEB549FA5C855BAEBBF6BF88700F20C529E106AB395DA759D01CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2445 58fb228-58fb237 2446 58fb239-58fb246 call 58fa17c 2445->2446 2447 58fb263-58fb267 2445->2447 2453 58fb25c 2446->2453 2454 58fb248-58fb256 call 58fb4b2 2446->2454 2449 58fb27b-58fb2bc 2447->2449 2450 58fb269-58fb273 2447->2450 2456 58fb2be-58fb2c6 2449->2456 2457 58fb2c9-58fb2d7 2449->2457 2450->2449 2453->2447 2454->2453 2464 58fb398-58fb458 2454->2464 2456->2457 2458 58fb2fb-58fb2fd 2457->2458 2459 58fb2d9-58fb2de 2457->2459 2461 58fb300-58fb307 2458->2461 2462 58fb2e9 2459->2462 2463 58fb2e0-58fb2e7 call 58fa188 2459->2463 2467 58fb309-58fb311 2461->2467 2468 58fb314-58fb31b 2461->2468 2465 58fb2eb-58fb2f9 2462->2465 2463->2465 2496 58fb45a-58fb45d 2464->2496 2497 58fb460-58fb48b GetModuleHandleW 2464->2497 2465->2461 2467->2468 2471 58fb31d-58fb325 2468->2471 2472 58fb328-58fb331 call 58f399c 2468->2472 2471->2472 2476 58fb33e-58fb343 2472->2476 2477 58fb333-58fb33b 2472->2477 2478 58fb345-58fb34c 2476->2478 2479 58fb361-58fb36e 2476->2479 2477->2476 2478->2479 2481 58fb34e-58fb35e call 58f9ff8 call 58fa198 2478->2481 2486 58fb391-58fb397 2479->2486 2487 58fb370-58fb38e 2479->2487 2481->2479 2487->2486 2496->2497 2498 58fb48d-58fb493 2497->2498 2499 58fb494-58fb4a8 2497->2499 2498->2499
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3247751496.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_58f0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 9bbeeaff873a23f913260ec31c84fb656631032d66b9f2975ba21cc6ba35b636
                                        • Instruction ID: c89d38a99cfd5d186d1ee4b49aa21ca84c9b70d970171c6bbc5be7fd48b19d82
                                        • Opcode Fuzzy Hash: 9bbeeaff873a23f913260ec31c84fb656631032d66b9f2975ba21cc6ba35b636
                                        • Instruction Fuzzy Hash: 3E715770A00B058FD724DF6AD444B6ABBF6FF88304F008A2DD98AD7A50DB35E845CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2502 58fd804-58fd876 2504 58fd878-58fd87e 2502->2504 2505 58fd881-58fd888 2502->2505 2504->2505 2506 58fd88a-58fd890 2505->2506 2507 58fd893-58fd8cb 2505->2507 2506->2507 2508 58fd8d3-58fd932 CreateWindowExW 2507->2508 2509 58fd93b-58fd973 2508->2509 2510 58fd934-58fd93a 2508->2510 2514 58fd975-58fd978 2509->2514 2515 58fd980 2509->2515 2510->2509 2514->2515 2516 58fd981 2515->2516 2516->2516
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 058FD922
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3247751496.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_58f0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: ddc2095ea9ae1018c93b8c8e1032459f517e0133485e73cfd89a95ad49d4d7ba
                                        • Instruction ID: 63b8c15fe9c205dba7e2b969c7223ab6b140db10f0f77e32f2224c9a0017ccaa
                                        • Opcode Fuzzy Hash: ddc2095ea9ae1018c93b8c8e1032459f517e0133485e73cfd89a95ad49d4d7ba
                                        • Instruction Fuzzy Hash: 0F51CFB1D00349AFDB14CF99C884ADEFBB5BF48310F24852AE919AB210D775A845CF90
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 058FD922
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3247751496.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_58f0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 5f20f5c074b790eb8e0e6bc73f99bab65d4073005cb8a7facbed76536242b3ee
                                        • Instruction ID: c2ba956980a1be57717a9236b54e36b7bc6281d3723416f43a791b43e5a91c5b
                                        • Opcode Fuzzy Hash: 5f20f5c074b790eb8e0e6bc73f99bab65d4073005cb8a7facbed76536242b3ee
                                        • Instruction Fuzzy Hash: 5541AEB1D103499FDB14CF9AC884ADEFBF5BF48310F24852AE919AB250D775A885CF90
                                        APIs
                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 058FFE91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3247751496.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_58f0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: 7fe0e5756a9571ae135ea9874645e7d419e54f161d8148eaf108f9da697984af
                                        • Instruction ID: 8a7fbb5a2cdd5d3e84ad3f0f0ae361b3fb0ec9fa82abd3199548bbb98232bd64
                                        • Opcode Fuzzy Hash: 7fe0e5756a9571ae135ea9874645e7d419e54f161d8148eaf108f9da697984af
                                        • Instruction Fuzzy Hash: 034119B4A003498FCB14DF99C448AAABBF5FF88314F24C459D659AB321D774A845CBA0
                                        APIs
                                        • GlobalMemoryStatusEx.KERNELBASE ref: 010CECA7
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3235992696.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_10c0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: GlobalMemoryStatus
                                        • String ID:
                                        • API String ID: 1890195054-0
                                        • Opcode ID: 74304125b4c704af29071f0395e25cf683312ddc10450f77008ffb058d527584
                                        • Instruction ID: 9228ba4ce5722aaf1bfd71c3fc6de5d98247ccc00ad322d70a52c2ca0faf710b
                                        • Opcode Fuzzy Hash: 74304125b4c704af29071f0395e25cf683312ddc10450f77008ffb058d527584
                                        • Instruction Fuzzy Hash: 8E2130B1C006599FCB10CFAAC585BDEFBF4AF08310F10856AE918A7240D338A945CFA5
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 058FB6EA
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3247751496.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_58f0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 52bca0396e539a95d9c8d7f6306a2e14bdebcf69a37edfcd43418ba015981f11
                                        • Instruction ID: 714facb48bf33d1029271cc8cb3044dea8faf7c046342fe02b936aeebd2c4080
                                        • Opcode Fuzzy Hash: 52bca0396e539a95d9c8d7f6306a2e14bdebcf69a37edfcd43418ba015981f11
                                        • Instruction Fuzzy Hash: 4011F9B5D002499FDB10CF9AD844BDEFBF5FB48310F10841AD919A7210C779A945CFA5
                                        APIs
                                        • GlobalMemoryStatusEx.KERNELBASE ref: 010CECA7
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3235992696.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_10c0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: GlobalMemoryStatus
                                        • String ID:
                                        • API String ID: 1890195054-0
                                        • Opcode ID: 62767208aa15dc41de0df08228576b7fbe98b27eb6779a72379aca9110033a0f
                                        • Instruction ID: efaba57bad9b976cc1ab9ceb97ea907b1be37ce38d9176f1996a8728dfa98859
                                        • Opcode Fuzzy Hash: 62767208aa15dc41de0df08228576b7fbe98b27eb6779a72379aca9110033a0f
                                        • Instruction Fuzzy Hash: BC111FB1C006599BCB10DFAAC545B9EFBF4AF48320F10816AE818A7240D778A944CFA1
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 058FB6EA
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3247751496.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_58f0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 0e247c61f50b1f9b437e3a43531d3c9a6b9065c1fe8ea2a3aa6d3806d56e7b59
                                        • Instruction ID: 2e2b5fd15376564c853df09b721b91952da72d04de1af1105705701ebe9ead97
                                        • Opcode Fuzzy Hash: 0e247c61f50b1f9b437e3a43531d3c9a6b9065c1fe8ea2a3aa6d3806d56e7b59
                                        • Instruction Fuzzy Hash: DC11F3B68002498FDB10CF9AD844BDEFBF8FB88310F10842AD919A7210C379A945CFA5
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,058FB244), ref: 058FB47E
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3247751496.00000000058F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_58f0000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 4b481b69e074c0d62873d677c5f8ed9366d545be2698b083ad1fd4199bc6a38d
                                        • Instruction ID: 74c40e357b06c4dad86a0108a01969602e3c60ee1cc6c0e9c42b5d17f4915f44
                                        • Opcode Fuzzy Hash: 4b481b69e074c0d62873d677c5f8ed9366d545be2698b083ad1fd4199bc6a38d
                                        • Instruction Fuzzy Hash: 661102B5C047498FCB10DF9AC544B9EFBF5EB88314F10842AD919A7310D379A945CFA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH]q
                                        • API String ID: 0-3168235125
                                        • Opcode ID: 4c8e499fc34458678d02dc8f680b9bc98745e23d447a65bf8630c70d4c147fa9
                                        • Instruction ID: 223f58fb5649360698bc5e25d8d209e6951759c6b1ff4cd96af866889458c0a8
                                        • Opcode Fuzzy Hash: 4c8e499fc34458678d02dc8f680b9bc98745e23d447a65bf8630c70d4c147fa9
                                        • Instruction Fuzzy Hash: B3419070E102199FEF54DFA4C5516AEBBB6BF85300F20492AD405E7690DF74D94ACB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH]q
                                        • API String ID: 0-3168235125
                                        • Opcode ID: e7de7330d24cb69a21549f34143c60213f818329aecdcb7a07e236e43473ced2
                                        • Instruction ID: b16e88795ae288b2a3f8c7a0ff37b6b2eb8aec1b07a5d0e5eb83de2faff737b5
                                        • Opcode Fuzzy Hash: e7de7330d24cb69a21549f34143c60213f818329aecdcb7a07e236e43473ced2
                                        • Instruction Fuzzy Hash: 37310430B002058FEB48AB74D95866E7BEBBF89A04F20843DD406DB395DE35DE06CB95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH]q
                                        • API String ID: 0-3168235125
                                        • Opcode ID: 8ab6abe856bcb3f44d94e5ff04fbecc122481f14697f90e6afbb080d2c1c00ae
                                        • Instruction ID: 47bb431d99d0b0d3f7db7d98abe0292a3584f0e1916e7e95a80c213b48f11603
                                        • Opcode Fuzzy Hash: 8ab6abe856bcb3f44d94e5ff04fbecc122481f14697f90e6afbb080d2c1c00ae
                                        • Instruction Fuzzy Hash: E631F030B002058FEB48ABB4D55866E7BEBBF89604F208539D406DB395DF35DD06CB91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ebc505217b9c56e2273fb92e2cb73e2726960018903eccba7bbfe884f6d33105
                                        • Instruction ID: 6a34d3804213fa4923e822470d777376411dc0f967179bbd8ee6f29c5b2267b1
                                        • Opcode Fuzzy Hash: ebc505217b9c56e2273fb92e2cb73e2726960018903eccba7bbfe884f6d33105
                                        • Instruction Fuzzy Hash: 77027734A00205CFEB64DB64C588A9DB7F6FF84314F64C8AAD409AB695DB35ED85CF80
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0f9f3ba46768349d100ca31eb467de59cac80e542f17f792e4475535b609157c
                                        • Instruction ID: 99b9bac11312b4bd61a4c132cedcd0270d7892ef47cbb38fafa0fe91ba098121
                                        • Opcode Fuzzy Hash: 0f9f3ba46768349d100ca31eb467de59cac80e542f17f792e4475535b609157c
                                        • Instruction Fuzzy Hash: CB61A071F000214FEB54AA6EC89065FBADBAFD4224B254479D80EDB364DF7ADD0287D2
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be87a656bafa4f540c6436305ebf0940810257ac6750f77e4bfd1a6e395b24a4
                                        • Instruction ID: e801ade542034ff4413f746f159b178f5ef38a2192855a0b378ec62a0237a126
                                        • Opcode Fuzzy Hash: be87a656bafa4f540c6436305ebf0940810257ac6750f77e4bfd1a6e395b24a4
                                        • Instruction Fuzzy Hash: AE818F30B0020A8FDB44DFA9D45469EB7F6AF89704F208529E50AEB794EB35DC46CB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e4e55e7b75956b7cb31aeb98c095500888591a530032f615e6e4cc6081cd0223
                                        • Instruction ID: 8514a995f06e8c9b31696650fe0ceb69bb1adf5e57bcbe05a6c847723675e730
                                        • Opcode Fuzzy Hash: e4e55e7b75956b7cb31aeb98c095500888591a530032f615e6e4cc6081cd0223
                                        • Instruction Fuzzy Hash: B6915E30E00219CFEF60DF68C890B9DB7B5FF85700F208599D549AB295DB70AA86CF91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5c072594ce6504b09a0937ad14bf50a2f597a8a22fb6e108d67b2068879a7108
                                        • Instruction ID: 819fae4705e93780bd271db56332220aee07b6ae1edde59b5518e57dfc31eece
                                        • Opcode Fuzzy Hash: 5c072594ce6504b09a0937ad14bf50a2f597a8a22fb6e108d67b2068879a7108
                                        • Instruction Fuzzy Hash: 0F913C30E00219CFEF64DF68C890B9DB7B5FF85700F208599D549AB295DB70AA86CF91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 425d679aee958cf89be871ec735b9da2b94ff1ec9edb93f577e236250e68327b
                                        • Instruction ID: 75734b9ac595c19e485b64ec6e98c716a87cd4a06786dd2126d0232026f8545c
                                        • Opcode Fuzzy Hash: 425d679aee958cf89be871ec735b9da2b94ff1ec9edb93f577e236250e68327b
                                        • Instruction Fuzzy Hash: 9E712C31E002099FDB54DFA9D990AADBBF6FF84300F248929D419EB655DB31ED46CB40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 543506336e1b4c94ac7b1443ce66363deb0a446bb46956fb2305ddf83410c926
                                        • Instruction ID: 263171c409bc2627ae621c0ed42e38dd7683a75afd765319dce0ae1bc4c388e6
                                        • Opcode Fuzzy Hash: 543506336e1b4c94ac7b1443ce66363deb0a446bb46956fb2305ddf83410c926
                                        • Instruction Fuzzy Hash: F4712B30E002099FDB54DFA9D990AADBBF6FF88300F248929D419EB655DB31ED46CB50
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 11200aa733f64625d90d4279fd52da32d4a482bbe2642be3095ebda16c3eb94b
                                        • Instruction ID: 6f6241e3b49b51c2a2cd9c383aff91c91e60abb36b25084c18666896c45f76a1
                                        • Opcode Fuzzy Hash: 11200aa733f64625d90d4279fd52da32d4a482bbe2642be3095ebda16c3eb94b
                                        • Instruction Fuzzy Hash: 6D510431E00109CFEB64EB78E8546ADB7B6FF84315F20886AE50AD7691DF358A45CB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e714c1f93b3d05bea7efbbacb4a2c0d9ff6ee2b365fd3b467cd0239bd9be1f16
                                        • Instruction ID: 2933aead4505842d1fc7f56e5c156e668efd3f733fa20abb764592e80608ce88
                                        • Opcode Fuzzy Hash: e714c1f93b3d05bea7efbbacb4a2c0d9ff6ee2b365fd3b467cd0239bd9be1f16
                                        • Instruction Fuzzy Hash: 7D51D370F102249FFF745BA9E85072E265EDB89710F304929EC0EC77D6CA68CD459792
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9f7f10453ad2214d5ec125d199f0be53103008d676a6c22f8f2a985ccd5cb01b
                                        • Instruction ID: a2a60b6c99c4bb219f1127c83893232c7e243da232995620d433bc32671c005d
                                        • Opcode Fuzzy Hash: 9f7f10453ad2214d5ec125d199f0be53103008d676a6c22f8f2a985ccd5cb01b
                                        • Instruction Fuzzy Hash: 7A51D270F102288FFF705AA9E85072E265EDB89710F304929EC0EC77D6CA68CD459792
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cd6f9abe71d5e9f7705a6d53e0cdc8252dbfb3cbe206dbeff5fec18894801306
                                        • Instruction ID: 4e3114e4d40674440463c351cc3cc3796c66bd2bd47c5dcca80954ff1397f75f
                                        • Opcode Fuzzy Hash: cd6f9abe71d5e9f7705a6d53e0cdc8252dbfb3cbe206dbeff5fec18894801306
                                        • Instruction Fuzzy Hash: 1D416D75E006099FDB60CEA9D980AAFBBB6EB44310F21492AD215D7A90D730E8458F91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ce169e112c40dd67a158afab2ce8c1686491cbfa09a00bc5a7fab397875cd6fb
                                        • Instruction ID: 7af3b9b484fd2dce8eb6b6f392546bb5f7f03381ee372bd054771d9d88816451
                                        • Opcode Fuzzy Hash: ce169e112c40dd67a158afab2ce8c1686491cbfa09a00bc5a7fab397875cd6fb
                                        • Instruction Fuzzy Hash: B8318D31E102098FEF60CEA9C581BAFFBF9EB45320F21892AD159D7691D634D981CF91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bff17418936bff47b886ecf55f213df3fbf1d7ddc0fc9b6b02e54b529de7f66f
                                        • Instruction ID: f2cf1391f033d6e4d9ba58789ba69ffa91558cd2fd12d1bc0bea9fccd5cc93a7
                                        • Opcode Fuzzy Hash: bff17418936bff47b886ecf55f213df3fbf1d7ddc0fc9b6b02e54b529de7f66f
                                        • Instruction Fuzzy Hash: 57318034E146098FDB59CFA9D85869EB7F6FF89300F208519E806EB790DB71AD42CB50
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a1503601496889749651d5efbd514ec82b84ebf0df4f9ec492120b0e6ce71f3
                                        • Instruction ID: c0b70e9f8f7309a71486d7adca7c8e64c4f3afe8f164923b761d1aa0cb1dc195
                                        • Opcode Fuzzy Hash: 1a1503601496889749651d5efbd514ec82b84ebf0df4f9ec492120b0e6ce71f3
                                        • Instruction Fuzzy Hash: AD316D35E14605CFDB59CFA8D49469EB7F6BF89300F208519E806EB790DB31A942CB50
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0ac5dba0b23ca8714b1c4f195781a2ab69f10be784f16df94de6f4b8aa3af98f
                                        • Instruction ID: 983a090a886081069df5d24c9886e556be4ee8db249fdae9a0b07480d20e8565
                                        • Opcode Fuzzy Hash: 0ac5dba0b23ca8714b1c4f195781a2ab69f10be784f16df94de6f4b8aa3af98f
                                        • Instruction Fuzzy Hash: 84214F75F0022A9FEB50DFA9D841AEEBBF5AB48714F108129E905E7390E735DD018B91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d2eec644a3845cc49f77cdff359b5a19863464408717fac854e4aaa8b3a5dc3
                                        • Instruction ID: d5ab7334c83abd41891c6c3e2811d35c2a28e0df627cf6d7e9558c7640253ea3
                                        • Opcode Fuzzy Hash: 8d2eec644a3845cc49f77cdff359b5a19863464408717fac854e4aaa8b3a5dc3
                                        • Instruction Fuzzy Hash: 43215E75F0062A9FEB50DFA9D980AEEBBF5EB48714F108129E905E7380E735DD018B91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3235557691.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_fed000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 57de6843b70459020ca412a3736d51a403c2579c83f9921ebf6ad780c0632936
                                        • Instruction ID: 74d95f4548074c90c0c945d93509ebfe9ad0e5f8415854c40110b980e57f78bf
                                        • Opcode Fuzzy Hash: 57de6843b70459020ca412a3736d51a403c2579c83f9921ebf6ad780c0632936
                                        • Instruction Fuzzy Hash: 64214671504284DFDB14CF24C9C0B26BB65FB84324F28C56DEA490B79AC73AD846EB62
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b51d7342fbfa8e4b435400e756ba984b10fce13f3cb9150a22cf0c5d351f2ed0
                                        • Instruction ID: b0720b7968b20dea142844b5b41f86b66a745707d63d14220890bb6a9bc2c9ec
                                        • Opcode Fuzzy Hash: b51d7342fbfa8e4b435400e756ba984b10fce13f3cb9150a22cf0c5d351f2ed0
                                        • Instruction Fuzzy Hash: 37110432B100368FEF54DA79D8146AE77EAEBC8301F104639D80AEB384DE24CC028BD1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4d284ba17c0fa350c4fe72f83f79a282b038ad1d3a9780def5153a0c944212ea
                                        • Instruction ID: 56333642c3f2f1f1efd0abc1eaa50d75326ad39e15389ecd02cf1796f3c2bc09
                                        • Opcode Fuzzy Hash: 4d284ba17c0fa350c4fe72f83f79a282b038ad1d3a9780def5153a0c944212ea
                                        • Instruction Fuzzy Hash: DE01F131B000504FDB7196BDA950B6FABEADBCAB14F24883DE50ED7B85D966CC038781
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3235557691.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_fed000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                        • Instruction ID: 48e816ceb08148ac98e1f160d383b5856208bd9fdbd2a48aab0a0036f151eef0
                                        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                        • Instruction Fuzzy Hash: 5411D075904284CFDB11CF10C9C4B15BF61FB44324F28C6AAD9494B656C33AD84ADF62
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c37a7835688d12217e473f0ab1974436c0b6eec3ae0f911f089d8b0fbc8f441
                                        • Instruction ID: 5a9516c25d6146281f21a6309de0fa8e699502042da275c462f633b3aa697356
                                        • Opcode Fuzzy Hash: 7c37a7835688d12217e473f0ab1974436c0b6eec3ae0f911f089d8b0fbc8f441
                                        • Instruction Fuzzy Hash: F8018F31B105154FEB699A7DE494B3F77DAEBC9710F258829E10ACB390EE25DC028785
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4e7e0b3ca62227b3df7f40af877c2431aa1fffdcb70297cdd0eb014499ee4ac5
                                        • Instruction ID: af239b3a862d83dc990fd8bd27f71716a814046ee7caf9a4f3abebf9b88d357f
                                        • Opcode Fuzzy Hash: 4e7e0b3ca62227b3df7f40af877c2431aa1fffdcb70297cdd0eb014499ee4ac5
                                        • Instruction Fuzzy Hash: EA01F532B100259BEF54D6A9D814AEB77AE9BC4750F00013AE806D7290EF24D906CBA1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 76326df4f5597ae58f02a8831a0fb8031c52328493a68610edd29e907b041933
                                        • Instruction ID: 7d48b8ea22fb37b7f6ec54abd6494ebfe43c57aff3ec32d4e702022e039713d8
                                        • Opcode Fuzzy Hash: 76326df4f5597ae58f02a8831a0fb8031c52328493a68610edd29e907b041933
                                        • Instruction Fuzzy Hash: 7B21CBB5D016199FCB00CF9AD984A9EFBF4FB48310F10862AE918A7240C378A944CFA5
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2803890e5a0736889d998b564652534a67f4374fe67769a75f43f087624703db
                                        • Instruction ID: bcb158d2b488d48078567f2ad34a849174b81c15134dc6396bb05a4b3ae3d1a0
                                        • Opcode Fuzzy Hash: 2803890e5a0736889d998b564652534a67f4374fe67769a75f43f087624703db
                                        • Instruction Fuzzy Hash: 1011C2B5D012599FCB00DF9AD884ADEFBF8FB48310F10812AE518A7340C3786544CBA5
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6b30158627902c25208e98bc3a99e59d1950d80484bb965d0b5c06de04dbe0a
                                        • Instruction ID: ff7b25b6a24d05328e949d6cb6bcb1caf806bad30b7723fa1c9d0e76ef0e371b
                                        • Opcode Fuzzy Hash: f6b30158627902c25208e98bc3a99e59d1950d80484bb965d0b5c06de04dbe0a
                                        • Instruction Fuzzy Hash: 30016D31B000104FEB6596ADE954B2FB2DEDBCAB15F208839E60EC7795DD66DC034791
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a6943336d8c7280fa19f29720a0f9c47f4a32a1647afddbee4091516a29e6b69
                                        • Instruction ID: daca11e2744692faa4a6178d399a263b2abbf9f5e9c85a4f3f2ab608910c8806
                                        • Opcode Fuzzy Hash: a6943336d8c7280fa19f29720a0f9c47f4a32a1647afddbee4091516a29e6b69
                                        • Instruction Fuzzy Hash: B801B135B101140FD765DA7EE45571E77EAEB89710F10483DE10AC7795EE21DC0183C1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 55b89b1b5618fde1ec02f851a7355b91672cd8862d55a45315b32d701f015f59
                                        • Instruction ID: add45b8992c72c47e45ce25ccb070a5438cc87d109384bf1bd842acbb1bd0f39
                                        • Opcode Fuzzy Hash: 55b89b1b5618fde1ec02f851a7355b91672cd8862d55a45315b32d701f015f59
                                        • Instruction Fuzzy Hash: 79018135B100150FEB65966D9454B3F67DEDBC9710F208839E50EC7790EE25DC024385
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 72e0231bf7f420c5d9a0feabc1b3735bec08d4dde600d4193692afc6d3138c6f
                                        • Instruction ID: 71b95cb3c2a02da023078d94fd98a1a208279ae045a143930e6745aabf1c6555
                                        • Opcode Fuzzy Hash: 72e0231bf7f420c5d9a0feabc1b3735bec08d4dde600d4193692afc6d3138c6f
                                        • Instruction Fuzzy Hash: 92016D35B101244FDB65EA6DE455B2E77DAEB89720F208438F10EDB795DE21DC0283C1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6ecb99fd9024aff6df24314b52566c171e3036248205d9e6e71ffc3178ab2433
                                        • Instruction ID: 8c26cc501fcea600664d9c3011099028b63c2e286bba637e7a6d584cd70f571d
                                        • Opcode Fuzzy Hash: 6ecb99fd9024aff6df24314b52566c171e3036248205d9e6e71ffc3178ab2433
                                        • Instruction Fuzzy Hash: 61F0A732E20224DFDB549666DC00A9AB739E784764F204529ED01E7684D6716C05CBC0
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e7983338c6c9c0418f69f3d68ad96f6fe3f4ab5939c947d9e55a2db28b261528
                                        • Instruction ID: 6e95bbb8bdbb4c80af2bb2f586b30c3179e12b8669c8fd0ef5761cdef32e9e13
                                        • Opcode Fuzzy Hash: e7983338c6c9c0418f69f3d68ad96f6fe3f4ab5939c947d9e55a2db28b261528
                                        • Instruction Fuzzy Hash: 82E04FB5E241059FEF60CF70DA4575A7BF8EB46208F7089A6C404DB982E23ADD15CB51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-2843079600
                                        • Opcode ID: 1d7e7b6438ef49bc1af116b3adaf1ca5b1b540175337fb4e3f1790a5c02afb0c
                                        • Instruction ID: 8a8dcb773e5e8c7c152ad1cb8a820101e6006a936942aa90849ee0d9b1e2d331
                                        • Opcode Fuzzy Hash: 1d7e7b6438ef49bc1af116b3adaf1ca5b1b540175337fb4e3f1790a5c02afb0c
                                        • Instruction Fuzzy Hash: F1123030E00219CFEB64DFA9C994AADB7F6BF84714F208969D4099B754DB30AD45CF41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-1273862796
                                        • Opcode ID: 7ab3d1eb386fc9272301ef9e94bc867904ae1b7d3a81e302cd05c5c66dabe071
                                        • Instruction ID: c030135086b1d32b97144b11550da0ba0d7cbc2aff14339c14e46196dc117475
                                        • Opcode Fuzzy Hash: 7ab3d1eb386fc9272301ef9e94bc867904ae1b7d3a81e302cd05c5c66dabe071
                                        • Instruction Fuzzy Hash: 5B917E30A00319DFEB68EB65D994BAE77FABF84704F208529E401AB695DB349C41CBC0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                        • API String ID: 0-981061697
                                        • Opcode ID: 7a9a5b5646a3daf1fbbb64b46e40191c2f98a3a5fe703a8805d6d5a152a1b3db
                                        • Instruction ID: 7724aa71f1e667793da3c6af34730f06edb2cc435207714c69d1e1c4239f9cae
                                        • Opcode Fuzzy Hash: 7a9a5b5646a3daf1fbbb64b46e40191c2f98a3a5fe703a8805d6d5a152a1b3db
                                        • Instruction Fuzzy Hash: CAF12F34B00219CFDB58EFA9D550A6EB7B6BF84314F24852CE4459F7A8CB75AC42CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q
                                        • API String ID: 0-858218434
                                        • Opcode ID: fdd13c03684bf9132cae4c41cb80aba4391ca1a350ebb76a1d24f517da9961c4
                                        • Instruction ID: c4e9a77a60baaebd19e0b0dc25fdc3b55cdd58e218e80bd249bc9fb6bc94ac1c
                                        • Opcode Fuzzy Hash: fdd13c03684bf9132cae4c41cb80aba4391ca1a350ebb76a1d24f517da9961c4
                                        • Instruction Fuzzy Hash: 37B13C30F10209CFDB58DFA9D690A9EB7B6EF84304F248929D4059B795DB75DC82CB80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR]q$LR]q$$]q$$]q
                                        • API String ID: 0-3527005858
                                        • Opcode ID: 650c05d70c38002498f166f5db341ac36d0df38e589aee023d6ee85f49eee7ae
                                        • Instruction ID: 7bc85c269e3afcefb32ddbcea5255612cf8ce33dee0186f5a071c86937088f23
                                        • Opcode Fuzzy Hash: 650c05d70c38002498f166f5db341ac36d0df38e589aee023d6ee85f49eee7ae
                                        • Instruction Fuzzy Hash: DA51E630B002018FEF58EF69D650A6A77EAFF84304F14866DE4159B7A5DB31EC41CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.3249387994.0000000006900000.00000040.00000800.00020000.00000000.sdmp, Offset: 06900000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6900000_qicqbuFUGCXO.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $]q$$]q$$]q$$]q
                                        • API String ID: 0-858218434
                                        • Opcode ID: ed386dc3f26ca5293125f382b96c338ede3b6ce88bee68ed5a1926ce68950210
                                        • Instruction ID: 639a7d8f333b40314305ce83b8353b05f3f84d50734ec35a13f4d442278f5b57
                                        • Opcode Fuzzy Hash: ed386dc3f26ca5293125f382b96c338ede3b6ce88bee68ed5a1926ce68950210
                                        • Instruction Fuzzy Hash: 55517F30E103058FEB65DB68D590AAEB7BAEF84315F20892AE405DB695DB31DC42CBD1