Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YU SV Payment.exe

Overview

General Information

Sample name:YU SV Payment.exe
Analysis ID:1578737
MD5:87753b0227a35fd7e550432b6c56dc6b
SHA1:d55941c0fc895eda454c6d6650626e2c2d4422f4
SHA256:e5406c9136408ddbe90ec00c45b1291e3e847826ce1be6c39b77327d135e57c2
Tags:exeuser-threatcat_ch
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • YU SV Payment.exe (PID: 3368 cmdline: "C:\Users\user\Desktop\YU SV Payment.exe" MD5: 87753B0227A35FD7E550432B6C56DC6B)
    • Lymnaeidae.exe (PID: 1460 cmdline: "C:\Users\user\Desktop\YU SV Payment.exe" MD5: 87753B0227A35FD7E550432B6C56DC6B)
      • RegSvcs.exe (PID: 5960 cmdline: "C:\Users\user\Desktop\YU SV Payment.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 5016 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • Lymnaeidae.exe (PID: 6892 cmdline: "C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe" MD5: 87753B0227A35FD7E550432B6C56DC6B)
      • RegSvcs.exe (PID: 6788 cmdline: "C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "kingnovasend@zqamcx.com", "Password": "Anambraeast", "Server": "zqamcx.com", "To": "kingnovaresult@zqamcx.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2915619784.0000000002C05000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
      00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0xefa7:$a1: get_encryptedPassword
          • 0xf2cf:$a2: get_encryptedUsername
          • 0xed42:$a3: get_timePasswordChanged
          • 0xee63:$a4: get_passwordField
          • 0xefbd:$a5: set_encryptedPassword
          • 0x10919:$a7: get_logins
          • 0x105ca:$a8: GetOutlookPasswords
          • 0x103bc:$a9: StartKeylogger
          • 0x10869:$a10: KeyLoggerEventArgs
          • 0x10419:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          1.2.Lymnaeidae.exe.1710000.1.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            1.2.Lymnaeidae.exe.1710000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.Lymnaeidae.exe.1710000.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                1.2.Lymnaeidae.exe.1710000.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xd3a7:$a1: get_encryptedPassword
                • 0xd6cf:$a2: get_encryptedUsername
                • 0xd142:$a3: get_timePasswordChanged
                • 0xd263:$a4: get_passwordField
                • 0xd3bd:$a5: set_encryptedPassword
                • 0xed19:$a7: get_logins
                • 0xe9ca:$a8: GetOutlookPasswords
                • 0xe7bc:$a9: StartKeylogger
                • 0xec69:$a10: KeyLoggerEventArgs
                • 0xe819:$a11: KeyLoggerEventArgsEventHandler
                1.2.Lymnaeidae.exe.1710000.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x1234b:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x11849:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x11b57:$a4: \Orbitum\User Data\Default\Login Data
                • 0x1294f:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 15 entries

                System Summary

                barindex
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs" , ProcessId: 5016, ProcessName: wscript.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs" , ProcessId: 5016, ProcessName: wscript.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe, ProcessId: 1460, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-20T10:00:09.099589+010028032742Potentially Bad Traffic192.168.2.449730193.122.6.16880TCP
                2024-12-20T10:00:17.773376+010028032742Potentially Bad Traffic192.168.2.449732193.122.6.16880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "kingnovasend@zqamcx.com", "Password": "Anambraeast", "Server": "zqamcx.com", "To": "kingnovaresult@zqamcx.com", "Port": 587}
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeReversingLabs: Detection: 36%
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeVirustotal: Detection: 22%Perma Link
                Source: YU SV Payment.exeVirustotal: Detection: 22%Perma Link
                Source: YU SV Payment.exeReversingLabs: Detection: 36%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeJoe Sandbox ML: detected
                Source: YU SV Payment.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: YU SV Payment.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49731 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49737 version: TLS 1.0
                Source: Binary string: wntdll.pdbUGP source: Lymnaeidae.exe, 00000001.00000003.1707598480.0000000003630000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000001.00000003.1709180411.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000003.1830943770.0000000004060000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000003.1832484812.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Lymnaeidae.exe, 00000001.00000003.1707598480.0000000003630000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000001.00000003.1709180411.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000003.1830943770.0000000004060000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000003.1832484812.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0061DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0061DBBE
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_006268EE FindFirstFileW,FindClose,0_2_006268EE
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0062698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0062698F
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0061D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0061D076
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0061D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0061D3A9
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00629642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00629642
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0062979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0062979D
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00629B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00629B2B
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00625C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00625C97
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005BDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_005BDBBE
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C68EE FindFirstFileW,FindClose,1_2_005C68EE
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_005C698F
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005BD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_005BD076
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005BD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_005BD3A9
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_005C9642
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_005C979D
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_005C9B2B
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C5C97 FindFirstFileW,FindNextFileW,FindClose,1_2_005C5C97
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01659731h2_2_01659480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01659E5Ah2_2_01659A30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01659E5Ah2_2_01659D87
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02959731h5_2_02959480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02959E5Ah5_2_02959A40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02959E5Ah5_2_02959A30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02959E5Ah5_2_02959D87
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C47C9h5_2_056C4520
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C8830h5_2_056C8588
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056CF700h5_2_056CF458
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C76D0h5_2_056C7428
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056CE9F8h5_2_056CE750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C5929h5_2_056C5680
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C83D8h5_2_056C8130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C7278h5_2_056C71D1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056CE5A0h5_2_056CE180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056CF2A8h5_2_056CF000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C54D1h5_2_056C5228
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C5079h5_2_056C4DD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C7F80h5_2_056C7CD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C4C21h5_2_056C4978
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056CFB58h5_2_056CF8B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C7B28h5_2_056C7880
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056CEE50h5_2_056CEBA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 056C5E15h5_2_056C5AD8
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewIP Address: 172.67.177.134 172.67.177.134
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49732 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 193.122.6.168:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49731 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49737 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0062CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0062CE44
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2915159253.00000000030FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003091000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: Lymnaeidae.exe, 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: RegSvcs.exe, 00000002.00000002.2915159253.000000000312D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegSvcs.exe, 00000002.00000002.2915159253.000000000312D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003091000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Lymnaeidae.exe, 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: Lymnaeidae.exe, 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                Source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0062EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0062EAFF
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0062ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0062ED6A
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005CED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_005CED6A
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0062EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0062EAFF
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0061AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0061AA57
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00649576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00649576
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005E9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_005E9576

                System Summary

                barindex
                Source: 1.2.Lymnaeidae.exe.1710000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.Lymnaeidae.exe.1710000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.Lymnaeidae.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.Lymnaeidae.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: Process Memory Space: Lymnaeidae.exe PID: 1460, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 5960, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Lymnaeidae.exe PID: 6892, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: YU SV Payment.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: YU SV Payment.exe, 00000000.00000003.1687037644.0000000003A41000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e9b2de11-a
                Source: YU SV Payment.exe, 00000000.00000003.1687037644.0000000003A41000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4f636b71-0
                Source: YU SV Payment.exe, 00000000.00000000.1672787805.0000000000672000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_26c9f86f-8
                Source: YU SV Payment.exe, 00000000.00000000.1672787805.0000000000672000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_78d4490f-6
                Source: Lymnaeidae.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: Lymnaeidae.exe, 00000001.00000002.1712569595.0000000000612000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bdee91aa-a
                Source: Lymnaeidae.exe, 00000001.00000002.1712569595.0000000000612000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_62bc26b7-0
                Source: Lymnaeidae.exe, 00000004.00000002.1834063374.0000000000612000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_75d6f541-7
                Source: Lymnaeidae.exe, 00000004.00000002.1834063374.0000000000612000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e0d72a7c-2
                Source: YU SV Payment.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ed2fb231-8
                Source: YU SV Payment.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_295ef29c-5
                Source: Lymnaeidae.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3e3180b8-f
                Source: Lymnaeidae.exe.0.drString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d5e80752-3
                Source: initial sampleStatic PE information: Filename: YU SV Payment.exe
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0061D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0061D5EB
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00611201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00611201
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0061E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0061E8F6
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005BE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_005BE8F6
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005BBF400_2_005BBF40
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_006220460_2_00622046
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005B80600_2_005B8060
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_006182980_2_00618298
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005EE4FF0_2_005EE4FF
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005E676B0_2_005E676B
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_006448730_2_00644873
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005BCAF00_2_005BCAF0
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005DCAA00_2_005DCAA0
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005CCC390_2_005CCC39
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005E6DD90_2_005E6DD9
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005CB1190_2_005CB119
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005B91C00_2_005B91C0
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D13940_2_005D1394
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D17060_2_005D1706
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D781B0_2_005D781B
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005C997D0_2_005C997D
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005B79200_2_005B7920
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D19B00_2_005D19B0
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D7A4A0_2_005D7A4A
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D1C770_2_005D1C77
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D7CA70_2_005D7CA7
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0063BE440_2_0063BE44
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005E9EEE0_2_005E9EEE
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D1F320_2_005D1F32
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00FE42200_2_00FE4220
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0055BF401_2_0055BF40
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C20461_2_005C2046
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005580601_2_00558060
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005B82981_2_005B8298
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0058E4FF1_2_0058E4FF
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0058676B1_2_0058676B
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005E48731_2_005E4873
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0055CAF01_2_0055CAF0
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0057CAA01_2_0057CAA0
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0056CC391_2_0056CC39
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00586DD91_2_00586DD9
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0056B1191_2_0056B119
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005591C01_2_005591C0
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005713941_2_00571394
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005717061_2_00571706
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0057781B1_2_0057781B
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0056997D1_2_0056997D
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005579201_2_00557920
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005719B01_2_005719B0
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00577A4A1_2_00577A4A
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00571C771_2_00571C77
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00577CA71_2_00577CA7
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005DBE441_2_005DBE44
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00589EEE1_2_00589EEE
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00571F321_2_00571F32
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00FA4B581_2_00FA4B58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0165C5302_2_0165C530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016594802_2_01659480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016519B82_2_016519B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0165C5212_2_0165C521
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01652DD12_2_01652DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0165946F2_2_0165946F
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 4_2_017235E04_2_017235E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0295C5305_2_0295C530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_029594805_2_02959480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0295C5215_2_0295C521
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_02952DD15_2_02952DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0295946F5_2_0295946F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C61385_2_056C6138
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CBC605_2_056CBC60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CAF005_2_056CAF00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C89E05_2_056C89E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C85795_2_056C8579
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C45205_2_056C4520
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C450F5_2_056C450F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C85885_2_056C8588
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CF4485_2_056CF448
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CF4585_2_056CF458
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C74285_2_056C7428
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C74185_2_056C7418
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CE7405_2_056CE740
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CE7505_2_056CE750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C56805_2_056C5680
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C612A5_2_056C612A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C81205_2_056C8120
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C81305_2_056C8130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CE1805_2_056CE180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CF0005_2_056CF000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C03205_2_056C0320
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C03305_2_056C0330
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C13A85_2_056C13A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C52285_2_056C5228
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C521A5_2_056C521A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C4DC05_2_056C4DC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C4DD05_2_056C4DD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C7CC85_2_056C7CC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C0CD85_2_056C0CD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C7CD85_2_056C7CD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CEFF05_2_056CEFF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C6FC15_2_056C6FC1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C6FC35_2_056C6FC3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C6FD05_2_056C6FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C49695_2_056C4969
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C49785_2_056C4978
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C89D05_2_056C89D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C78715_2_056C7871
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CF8A05_2_056CF8A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CF8B05_2_056CF8B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C78805_2_056C7880
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C3BCF5_2_056C3BCF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CEBA85_2_056CEBA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056CEB985_2_056CEB98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C5ACA5_2_056C5ACA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C5AD85_2_056C5AD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_056C0AB85_2_056C0AB8
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: String function: 005CF9F2 appears 31 times
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: String function: 005D0A30 appears 46 times
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: String function: 0056F9F2 appears 31 times
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: String function: 00570A30 appears 46 times
                Source: YU SV Payment.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 1.2.Lymnaeidae.exe.1710000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.Lymnaeidae.exe.1710000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.Lymnaeidae.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.Lymnaeidae.exe.1570000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: Process Memory Space: Lymnaeidae.exe PID: 1460, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegSvcs.exe PID: 5960, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Lymnaeidae.exe PID: 6892, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/6@2/2
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_006237B5 GetLastError,FormatMessageW,0_2_006237B5
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_006110BF AdjustTokenPrivileges,CloseHandle,0_2_006110BF
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_006116C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006116C3
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005B10BF AdjustTokenPrivileges,CloseHandle,1_2_005B10BF
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005B16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_005B16C3
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_006251CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_006251CD
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0063A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0063A67C
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0062648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0062648E
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005B42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_005B42A2
                Source: C:\Users\user\Desktop\YU SV Payment.exeFile created: C:\Users\user\AppData\Local\peaklikeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\YU SV Payment.exeFile created: C:\Users\user\AppData\Local\Temp\aut210B.tmpJump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs"
                Source: YU SV Payment.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegSvcs.exe, 00000002.00000002.2915159253.0000000003180000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2915159253.000000000318E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2915159253.0000000003170000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002BDE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002BD0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002BC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: YU SV Payment.exeVirustotal: Detection: 22%
                Source: YU SV Payment.exeReversingLabs: Detection: 36%
                Source: C:\Users\user\Desktop\YU SV Payment.exeFile read: C:\Users\user\Desktop\YU SV Payment.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\YU SV Payment.exe "C:\Users\user\Desktop\YU SV Payment.exe"
                Source: C:\Users\user\Desktop\YU SV Payment.exeProcess created: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe "C:\Users\user\Desktop\YU SV Payment.exe"
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\YU SV Payment.exe"
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe "C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe"
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe"
                Source: C:\Users\user\Desktop\YU SV Payment.exeProcess created: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe "C:\Users\user\Desktop\YU SV Payment.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\YU SV Payment.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe "C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe" Jump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: YU SV Payment.exeStatic file information: File size 1080832 > 1048576
                Source: YU SV Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: YU SV Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: YU SV Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: YU SV Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: YU SV Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: YU SV Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: YU SV Payment.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: Lymnaeidae.exe, 00000001.00000003.1707598480.0000000003630000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000001.00000003.1709180411.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000003.1830943770.0000000004060000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000003.1832484812.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Lymnaeidae.exe, 00000001.00000003.1707598480.0000000003630000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000001.00000003.1709180411.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000003.1830943770.0000000004060000.00000004.00001000.00020000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000003.1832484812.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp
                Source: YU SV Payment.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: YU SV Payment.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: YU SV Payment.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: YU SV Payment.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: YU SV Payment.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005B42DE
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D0A76 push ecx; ret 0_2_005D0A89
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00648CE5 push B70F0000h; retf 0_2_00648CEA
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00570A76 push ecx; ret 1_2_00570A89
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 4_2_01723DE0 pushad ; ret 4_2_01723DE1
                Source: C:\Users\user\Desktop\YU SV Payment.exeFile created: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbsJump to dropped file
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbsJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbsJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005CF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005CF98E
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00641C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00641C41
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0056F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_0056F98E
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005E1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_005E1C41
                Source: C:\Users\user\Desktop\YU SV Payment.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
                Source: C:\Users\user\Desktop\YU SV Payment.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95210
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeAPI/Special instruction interceptor: Address: FA477C
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeAPI/Special instruction interceptor: Address: 1723204
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeAPI coverage: 3.8 %
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeAPI coverage: 4.2 %
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0061DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0061DBBE
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_006268EE FindFirstFileW,FindClose,0_2_006268EE
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0062698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0062698F
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0061D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0061D076
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0061D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0061D3A9
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00629642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00629642
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0062979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0062979D
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00629B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00629B2B
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00625C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00625C97
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005BDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_005BDBBE
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C68EE FindFirstFileW,FindClose,1_2_005C68EE
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_005C698F
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005BD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_005BD076
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005BD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_005BD3A9
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_005C9642
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_005C979D
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_005C9B2B
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005C5C97 FindFirstFileW,FindNextFileW,FindClose,1_2_005C5C97
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005B42DE
                Source: wscript.exe, 00000003.00000002.1808399008.000001EC22084000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: wscript.exe, 00000003.00000002.1808399008.000001EC22084000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                Source: RegSvcs.exe, 00000002.00000002.2914193310.0000000001347000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>
                Source: RegSvcs.exe, 00000005.00000002.2914136914.0000000000C97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll"
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0062EAA2 BlockInput,0_2_0062EAA2
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005E2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005E2622
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005B42DE
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D4CE8 mov eax, dword ptr fs:[00000030h]0_2_005D4CE8
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00FE40B0 mov eax, dword ptr fs:[00000030h]0_2_00FE40B0
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00FE4110 mov eax, dword ptr fs:[00000030h]0_2_00FE4110
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00FE2A80 mov eax, dword ptr fs:[00000030h]0_2_00FE2A80
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00574CE8 mov eax, dword ptr fs:[00000030h]1_2_00574CE8
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00FA49E8 mov eax, dword ptr fs:[00000030h]1_2_00FA49E8
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00FA4A48 mov eax, dword ptr fs:[00000030h]1_2_00FA4A48
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00FA33B8 mov eax, dword ptr fs:[00000030h]1_2_00FA33B8
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 4_2_01723470 mov eax, dword ptr fs:[00000030h]4_2_01723470
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 4_2_017234D0 mov eax, dword ptr fs:[00000030h]4_2_017234D0
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 4_2_01721E40 mov eax, dword ptr fs:[00000030h]4_2_01721E40
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00610B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00610B62
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005E2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005E2622
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005D083F
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D09D5 SetUnhandledExceptionFilter,0_2_005D09D5
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005D0C21
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00582622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00582622
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_0057083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0057083F
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005709D5 SetUnhandledExceptionFilter,1_2_005709D5
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_00570C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00570C21
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1093008Jump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: B8D008Jump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00611201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00611201
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005F2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_005F2BA5
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0061B226 SendInput,keybd_event,0_2_0061B226
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_006322DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_006322DA
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\YU SV Payment.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe "C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe" Jump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00610B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00610B62
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00611663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00611663
                Source: YU SV Payment.exe, Lymnaeidae.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: YU SV Payment.exe, Lymnaeidae.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005D0698 cpuid 0_2_005D0698
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00628195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00628195
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_0060D27A GetUserNameW,0_2_0060D27A
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005EBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_005EBB6F
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_005B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005B42DE
                Source: C:\Users\user\Desktop\YU SV Payment.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.Lymnaeidae.exe.1710000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Lymnaeidae.exe.1570000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Lymnaeidae.exe PID: 1460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5960, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Lymnaeidae.exe PID: 6892, type: MEMORYSTR
                Source: Yara matchFile source: 1.2.Lymnaeidae.exe.1710000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Lymnaeidae.exe.1570000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Lymnaeidae.exe PID: 1460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5960, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Lymnaeidae.exe PID: 6892, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Lymnaeidae.exeBinary or memory string: WIN_81
                Source: Lymnaeidae.exeBinary or memory string: WIN_XP
                Source: Lymnaeidae.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: Lymnaeidae.exeBinary or memory string: WIN_XPe
                Source: Lymnaeidae.exeBinary or memory string: WIN_VISTA
                Source: Lymnaeidae.exeBinary or memory string: WIN_7
                Source: Lymnaeidae.exeBinary or memory string: WIN_8
                Source: Yara matchFile source: 1.2.Lymnaeidae.exe.1710000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Lymnaeidae.exe.1570000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.2915619784.0000000002C05000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2915159253.00000000031B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Lymnaeidae.exe PID: 1460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5960, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Lymnaeidae.exe PID: 6892, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6788, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.Lymnaeidae.exe.1710000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Lymnaeidae.exe.1570000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Lymnaeidae.exe PID: 1460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5960, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Lymnaeidae.exe PID: 6892, type: MEMORYSTR
                Source: Yara matchFile source: 1.2.Lymnaeidae.exe.1710000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.Lymnaeidae.exe.1710000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Lymnaeidae.exe.1570000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Lymnaeidae.exe.1570000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Lymnaeidae.exe PID: 1460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5960, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Lymnaeidae.exe PID: 6892, type: MEMORYSTR
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00631204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00631204
                Source: C:\Users\user\Desktop\YU SV Payment.exeCode function: 0_2_00631806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00631806
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005D1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,1_2_005D1204
                Source: C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exeCode function: 1_2_005D1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_005D1806
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                2
                Valid Accounts
                11
                Native API
                111
                Scripting
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                121
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Valid Accounts
                2
                Valid Accounts
                3
                Obfuscated Files or Information
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron2
                Registry Run Keys / Startup Folder
                21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS127
                System Information Discovery
                Distributed Component Object Model121
                Input Capture
                13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                1
                Masquerading
                LSA Secrets321
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                Registry Run Keys / Startup Folder
                2
                Valid Accounts
                Cached Domain Credentials1
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Virtualization/Sandbox Evasion
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1578737 Sample: YU SV Payment.exe Startdate: 20/12/2024 Architecture: WINDOWS Score: 100 30 reallyfreegeoip.org 2->30 32 checkip.dyndns.org 2->32 34 checkip.dyndns.com 2->34 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Multi AV Scanner detection for submitted file 2->44 48 11 other signatures 2->48 8 YU SV Payment.exe 4 2->8         started        12 wscript.exe 1 2->12         started        signatures3 46 Tries to detect the country of the analysis system (by using the IP) 30->46 process4 file5 26 C:\Users\user\AppData\...\Lymnaeidae.exe, PE32 8->26 dropped 54 Binary is likely a compiled AutoIt script file 8->54 14 Lymnaeidae.exe 2 8->14         started        56 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->56 18 Lymnaeidae.exe 1 12->18         started        signatures6 process7 file8 28 C:\Users\user\AppData\...\Lymnaeidae.vbs, data 14->28 dropped 58 Multi AV Scanner detection for dropped file 14->58 60 Binary is likely a compiled AutoIt script file 14->60 62 Machine Learning detection for dropped file 14->62 68 3 other signatures 14->68 20 RegSvcs.exe 15 2 14->20         started        64 Writes to foreign memory regions 18->64 66 Maps a DLL or memory area into another process 18->66 24 RegSvcs.exe 2 18->24         started        signatures9 process10 dnsIp11 36 checkip.dyndns.com 193.122.6.168, 49730, 49732, 80 ORACLE-BMC-31898US United States 20->36 38 reallyfreegeoip.org 172.67.177.134, 443, 49731, 49737 CLOUDFLARENETUS United States 20->38 50 Tries to steal Mail credentials (via file / registry access) 24->50 52 Tries to harvest and steal browser information (history, passwords, etc) 24->52 signatures12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                YU SV Payment.exe23%VirustotalBrowse
                YU SV Payment.exe37%ReversingLabsWin32.Trojan.AutoitInject
                YU SV Payment.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe37%ReversingLabsWin32.Trojan.AutoitInject
                C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe23%VirustotalBrowse
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                172.67.177.134
                truefalse
                  high
                  checkip.dyndns.com
                  193.122.6.168
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comdRegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.org/qLymnaeidae.exe, 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgdRegSvcs.exe, 00000002.00000002.2915159253.000000000312D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.189dRegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2915159253.000000000312D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgdRegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2915159253.00000000030FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.org/dRegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2915159253.0000000003091000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B33000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/bot-/sendDocument?chat_id=Lymnaeidae.exe, 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmpfalse
                                                    high
                                                    https://reallyfreegeoip.org/xml/Lymnaeidae.exe, 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2915159253.0000000003110000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Lymnaeidae.exe, 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2915619784.0000000002B60000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      193.122.6.168
                                                      checkip.dyndns.comUnited States
                                                      31898ORACLE-BMC-31898USfalse
                                                      172.67.177.134
                                                      reallyfreegeoip.orgUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1578737
                                                      Start date and time:2024-12-20 09:59:05 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 7m 36s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:10
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:YU SV Payment.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.expl.evad.winEXE@10/6@2/2
                                                      EGA Information:
                                                      • Successful, ratio: 60%
                                                      HCA Information:
                                                      • Successful, ratio: 99%
                                                      • Number of executed functions: 50
                                                      • Number of non-executed functions: 299
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Execution Graph export aborted for target RegSvcs.exe, PID 5960 because it is empty
                                                      • Execution Graph export aborted for target RegSvcs.exe, PID 6788 because it is empty
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                      TimeTypeDescription
                                                      09:00:01AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      193.122.6.168PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      SWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      172.67.177.134PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                          66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                            RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                              Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          checkip.dyndns.comPURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 132.226.247.73
                                                                          PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 193.122.6.168
                                                                          Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                          • 158.101.44.242
                                                                          HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 158.101.44.242
                                                                          66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 193.122.130.0
                                                                          _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 158.101.44.242
                                                                          F.O Pump Istek,Docx.batGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          D.G Governor Istek,Docx.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                          • 132.226.247.73
                                                                          0001.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          Nuevo pedido de cotizaci#U00f3n 663837 4899272.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 132.226.247.73
                                                                          reallyfreegeoip.orgPURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.67.152
                                                                          PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          0001.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          Nuevo pedido de cotizaci#U00f3n 663837 4899272.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.67.152
                                                                          RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          ORACLE-BMC-31898USla.bot.sparc.elfGet hashmaliciousMiraiBrowse
                                                                          • 168.138.95.8
                                                                          PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 193.122.6.168
                                                                          x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                          • 144.25.16.134
                                                                          Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                          • 158.101.44.242
                                                                          HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 158.101.44.242
                                                                          x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                          • 150.136.65.7
                                                                          sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                          • 193.123.7.187
                                                                          66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 193.122.130.0
                                                                          la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                                                          • 129.148.164.81
                                                                          la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                                                                          • 132.145.4.150
                                                                          CLOUDFLARENETUSwp-s2.exeGet hashmaliciousPython BackDoorBrowse
                                                                          • 104.20.22.46
                                                                          file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                                          • 104.21.67.146
                                                                          https://u46509964.ct.sendgrid.net/ls/click?upn=u001.16O0hg1-2FLz1kpPxGHUZbqTUnkidniSFIXbuQ0K27NKGR5E4qQP4y3-2BK2LCxUfHTmD8VAoWu9fqrv96heRY-2BDaw-3D-3DTW9l_kcz-2FW2m7wWBC5iX2nmYizXpnEWoSr8Rc5lqOd2Tm8BrX2ha7XCwhAEdfUnTDQdcFlDoClQCenTHrYqYGrvROsmQGK19xExQ3O8UU0JUBZANb3FsycXG0lXfAeU6Ge3kEKNmMydUTpk2mvytxKM8NWM4-2BCe9md9gsZjY-2FmreGd712h4QJlOUlhQy19VQuOzLTR0hg5YGbygTAwGERJ0n3IsJQDuwHOGcAqA18p5ElbhIowXEJo1-2FUNhaAkl3hll56dS6aJMfJ2Cg7jctNhsypZwMqKm18nIQwqxy0HjDjPtDlRcWFBii-2BIabVdhAMwhtvbY-2BhH45kGHgqL1VbALLhTExLjDfFJ4Mdg1hbx5shtVSm69xnT8S0os3NwgUPcP6MZcGvFpVYjCIpNJRmEhnpApXmFzR0GdBotdIKDeKv3ZVh61As-2FSNo3vfT6a-2F1G6CSiTaxzhsqh2H-2BbaxKc9CNbAVT-2BT7dLfv3mwuz99sF3ZWYAQVhK-2FC3sPsTl5X4hdzGiFwatwFf8YUFBISMNX22jwRHFRxLR66dQgVtYo7IumZ-2FOZfPJ2G3u57Las-2FXsx3SO8XE1W1y4QspPQeH1YjVMsZnAeeR8w-2FvWRwY1A7qeifyIBD1fUq-2B4bmZYMnqZ3q5oEXMCBqA-2Fhiv6OawVXsyA5vOFgFJ9F0GjgBX8N-2FlVTcBHanqEGbxSYzxEvDD4r3DBgXj6FxUKNaXGPhd18AzzCXeX88LcJxWAPd-2Fv7JiB88FpQ5kwb7TyWiLLfMzbetfGykMOctbu8W3BbDsIyadCguknOKT9sBLCEKiPAam3h8kh-2BsXXxkR2EvqCeFfErZ3PwKa1SVHAEbQojZZV7jqlLyJR8KYd7Ob5ZMYMENFHn0kgSi7eB-2FawHwHTrEhLDYX-2BOWrkMOQimBc4NTUUy5DbdiVfhlyh7bL6srP-2ByInzpsE8pygdal5s3pCDu8-2F94-2B1f3C1MQ9-2FkWFJVilN3Xiglg-3D-3DGet hashmaliciousUnknownBrowse
                                                                          • 104.18.142.119
                                                                          ktyihkdfesf.exeGet hashmaliciousVidarBrowse
                                                                          • 172.64.41.3
                                                                          pjthjsdjgjrtavv.exeGet hashmaliciousVidarBrowse
                                                                          • 172.64.41.3
                                                                          Captcha.htaGet hashmaliciousLummaC, Cobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                                                          • 172.67.197.170
                                                                          file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC StealerBrowse
                                                                          • 172.67.180.113
                                                                          8ZVMneG.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.66.86
                                                                          https://us-east-2.protection.sophos.com/?d=purogosouls.github.io&u=aHR0cHM6Ly9wdXJvZ29zb3Vscy5naXRodWIuaW8vNjRkczZmNHM5ZDRmODlzZDRzZjQ2c2Q0ZjYv&i=NWQ0M2E1N2M3M2U5MzQxMGM1NjBhNmQ1&t=dEtlN04wQWZmZ0hqZlpiZEYwVXZ4NHFvc2NQNGtsUWl4Unlndk5helZOaz0=&h=356f16f6a39049efa5b305c7477e094a&s=AVNPUEhUT0NFTkNSWVBUSVZaHP6eDnex344kFPbGkNGwPXEfGJHtcvdIV0gRc1_JzA%20us-east-2.protection.sophos.comGet hashmaliciousHTMLPhisherBrowse
                                                                          • 104.21.49.70
                                                                          Laurier Partners Proposal.emlGet hashmaliciousHTMLPhisherBrowse
                                                                          • 1.1.1.1
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          54328bd36c14bd82ddaa0c04b25ed9adPURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          0001.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          Nuevo pedido de cotizaci#U00f3n 663837 4899272.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          No context
                                                                          Process:C:\Users\user\Desktop\YU SV Payment.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):60818
                                                                          Entropy (8bit):7.90473290302833
                                                                          Encrypted:false
                                                                          SSDEEP:1536:JDNAibMLbDDJukkdcRE3Fyr8vUQECSOzgVeMVYB13lj/:JCib6bhuc8vUOTzgVhu1h
                                                                          MD5:CD88B7474B174FCF07A5017EE7FD77C0
                                                                          SHA1:1693F05FDA9065CD298D3A4BB8C67A65DEE06583
                                                                          SHA-256:C92167516C5740F3065A3C8FB8F7205DC2B6CCF5AEB139ADFA1C2C2523EC9761
                                                                          SHA-512:0445AEC540E71AF1CB6D6B1405BAA7C84ECA772646CEDCD26B83FA940F7926FD2949E402B7D42C504BBD8466738207EAFD0FE9B06DC767F02DC4A87CD7EC0256
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:EA06..n....4.fc7..U.W:.U..f.P..kq.Uk .y....}....-.N.?..R!..C....fO&..h..-.cX..f.z.b.b.Mb.9...X..`...V.!..#..",...=.2.M&T.>GS..X..c5.Rfp...UT..g...u....T.,......kb..&t.t.?3p..l&..u\./.).G.U..f.Z...^.......7u]J...5.X.N....c.....G....]@...-O@,....c.....].S@..oQ...p...1..m......,}.@.........:..w.u...z.J.-..&...g.4..f4..`.k..Q ...#.....`.bk5.....;...........&._.......'[...aB.r...T..s:T...T..b...F@........+..@..0.!) .........@....XM...`.aO.,%.X.veP....Z.f/5.N*.....Y..v."d.l..g{y..eT.D..Z..i5.M.q..:....j..k1.u@y....P.s..)D..z.M&4.]2o7..c.i...l.M&.....[.!c...Kk8.h#v.5~eP..a..e.x..mg`..oj..&..%.O".c#5..NaA..fq..b.K......~.L.Mf4..f7...@)H.:._..f...rkA........B,.Z..c5.B*.....3.ghS*.N7t..l3y..ex...1.,.y..Mf.*......p...1..Uj6x..m....w...Lc...j.5..*.....x.Bc7...iP...Z..?m.7&...V.7..~.!...Y...`.$.gM.\.JJ..[...7;<.o9..<.i..)..F..)EV...^.c...X..p.`. ...T...."6...........z,.cL...0.r.K..R....[#.F*...w.]..m.F%..../.`.....J...(..xV..2.O..f.ZF..p._......o.ynu.....`...*...G
                                                                          Process:C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):60818
                                                                          Entropy (8bit):7.90473290302833
                                                                          Encrypted:false
                                                                          SSDEEP:1536:JDNAibMLbDDJukkdcRE3Fyr8vUQECSOzgVeMVYB13lj/:JCib6bhuc8vUOTzgVhu1h
                                                                          MD5:CD88B7474B174FCF07A5017EE7FD77C0
                                                                          SHA1:1693F05FDA9065CD298D3A4BB8C67A65DEE06583
                                                                          SHA-256:C92167516C5740F3065A3C8FB8F7205DC2B6CCF5AEB139ADFA1C2C2523EC9761
                                                                          SHA-512:0445AEC540E71AF1CB6D6B1405BAA7C84ECA772646CEDCD26B83FA940F7926FD2949E402B7D42C504BBD8466738207EAFD0FE9B06DC767F02DC4A87CD7EC0256
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:EA06..n....4.fc7..U.W:.U..f.P..kq.Uk .y....}....-.N.?..R!..C....fO&..h..-.cX..f.z.b.b.Mb.9...X..`...V.!..#..",...=.2.M&T.>GS..X..c5.Rfp...UT..g...u....T.,......kb..&t.t.?3p..l&..u\./.).G.U..f.Z...^.......7u]J...5.X.N....c.....G....]@...-O@,....c.....].S@..oQ...p...1..m......,}.@.........:..w.u...z.J.-..&...g.4..f4..`.k..Q ...#.....`.bk5.....;...........&._.......'[...aB.r...T..s:T...T..b...F@........+..@..0.!) .........@....XM...`.aO.,%.X.veP....Z.f/5.N*.....Y..v."d.l..g{y..eT.D..Z..i5.M.q..:....j..k1.u@y....P.s..)D..z.M&4.]2o7..c.i...l.M&.....[.!c...Kk8.h#v.5~eP..a..e.x..mg`..oj..&..%.O".c#5..NaA..fq..b.K......~.L.Mf4..f7...@)H.:._..f...rkA........B,.Z..c5.B*.....3.ghS*.N7t..l3y..ex...1.,.y..Mf.*......p...1..Uj6x..m....w...Lc...j.5..*.....x.Bc7...iP...Z..?m.7&...V.7..~.!...Y...`.$.gM.\.JJ..[...7;<.o9..<.i..)..F..)EV...^.c...X..p.`. ...T...."6...........z,.cL...0.r.K..R....[#.F*...w.]..m.F%..../.`.....J...(..xV..2.O..f.ZF..p._......o.ynu.....`...*...G
                                                                          Process:C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):60818
                                                                          Entropy (8bit):7.90473290302833
                                                                          Encrypted:false
                                                                          SSDEEP:1536:JDNAibMLbDDJukkdcRE3Fyr8vUQECSOzgVeMVYB13lj/:JCib6bhuc8vUOTzgVhu1h
                                                                          MD5:CD88B7474B174FCF07A5017EE7FD77C0
                                                                          SHA1:1693F05FDA9065CD298D3A4BB8C67A65DEE06583
                                                                          SHA-256:C92167516C5740F3065A3C8FB8F7205DC2B6CCF5AEB139ADFA1C2C2523EC9761
                                                                          SHA-512:0445AEC540E71AF1CB6D6B1405BAA7C84ECA772646CEDCD26B83FA940F7926FD2949E402B7D42C504BBD8466738207EAFD0FE9B06DC767F02DC4A87CD7EC0256
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:EA06..n....4.fc7..U.W:.U..f.P..kq.Uk .y....}....-.N.?..R!..C....fO&..h..-.cX..f.z.b.b.Mb.9...X..`...V.!..#..",...=.2.M&T.>GS..X..c5.Rfp...UT..g...u....T.,......kb..&t.t.?3p..l&..u\./.).G.U..f.Z...^.......7u]J...5.X.N....c.....G....]@...-O@,....c.....].S@..oQ...p...1..m......,}.@.........:..w.u...z.J.-..&...g.4..f4..`.k..Q ...#.....`.bk5.....;...........&._.......'[...aB.r...T..s:T...T..b...F@........+..@..0.!) .........@....XM...`.aO.,%.X.veP....Z.f/5.N*.....Y..v."d.l..g{y..eT.D..Z..i5.M.q..:....j..k1.u@y....P.s..)D..z.M&4.]2o7..c.i...l.M&.....[.!c...Kk8.h#v.5~eP..a..e.x..mg`..oj..&..%.O".c#5..NaA..fq..b.K......~.L.Mf4..f7...@)H.:._..f...rkA........B,.Z..c5.B*.....3.ghS*.N7t..l3y..ex...1.,.y..Mf.*......p...1..Uj6x..m....w...Lc...j.5..*.....x.Bc7...iP...Z..?m.7&...V.7..~.!...Y...`.$.gM.\.JJ..[...7;<.o9..<.i..)..F..)EV...^.c...X..p.`. ...T...."6...........z,.cL...0.r.K..R....[#.F*...w.]..m.F%..../.`.....J...(..xV..2.O..f.ZF..p._......o.ynu.....`...*...G
                                                                          Process:C:\Users\user\Desktop\YU SV Payment.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):93696
                                                                          Entropy (8bit):6.71115015279099
                                                                          Encrypted:false
                                                                          SSDEEP:1536:wMQmFunxiFWwdsi2r+4YuifIq8sKi5vAbV2OPlHye1f5gt1Mi/MIkIeuSlmjjirz:P3FuxiFWwWi2r+49ifIq81i5wV2OPxyS
                                                                          MD5:694F93D4893DC6B574D041734F581A5C
                                                                          SHA1:3994F067833F7DBA51749C3139230BF0051F1E9D
                                                                          SHA-256:9C4D66A427E09172A1BF160E5428B668BE221C626BDA5739D080D09586857883
                                                                          SHA-512:5164F5600EABB71AED63F9952997A5EDB1785D7E43D362B58341749D5E91782A551FC7D1FAB9E2019CE141EDE33AA427BB992565C186500CE720AA50B2C1046C
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:.o.NVY171B2P..NU.175B2P5qNUY175B2P51NUY175B2P51NUY175B2P51NU.175L-.;1.\...4..qaY'&yAEZ%@1X.-47_XAbP5.C;;yXY..}..\!1<.:8H.P51NUY1gpB2.42N....5B2P51NU.154I3.51*TY1?5B2P51p.X17.B2P.0NUYq75b2P53NU]175B2P57NUY175B2.41NWY175B2R5Q.UY!75R2P51^UY!75B2P5!NUY175B2P51..X1`5B2P.0N.\175B2P51NUY175B2P51.TY=75B2P51NUY175B2P51NUY175B2P51NUY175B2P51NUY175B2P51NuY1?5B2P51NUY17=b2P}1NUY175B2P5.:0!E75Bv241NuY17QC2P71NUY175B2P51NUy17Ul@#GRNUY.25B2.41NSY17SC2P51NUY175B2Pu1N.wCRY-QP5=NUY1.4B2R51N9X175B2P51NUY17uB2.51NUY175B2P51NUY..4B2P51.UY155G2..1N..176B2Po1NS..75.2P51NUY175B2P51NUY175B2P51NUY175B2P51NUY175.O.:...0B..B2P51NT[233J:P51NUY17KB2Ps1NU.175u2P5.NUY\75B.P510UY1I5B2451N'Y17TB2Pr1NU6175,2P5ONUY/5.]2P?.hU[..5B8P..=tY1=.C2P1BlUY;.7B2TF.NUS.45B6#.1N_.575FAu51D.\171hhP6.XSY1,Zz2P?1M.L775Y.v53flY1=5h.P6.[SY1,.`2R.8NU].aF_2P3..UY;C<B2R.;NU].)7jqP5;dw'"75F.P..0AY13.B.rK$NU].7.`LF51J~Y..KU2P1.N._.U50.\5AM:8173j.P5;f.Y115h.PK?NU]3X.B2Z..tUqa75D2xd1NSY..5<.P55bR'.75F.FK.NU].1MB2VF.NUS...B2T..NUS1..B..51HUq}75D
                                                                          Process:C:\Users\user\Desktop\YU SV Payment.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1080832
                                                                          Entropy (8bit):6.742817223350076
                                                                          Encrypted:false
                                                                          SSDEEP:24576:IqDEvCTbMWu7rQYlBQcBiT6rprG8a4TVMdd5:ITvC/MTQYxsWR7a4T+dd
                                                                          MD5:87753B0227A35FD7E550432B6C56DC6B
                                                                          SHA1:D55941C0FC895EDA454C6D6650626E2C2D4422F4
                                                                          SHA-256:E5406C9136408DDBE90EC00C45B1291E3E847826CE1BE6C39B77327D135E57C2
                                                                          SHA-512:62E3682EA422D0A683545EB89C090E7F5B392A9A9FDFC4CE38B326483C5FF799A4D322FE4EFFA756203DB252955C4D1FC51F10B94B71CF89444A76262DC028CD
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          • Antivirus: ReversingLabs, Detection: 37%
                                                                          • Antivirus: Virustotal, Detection: 23%, Browse
                                                                          Reputation:low
                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L.....dg..........".................w.............@................................./.....@...@.......@.....................d...|....@.......................`...u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc........@......................@..@.reloc...u...`...v..................@..B........................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):278
                                                                          Entropy (8bit):3.428338917178984
                                                                          Encrypted:false
                                                                          SSDEEP:6:DMM8lfm3OOQdUfcloRKUEZ+lX14lE8OlkqV6nriIM8lfQVn:DsO+vNloRKQ1oEnio4mA2n
                                                                          MD5:51276E6AC3103931D08E43BB06B6FBA2
                                                                          SHA1:A23639D1364596D3505FD6DB41ED66BE6B93E010
                                                                          SHA-256:689EC225CD5B21D6A390D74A381A6FEBCBE83950D1CD3FAF4ED9EA5D29E388CD
                                                                          SHA-512:65DA7342A0518D1842C3E80188ED3DFECA2C720959A04EED501FAB0559A094C6592EE65376484A5AC13DB7D486CBD9A36D1ED9CF0FB90527DBD9C500414E20E5
                                                                          Malicious:true
                                                                          Reputation:low
                                                                          Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.e.a.k.l.i.k.e.\.L.y.m.n.a.e.i.d.a.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Entropy (8bit):6.742817223350076
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:YU SV Payment.exe
                                                                          File size:1'080'832 bytes
                                                                          MD5:87753b0227a35fd7e550432b6c56dc6b
                                                                          SHA1:d55941c0fc895eda454c6d6650626e2c2d4422f4
                                                                          SHA256:e5406c9136408ddbe90ec00c45b1291e3e847826ce1be6c39b77327d135e57c2
                                                                          SHA512:62e3682ea422d0a683545eb89c090e7f5b392a9a9fdfc4ce38b326483c5ff799a4d322fe4effa756203db252955c4d1fc51f10b94b71cf89444a76262dc028cd
                                                                          SSDEEP:24576:IqDEvCTbMWu7rQYlBQcBiT6rprG8a4TVMdd5:ITvC/MTQYxsWR7a4T+dd
                                                                          TLSH:DD35AE0277839022FF9B95334B9AE25157BC6B660123A51F13981DB9FE705B3063E7A3
                                                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                          Icon Hash:0f4d0d0707692113
                                                                          Entrypoint:0x420577
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x6764F793 [Fri Dec 20 04:50:27 2024 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:5
                                                                          OS Version Minor:1
                                                                          File Version Major:5
                                                                          File Version Minor:1
                                                                          Subsystem Version Major:5
                                                                          Subsystem Version Minor:1
                                                                          Import Hash:948cc502fe9226992dce9417f952fce3
                                                                          Instruction
                                                                          call 00007FF1588973F3h
                                                                          jmp 00007FF158896CFFh
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          push esi
                                                                          push dword ptr [ebp+08h]
                                                                          mov esi, ecx
                                                                          call 00007FF158896EDDh
                                                                          mov dword ptr [esi], 0049FDF0h
                                                                          mov eax, esi
                                                                          pop esi
                                                                          pop ebp
                                                                          retn 0004h
                                                                          and dword ptr [ecx+04h], 00000000h
                                                                          mov eax, ecx
                                                                          and dword ptr [ecx+08h], 00000000h
                                                                          mov dword ptr [ecx+04h], 0049FDF8h
                                                                          mov dword ptr [ecx], 0049FDF0h
                                                                          ret
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          push esi
                                                                          push dword ptr [ebp+08h]
                                                                          mov esi, ecx
                                                                          call 00007FF158896EAAh
                                                                          mov dword ptr [esi], 0049FE0Ch
                                                                          mov eax, esi
                                                                          pop esi
                                                                          pop ebp
                                                                          retn 0004h
                                                                          and dword ptr [ecx+04h], 00000000h
                                                                          mov eax, ecx
                                                                          and dword ptr [ecx+08h], 00000000h
                                                                          mov dword ptr [ecx+04h], 0049FE14h
                                                                          mov dword ptr [ecx], 0049FE0Ch
                                                                          ret
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          push esi
                                                                          mov esi, ecx
                                                                          lea eax, dword ptr [esi+04h]
                                                                          mov dword ptr [esi], 0049FDD0h
                                                                          and dword ptr [eax], 00000000h
                                                                          and dword ptr [eax+04h], 00000000h
                                                                          push eax
                                                                          mov eax, dword ptr [ebp+08h]
                                                                          add eax, 04h
                                                                          push eax
                                                                          call 00007FF158899A9Dh
                                                                          pop ecx
                                                                          pop ecx
                                                                          mov eax, esi
                                                                          pop esi
                                                                          pop ebp
                                                                          retn 0004h
                                                                          lea eax, dword ptr [ecx+04h]
                                                                          mov dword ptr [ecx], 0049FDD0h
                                                                          push eax
                                                                          call 00007FF158899AE8h
                                                                          pop ecx
                                                                          ret
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          push esi
                                                                          mov esi, ecx
                                                                          lea eax, dword ptr [esi+04h]
                                                                          mov dword ptr [esi], 0049FDD0h
                                                                          push eax
                                                                          call 00007FF158899AD1h
                                                                          test byte ptr [ebp+08h], 00000001h
                                                                          pop ecx
                                                                          Programming Language:
                                                                          • [ C ] VS2008 SP1 build 30729
                                                                          • [IMP] VS2008 SP1 build 30729
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x312e8.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1060000x7594.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rsrc0xd40000x312e80x314002a968ea0d9f906308dfa9779c81445b7False0.6942714942893401data6.9168954804993925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0x1060000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0xd44580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                          RT_ICON0xd45800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                          RT_ICON0xd46a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                          RT_ICON0xd47d00xe4e8Device independent bitmap graphic, 217 x 464 x 8, image size 51040, 256 important colorsEnglishGreat Britain0.08484641638225256
                                                                          RT_MENU0xe2cb80x50dataEnglishGreat Britain0.9
                                                                          RT_STRING0xe2d080x594dataEnglishGreat Britain0.3333333333333333
                                                                          RT_STRING0xe329c0x68adataEnglishGreat Britain0.2735961768219833
                                                                          RT_STRING0xe39280x490dataEnglishGreat Britain0.3715753424657534
                                                                          RT_STRING0xe3db80x5fcdataEnglishGreat Britain0.3087467362924282
                                                                          RT_STRING0xe43b40x65cdataEnglishGreat Britain0.34336609336609336
                                                                          RT_STRING0xe4a100x466dataEnglishGreat Britain0.3605683836589698
                                                                          RT_STRING0xe4e780x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                          RT_RCDATA0xe4fd00x1fdfbdata1.0003523419248592
                                                                          RT_GROUP_ICON0x104dcc0x14dataEnglishGreat Britain1.25
                                                                          RT_GROUP_ICON0x104de00x14dataEnglishGreat Britain1.25
                                                                          RT_GROUP_ICON0x104df40x14dataEnglishGreat Britain1.15
                                                                          RT_GROUP_ICON0x104e080x14dataEnglishGreat Britain1.25
                                                                          RT_VERSION0x104e1c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                          RT_MANIFEST0x104ef80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                          DLLImport
                                                                          WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                          MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                          WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                          PSAPI.DLLGetProcessMemoryInfo
                                                                          IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                          USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                          UxTheme.dllIsThemeActive
                                                                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                          USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                          GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                          SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                          OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishGreat Britain
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2024-12-20T10:00:09.099589+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730193.122.6.16880TCP
                                                                          2024-12-20T10:00:17.773376+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449732193.122.6.16880TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 20, 2024 10:00:01.030688047 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:00:01.150613070 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:00:01.150787115 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:00:01.151093960 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:00:01.270560980 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:00:08.425436974 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:00:08.430486917 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:00:08.550229073 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:00:09.053066015 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:00:09.099589109 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:00:09.197892904 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:09.197942972 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:09.198018074 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:09.208153009 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:09.208177090 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:10.435348034 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:10.435451031 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:10.441040039 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:10.441066980 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:10.441533089 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:10.490220070 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:10.555174112 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:10.595355034 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:11.027817965 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:11.027971029 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:11.028028965 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:11.034307957 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:13.141757011 CET4973280192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:00:13.261708021 CET8049732193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:00:13.261811018 CET4973280192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:00:13.262166977 CET4973280192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:00:13.381761074 CET8049732193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:00:16.535368919 CET8049732193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:00:16.540451050 CET4973280192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:00:16.660330057 CET8049732193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:00:17.728611946 CET8049732193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:00:17.756513119 CET49737443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:17.756583929 CET44349737172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:17.756654978 CET49737443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:17.760610104 CET49737443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:17.760634899 CET44349737172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:17.773375988 CET4973280192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:00:18.972491026 CET44349737172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:18.972563982 CET49737443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:18.974783897 CET49737443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:18.974798918 CET44349737172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:18.975195885 CET44349737172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:19.018851995 CET49737443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:19.059336901 CET44349737172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:19.417234898 CET44349737172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:19.417428017 CET44349737172.67.177.134192.168.2.4
                                                                          Dec 20, 2024 10:00:19.417557001 CET49737443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:00:19.429693937 CET49737443192.168.2.4172.67.177.134
                                                                          Dec 20, 2024 10:01:14.075258970 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:01:14.075444937 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:01:22.734172106 CET8049732193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:01:22.734275103 CET4973280192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:01:49.068958998 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:01:49.188474894 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 20, 2024 10:01:57.756311893 CET4973280192.168.2.4193.122.6.168
                                                                          Dec 20, 2024 10:01:57.875775099 CET8049732193.122.6.168192.168.2.4
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 20, 2024 10:00:00.886746883 CET6402053192.168.2.41.1.1.1
                                                                          Dec 20, 2024 10:00:01.024341106 CET53640201.1.1.1192.168.2.4
                                                                          Dec 20, 2024 10:00:09.055083036 CET5772453192.168.2.41.1.1.1
                                                                          Dec 20, 2024 10:00:09.196887016 CET53577241.1.1.1192.168.2.4
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Dec 20, 2024 10:00:00.886746883 CET192.168.2.41.1.1.10x7f51Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                          Dec 20, 2024 10:00:09.055083036 CET192.168.2.41.1.1.10xc190Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Dec 20, 2024 10:00:01.024341106 CET1.1.1.1192.168.2.40x7f51No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                          Dec 20, 2024 10:00:01.024341106 CET1.1.1.1192.168.2.40x7f51No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                          Dec 20, 2024 10:00:01.024341106 CET1.1.1.1192.168.2.40x7f51No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                          Dec 20, 2024 10:00:01.024341106 CET1.1.1.1192.168.2.40x7f51No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                          Dec 20, 2024 10:00:01.024341106 CET1.1.1.1192.168.2.40x7f51No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                          Dec 20, 2024 10:00:01.024341106 CET1.1.1.1192.168.2.40x7f51No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                          Dec 20, 2024 10:00:09.196887016 CET1.1.1.1192.168.2.40xc190No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                          Dec 20, 2024 10:00:09.196887016 CET1.1.1.1192.168.2.40xc190No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                          • reallyfreegeoip.org
                                                                          • checkip.dyndns.org
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.449730193.122.6.168805960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 20, 2024 10:00:01.151093960 CET151OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Connection: Keep-Alive
                                                                          Dec 20, 2024 10:00:08.425436974 CET273INHTTP/1.1 200 OK
                                                                          Date: Fri, 20 Dec 2024 09:00:08 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 104
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                          Dec 20, 2024 10:00:08.430486917 CET127OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Dec 20, 2024 10:00:09.053066015 CET273INHTTP/1.1 200 OK
                                                                          Date: Fri, 20 Dec 2024 09:00:08 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 104
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.449732193.122.6.168806788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 20, 2024 10:00:13.262166977 CET151OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Connection: Keep-Alive
                                                                          Dec 20, 2024 10:00:16.535368919 CET273INHTTP/1.1 200 OK
                                                                          Date: Fri, 20 Dec 2024 09:00:16 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 104
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                          Dec 20, 2024 10:00:16.540451050 CET127OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Dec 20, 2024 10:00:17.728611946 CET273INHTTP/1.1 200 OK
                                                                          Date: Fri, 20 Dec 2024 09:00:17 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 104
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.449731172.67.177.1344435960C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-20 09:00:10 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          Connection: Keep-Alive
                                                                          2024-12-20 09:00:11 UTC838INHTTP/1.1 200 OK
                                                                          Date: Fri, 20 Dec 2024 09:00:10 GMT
                                                                          Content-Type: text/xml
                                                                          Content-Length: 362
                                                                          Connection: close
                                                                          Cache-Control: max-age=31536000
                                                                          cf-cache-status: MISS
                                                                          last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aL7T5NrGuwotruIgXUsFf2tyfhGUL727x5tnwlfSabFeGuotYWIAcHxe05EAKk4gonLlzjXpJr2dkAe2zuUSsXQqNvjZO7c35kjGwfqmsRJYs8YA%2FfatPYAeEEdXuGVshYFBYAEx"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8f4e70c6fcf65e6a-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1586&min_rtt=1583&rtt_var=599&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1817050&cwnd=224&unsent_bytes=0&cid=5ccc4558fa80110d&ts=611&x=0"
                                                                          2024-12-20 09:00:11 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.449737172.67.177.1344436788C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-20 09:00:19 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          Connection: Keep-Alive
                                                                          2024-12-20 09:00:19 UTC847INHTTP/1.1 200 OK
                                                                          Date: Fri, 20 Dec 2024 09:00:19 GMT
                                                                          Content-Type: text/xml
                                                                          Content-Length: 362
                                                                          Connection: close
                                                                          Age: 8
                                                                          Cache-Control: max-age=31536000
                                                                          cf-cache-status: HIT
                                                                          last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c1ykoXE0jvgP7lsKDZoN4cC5QVNiZo%2BrK5OjeB0oUHqXHCpqBFgpPT5dPXxgmz5p8MwLhIFBlW44Wf7XExyCpM%2BJwK6w7w9q5oCmBFuZxTCauBtpQ94ylNS5N1HnjYzQ4nMwcVgI"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8f4e70fc5ccc41c6-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1774&min_rtt=1769&rtt_var=667&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1650650&cwnd=204&unsent_bytes=0&cid=92e8b64f307f6682&ts=450&x=0"
                                                                          2024-12-20 09:00:19 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:03:59:56
                                                                          Start date:20/12/2024
                                                                          Path:C:\Users\user\Desktop\YU SV Payment.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\YU SV Payment.exe"
                                                                          Imagebase:0x5b0000
                                                                          File size:1'080'832 bytes
                                                                          MD5 hash:87753B0227A35FD7E550432B6C56DC6B
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:1
                                                                          Start time:03:59:57
                                                                          Start date:20/12/2024
                                                                          Path:C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\YU SV Payment.exe"
                                                                          Imagebase:0x550000
                                                                          File size:1'080'832 bytes
                                                                          MD5 hash:87753B0227A35FD7E550432B6C56DC6B
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000001.00000002.1713434175.0000000001710000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                          Antivirus matches:
                                                                          • Detection: 100%, Joe Sandbox ML
                                                                          • Detection: 37%, ReversingLabs
                                                                          • Detection: 23%, Virustotal, Browse
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:2
                                                                          Start time:03:59:59
                                                                          Start date:20/12/2024
                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\YU SV Payment.exe"
                                                                          Imagebase:0xe20000
                                                                          File size:45'984 bytes
                                                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2913973392.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2915159253.00000000031B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:3
                                                                          Start time:04:00:09
                                                                          Start date:20/12/2024
                                                                          Path:C:\Windows\System32\wscript.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lymnaeidae.vbs"
                                                                          Imagebase:0x7ff767100000
                                                                          File size:170'496 bytes
                                                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:4
                                                                          Start time:04:00:09
                                                                          Start date:20/12/2024
                                                                          Path:C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe"
                                                                          Imagebase:0x550000
                                                                          File size:1'080'832 bytes
                                                                          MD5 hash:87753B0227A35FD7E550432B6C56DC6B
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000004.00000002.1834846040.0000000001570000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:5
                                                                          Start time:04:00:11
                                                                          Start date:20/12/2024
                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\AppData\Local\peaklike\Lymnaeidae.exe"
                                                                          Imagebase:0x850000
                                                                          File size:45'984 bytes
                                                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2915619784.0000000002C05000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:2.8%
                                                                            Dynamic/Decrypted Code Coverage:0.9%
                                                                            Signature Coverage:4.9%
                                                                            Total number of Nodes:1985
                                                                            Total number of Limit Nodes:66
                                                                            execution_graph 95017 5b105b 95022 5b344d 95017->95022 95019 5b106a 95053 5d00a3 29 API calls __onexit 95019->95053 95021 5b1074 95023 5b345d __wsopen_s 95022->95023 95054 5ba961 95023->95054 95027 5b351c 95066 5b3357 95027->95066 95034 5ba961 22 API calls 95035 5b354d 95034->95035 95087 5ba6c3 95035->95087 95038 5f3176 RegQueryValueExW 95039 5f320c RegCloseKey 95038->95039 95040 5f3193 95038->95040 95043 5b3578 95039->95043 95051 5f321e _wcslen 95039->95051 95093 5cfe0b 95040->95093 95042 5f31ac 95103 5b5722 95042->95103 95043->95019 95046 5f31d4 95106 5b6b57 95046->95106 95048 5f31ee ISource 95048->95039 95050 5b515f 22 API calls 95050->95051 95051->95043 95051->95050 95052 5b4c6d 22 API calls 95051->95052 95118 5b9cb3 95051->95118 95052->95051 95053->95021 95055 5cfe0b 22 API calls 95054->95055 95056 5ba976 95055->95056 95124 5cfddb 95056->95124 95058 5b3513 95059 5b3a5a 95058->95059 95146 5f1f50 95059->95146 95062 5b9cb3 22 API calls 95063 5b3a8d 95062->95063 95148 5b3aa2 95063->95148 95065 5b3a97 95065->95027 95067 5f1f50 __wsopen_s 95066->95067 95068 5b3364 GetFullPathNameW 95067->95068 95069 5b3386 95068->95069 95070 5b6b57 22 API calls 95069->95070 95071 5b33a4 95070->95071 95072 5b33c6 95071->95072 95073 5f30bb 95072->95073 95074 5b33dd 95072->95074 95076 5cfddb 22 API calls 95073->95076 95172 5b33ee 95074->95172 95078 5f30c5 _wcslen 95076->95078 95077 5b33e8 95081 5b515f 95077->95081 95079 5cfe0b 22 API calls 95078->95079 95080 5f30fe __fread_nolock 95079->95080 95082 5b516e 95081->95082 95086 5b518f __fread_nolock 95081->95086 95084 5cfe0b 22 API calls 95082->95084 95083 5cfddb 22 API calls 95085 5b3544 95083->95085 95084->95086 95085->95034 95086->95083 95088 5ba6dd 95087->95088 95089 5b3556 RegOpenKeyExW 95087->95089 95090 5cfddb 22 API calls 95088->95090 95089->95038 95089->95043 95091 5ba6e7 95090->95091 95092 5cfe0b 22 API calls 95091->95092 95092->95089 95095 5cfddb 95093->95095 95094 5dea0c ___std_exception_copy 21 API calls 95094->95095 95095->95094 95096 5cfdfa 95095->95096 95099 5cfdfc 95095->95099 95187 5d4ead 7 API calls 2 library calls 95095->95187 95096->95042 95098 5d066d 95189 5d32a4 RaiseException 95098->95189 95099->95098 95188 5d32a4 RaiseException 95099->95188 95101 5d068a 95101->95042 95104 5cfddb 22 API calls 95103->95104 95105 5b5734 RegQueryValueExW 95104->95105 95105->95046 95105->95048 95107 5b6b67 _wcslen 95106->95107 95108 5f4ba1 95106->95108 95111 5b6b7d 95107->95111 95112 5b6ba2 95107->95112 95109 5b93b2 22 API calls 95108->95109 95110 5f4baa 95109->95110 95110->95110 95190 5b6f34 95111->95190 95113 5cfddb 22 API calls 95112->95113 95116 5b6bae 95113->95116 95115 5b6b85 __fread_nolock 95115->95048 95117 5cfe0b 22 API calls 95116->95117 95117->95115 95119 5b9cc2 _wcslen 95118->95119 95120 5cfe0b 22 API calls 95119->95120 95121 5b9cea __fread_nolock 95120->95121 95122 5cfddb 22 API calls 95121->95122 95123 5b9d00 95122->95123 95123->95051 95127 5cfde0 95124->95127 95126 5cfdfa 95126->95058 95127->95126 95130 5cfdfc 95127->95130 95134 5dea0c 95127->95134 95141 5d4ead 7 API calls 2 library calls 95127->95141 95129 5d066d 95143 5d32a4 RaiseException 95129->95143 95130->95129 95142 5d32a4 RaiseException 95130->95142 95132 5d068a 95132->95058 95139 5e3820 __dosmaperr 95134->95139 95135 5e385e 95145 5df2d9 20 API calls __dosmaperr 95135->95145 95137 5e3849 RtlAllocateHeap 95138 5e385c 95137->95138 95137->95139 95138->95127 95139->95135 95139->95137 95144 5d4ead 7 API calls 2 library calls 95139->95144 95141->95127 95142->95129 95143->95132 95144->95139 95145->95138 95147 5b3a67 GetModuleFileNameW 95146->95147 95147->95062 95149 5f1f50 __wsopen_s 95148->95149 95150 5b3aaf GetFullPathNameW 95149->95150 95151 5b3ae9 95150->95151 95152 5b3ace 95150->95152 95154 5ba6c3 22 API calls 95151->95154 95153 5b6b57 22 API calls 95152->95153 95155 5b3ada 95153->95155 95154->95155 95158 5b37a0 95155->95158 95159 5b37ae 95158->95159 95162 5b93b2 95159->95162 95161 5b37c2 95161->95065 95163 5b93c0 95162->95163 95164 5b93c9 __fread_nolock 95162->95164 95163->95164 95166 5baec9 95163->95166 95164->95161 95164->95164 95167 5baed9 __fread_nolock 95166->95167 95168 5baedc 95166->95168 95167->95164 95169 5cfddb 22 API calls 95168->95169 95170 5baee7 95169->95170 95171 5cfe0b 22 API calls 95170->95171 95171->95167 95173 5b33fe _wcslen 95172->95173 95174 5f311d 95173->95174 95175 5b3411 95173->95175 95177 5cfddb 22 API calls 95174->95177 95182 5ba587 95175->95182 95179 5f3127 95177->95179 95178 5b341e __fread_nolock 95178->95077 95180 5cfe0b 22 API calls 95179->95180 95181 5f3157 __fread_nolock 95180->95181 95183 5ba59d 95182->95183 95186 5ba598 __fread_nolock 95182->95186 95184 5cfe0b 22 API calls 95183->95184 95185 5ff80f 95183->95185 95184->95186 95185->95185 95186->95178 95187->95095 95188->95098 95189->95101 95191 5b6f4c 95190->95191 95193 5b6f46 95190->95193 95192 5cfe0b 22 API calls 95191->95192 95192->95193 95193->95115 95194 602a00 95209 5bd7b0 ISource 95194->95209 95195 5bdb11 PeekMessageW 95195->95209 95196 5bd807 GetInputState 95196->95195 95196->95209 95197 601cbe TranslateAcceleratorW 95197->95209 95199 5bdb8f PeekMessageW 95199->95209 95200 5bda04 timeGetTime 95200->95209 95201 5bdb73 TranslateMessage DispatchMessageW 95201->95199 95202 5bdbaf Sleep 95216 5bdbc0 95202->95216 95203 602b74 Sleep 95203->95216 95204 5ce551 timeGetTime 95204->95216 95205 601dda timeGetTime 95365 5ce300 23 API calls 95205->95365 95208 602c0b GetExitCodeProcess 95213 602c21 WaitForSingleObject 95208->95213 95214 602c37 CloseHandle 95208->95214 95209->95195 95209->95196 95209->95197 95209->95199 95209->95200 95209->95201 95209->95202 95209->95203 95209->95205 95212 5bd9d5 95209->95212 95226 5bdfd0 95209->95226 95249 5c1310 95209->95249 95305 5bdd50 235 API calls 95209->95305 95306 5bbf40 95209->95306 95364 5cedf6 IsDialogMessageW GetClassLongW 95209->95364 95366 623a2a 23 API calls 95209->95366 95367 5bec40 95209->95367 95391 62359c 82 API calls __wsopen_s 95209->95391 95210 6429bf GetForegroundWindow 95210->95216 95213->95209 95213->95214 95214->95216 95215 602a31 95215->95212 95216->95204 95216->95208 95216->95209 95216->95210 95216->95212 95216->95215 95217 602ca9 Sleep 95216->95217 95392 635658 23 API calls 95216->95392 95393 61e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95216->95393 95394 61d4dc 47 API calls 95216->95394 95217->95209 95227 5be010 95226->95227 95244 5be0dc ISource 95227->95244 95401 5d0242 5 API calls __Init_thread_wait 95227->95401 95230 602fca 95233 5ba961 22 API calls 95230->95233 95230->95244 95231 5ba961 22 API calls 95231->95244 95232 62359c 82 API calls 95232->95244 95234 602fe4 95233->95234 95402 5d00a3 29 API calls __onexit 95234->95402 95238 602fee 95403 5d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95238->95403 95240 5bec40 235 API calls 95240->95244 95244->95231 95244->95232 95244->95240 95245 5be3e1 95244->95245 95246 5c04f0 22 API calls 95244->95246 95395 5ba8c7 95244->95395 95399 5ba81b 41 API calls 95244->95399 95400 5ca308 235 API calls 95244->95400 95404 5d0242 5 API calls __Init_thread_wait 95244->95404 95405 5d00a3 29 API calls __onexit 95244->95405 95406 5d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95244->95406 95407 6347d4 235 API calls 95244->95407 95408 6368c1 235 API calls 95244->95408 95245->95209 95246->95244 95250 5c1376 95249->95250 95251 5c17b0 95249->95251 95253 606331 95250->95253 95254 5c1390 95250->95254 95537 5d0242 5 API calls __Init_thread_wait 95251->95537 95542 63709c 235 API calls 95253->95542 95255 5c1940 9 API calls 95254->95255 95258 5c13a0 95255->95258 95257 5c17ba 95260 5c17fb 95257->95260 95262 5b9cb3 22 API calls 95257->95262 95261 5c1940 9 API calls 95258->95261 95259 60633d 95259->95209 95264 606346 95260->95264 95266 5c182c 95260->95266 95263 5c13b6 95261->95263 95271 5c17d4 95262->95271 95263->95260 95265 5c13ec 95263->95265 95543 62359c 82 API calls __wsopen_s 95264->95543 95265->95264 95272 5c1408 __fread_nolock 95265->95272 95539 5baceb 23 API calls ISource 95266->95539 95269 5c1839 95540 5cd217 235 API calls 95269->95540 95270 5c15c7 ISource 95287 5c1872 95270->95287 95290 5c167b ISource 95270->95290 95409 5c1940 95270->95409 95419 5b4f39 95270->95419 95425 63959f 95270->95425 95428 61d4ce 95270->95428 95431 63958b 95270->95431 95434 626ef1 95270->95434 95514 63e505 95270->95514 95527 62f0ec 95270->95527 95547 62359c 82 API calls __wsopen_s 95270->95547 95538 5d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95271->95538 95272->95269 95272->95270 95275 60636e 95272->95275 95281 5cfddb 22 API calls 95272->95281 95282 5cfe0b 22 API calls 95272->95282 95289 5bec40 235 API calls 95272->95289 95291 5c152f 95272->95291 95292 6063b2 95272->95292 95544 62359c 82 API calls __wsopen_s 95275->95544 95277 5c153c 95279 5c1940 9 API calls 95277->95279 95278 6063d1 95546 635745 54 API calls _wcslen 95278->95546 95283 5c1549 95279->95283 95281->95272 95282->95272 95283->95270 95285 5c1940 9 API calls 95283->95285 95284 5c171d 95284->95209 95294 5c1563 95285->95294 95541 5cfaeb 23 API calls 95287->95541 95289->95272 95290->95284 95536 5cce17 22 API calls ISource 95290->95536 95291->95277 95291->95278 95545 62359c 82 API calls __wsopen_s 95292->95545 95294->95270 95297 5ba8c7 22 API calls 95294->95297 95297->95270 95305->95209 96609 5badf0 95306->96609 95308 5bbf9d 95309 5bbfa9 95308->95309 95310 6004b6 95308->95310 95312 5bc01e 95309->95312 95313 6004c6 95309->95313 96628 62359c 82 API calls __wsopen_s 95310->96628 96614 5bac91 95312->96614 96629 62359c 82 API calls __wsopen_s 95313->96629 95317 617120 22 API calls 95362 5bc039 ISource __fread_nolock 95317->95362 95318 5bc7da 95321 5cfe0b 22 API calls 95318->95321 95330 5bc808 __fread_nolock 95321->95330 95324 6004f5 95326 60055a 95324->95326 96630 5cd217 235 API calls 95324->96630 95349 5bc603 95326->95349 96631 62359c 82 API calls __wsopen_s 95326->96631 95327 60091a 96641 623209 23 API calls 95327->96641 95328 5cfe0b 22 API calls 95361 5bc350 ISource __fread_nolock 95328->95361 95329 5baf8a 22 API calls 95329->95362 95330->95328 95333 5bec40 235 API calls 95333->95362 95334 6008a5 95335 5bec40 235 API calls 95334->95335 95337 6008cf 95335->95337 95337->95349 96639 5ba81b 41 API calls 95337->96639 95338 600591 96632 62359c 82 API calls __wsopen_s 95338->96632 95339 6008f6 96640 62359c 82 API calls __wsopen_s 95339->96640 95343 5bbbe0 40 API calls 95343->95362 95346 5bc237 95347 5bc253 95346->95347 95348 5ba8c7 22 API calls 95346->95348 95351 600976 95347->95351 95357 5bc297 ISource 95347->95357 95348->95347 95349->95209 95350 5cfe0b 22 API calls 95350->95362 96642 5baceb 23 API calls ISource 95351->96642 95354 6009bf 95354->95349 96643 62359c 82 API calls __wsopen_s 95354->96643 95355 5cfddb 22 API calls 95355->95362 95357->95354 96625 5baceb 23 API calls ISource 95357->96625 95358 5bc335 95358->95354 95359 5bc342 95358->95359 96626 5ba704 22 API calls ISource 95359->96626 95363 5bc3ac 95361->95363 96627 5cce17 22 API calls ISource 95361->96627 95362->95317 95362->95318 95362->95324 95362->95326 95362->95327 95362->95329 95362->95330 95362->95333 95362->95334 95362->95338 95362->95339 95362->95343 95362->95346 95362->95349 95362->95350 95362->95354 95362->95355 96618 5bad81 95362->96618 96633 617099 22 API calls __fread_nolock 95362->96633 96634 635745 54 API calls _wcslen 95362->96634 96635 5caa42 22 API calls ISource 95362->96635 96636 61f05c 40 API calls 95362->96636 96637 5ba993 41 API calls 95362->96637 96638 5baceb 23 API calls ISource 95362->96638 95363->95209 95364->95209 95365->95209 95366->95209 95369 5bec76 ISource 95367->95369 95368 5d00a3 29 API calls pre_c_initialization 95368->95369 95369->95368 95370 5cfddb 22 API calls 95369->95370 95371 604beb 95369->95371 95372 5bed9d ISource 95369->95372 95374 5bfef7 95369->95374 95376 604600 95369->95376 95377 604b0b 95369->95377 95378 5ba8c7 22 API calls 95369->95378 95382 5d0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95369->95382 95385 5bfbe3 95369->95385 95386 5ba961 22 API calls 95369->95386 95389 5d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95369->95389 95390 5bf3ae ISource 95369->95390 96652 5c01e0 235 API calls 2 library calls 95369->96652 96653 5c06a0 41 API calls ISource 95369->96653 95370->95369 96657 62359c 82 API calls __wsopen_s 95371->96657 95372->95209 95374->95372 95380 5ba8c7 22 API calls 95374->95380 95376->95372 95383 5ba8c7 22 API calls 95376->95383 96655 62359c 82 API calls __wsopen_s 95377->96655 95378->95369 95380->95372 95382->95369 95383->95372 95385->95372 95387 604bdc 95385->95387 95385->95390 95386->95369 96656 62359c 82 API calls __wsopen_s 95387->96656 95389->95369 95390->95372 96654 62359c 82 API calls __wsopen_s 95390->96654 95391->95209 95392->95216 95393->95216 95394->95216 95396 5ba8ea __fread_nolock 95395->95396 95397 5ba8db 95395->95397 95396->95244 95397->95396 95398 5cfe0b 22 API calls 95397->95398 95398->95396 95399->95244 95400->95244 95401->95230 95402->95238 95403->95244 95404->95244 95405->95244 95406->95244 95407->95244 95408->95244 95410 5c1981 95409->95410 95415 5c195d 95409->95415 95548 5d0242 5 API calls __Init_thread_wait 95410->95548 95411 5c196e 95411->95270 95413 5c198b 95413->95415 95549 5d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95413->95549 95415->95411 95550 5d0242 5 API calls __Init_thread_wait 95415->95550 95416 5c8727 95416->95411 95551 5d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95416->95551 95420 5b4f43 95419->95420 95421 5b4f4a 95419->95421 95552 5de678 95420->95552 95423 5b4f6a FreeLibrary 95421->95423 95424 5b4f59 95421->95424 95423->95424 95424->95270 95817 637f59 95425->95817 95427 6395af 95427->95270 95949 61dbbe lstrlenW 95428->95949 95432 637f59 120 API calls 95431->95432 95433 63959b 95432->95433 95433->95270 95435 5ba961 22 API calls 95434->95435 95436 626f1d 95435->95436 95437 5ba961 22 API calls 95436->95437 95438 626f26 95437->95438 95439 626f3a 95438->95439 96139 5bb567 95438->96139 95441 5b7510 53 API calls 95439->95441 95448 626f57 _wcslen 95441->95448 95442 6270bf 95954 5b4ecb 95442->95954 95443 626fbc 95444 5b7510 53 API calls 95443->95444 95446 626fc8 95444->95446 95451 5ba8c7 22 API calls 95446->95451 95456 626fdb 95446->95456 95448->95442 95448->95443 95457 6270e9 95448->95457 95449 6270e5 95450 5ba961 22 API calls 95449->95450 95449->95457 95453 62711a 95450->95453 95451->95456 95452 5b4ecb 94 API calls 95452->95449 95454 5ba961 22 API calls 95453->95454 95459 627126 95454->95459 95455 627027 95458 5b7510 53 API calls 95455->95458 95456->95455 95460 627005 95456->95460 95463 5ba8c7 22 API calls 95456->95463 95457->95270 95461 627034 95458->95461 95462 5ba961 22 API calls 95459->95462 95464 5b33c6 22 API calls 95460->95464 95465 627047 95461->95465 95466 62703d 95461->95466 95467 62712f 95462->95467 95463->95460 95468 62700f 95464->95468 96144 61e199 GetFileAttributesW 95465->96144 95469 5ba8c7 22 API calls 95466->95469 95471 5ba961 22 API calls 95467->95471 95472 5b7510 53 API calls 95468->95472 95469->95465 95475 627138 95471->95475 95473 62701b 95472->95473 95476 5b6350 22 API calls 95473->95476 95474 627050 95477 627063 95474->95477 95480 5b4c6d 22 API calls 95474->95480 95478 5b7510 53 API calls 95475->95478 95476->95455 95479 5b7510 53 API calls 95477->95479 95486 627069 95477->95486 95481 627145 95478->95481 95482 6270a0 95479->95482 95480->95477 95976 5b525f 95481->95976 96145 61d076 57 API calls 95482->96145 95485 627166 96018 5b4c6d 95485->96018 95486->95457 95489 6271a9 95491 5ba8c7 22 API calls 95489->95491 95490 5b4c6d 22 API calls 95492 627186 95490->95492 95493 6271ba 95491->95493 95492->95489 95495 5b6b57 22 API calls 95492->95495 96021 5b6350 95493->96021 95497 62719b 95495->95497 95499 5b6b57 22 API calls 95497->95499 95498 5b6350 22 API calls 95500 6271d6 95498->95500 95499->95489 95501 5b6350 22 API calls 95500->95501 95502 6271e4 95501->95502 95503 5b7510 53 API calls 95502->95503 95504 6271f0 95503->95504 96030 61d7bc 95504->96030 95506 627201 95507 61d4ce 4 API calls 95506->95507 95508 62720b 95507->95508 95509 5b7510 53 API calls 95508->95509 95513 627239 95508->95513 95510 627229 95509->95510 96084 622947 95510->96084 95512 5b4f39 68 API calls 95512->95457 95513->95512 95515 5b7510 53 API calls 95514->95515 95516 63e51d 95515->95516 95517 5ba961 22 API calls 95516->95517 95518 63e52b 95517->95518 95519 5bb567 39 API calls 95518->95519 95520 63e536 95519->95520 95521 63e560 95520->95521 95524 5b7510 53 API calls 95520->95524 96559 5b62b5 22 API calls 95521->96559 95523 63e56c 95523->95270 95525 63e551 95524->95525 95526 5b6d25 22 API calls 95525->95526 95526->95521 95528 5b7510 53 API calls 95527->95528 95529 62f126 95528->95529 96560 5b9e90 95529->96560 95531 62f136 95532 5bec40 235 API calls 95531->95532 95533 62f15b 95531->95533 95532->95533 95535 62f15f 95533->95535 96588 5b9c6e 22 API calls 95533->96588 95535->95270 95536->95290 95537->95257 95538->95260 95539->95269 95540->95287 95541->95287 95542->95259 95543->95270 95544->95270 95545->95270 95546->95294 95547->95270 95548->95413 95549->95415 95550->95416 95551->95411 95553 5de684 ___BuildCatchObject 95552->95553 95554 5de6aa 95553->95554 95555 5de695 95553->95555 95564 5de6a5 __wsopen_s 95554->95564 95565 5d918d EnterCriticalSection 95554->95565 95582 5df2d9 20 API calls __dosmaperr 95555->95582 95557 5de69a 95583 5e27ec 26 API calls __cftof 95557->95583 95560 5de6c6 95566 5de602 95560->95566 95562 5de6d1 95584 5de6ee LeaveCriticalSection __fread_nolock 95562->95584 95564->95421 95565->95560 95567 5de60f 95566->95567 95568 5de624 95566->95568 95617 5df2d9 20 API calls __dosmaperr 95567->95617 95574 5de61f 95568->95574 95585 5ddc0b 95568->95585 95571 5de614 95618 5e27ec 26 API calls __cftof 95571->95618 95574->95562 95578 5de646 95602 5e862f 95578->95602 95582->95557 95583->95564 95584->95564 95586 5ddc23 95585->95586 95590 5ddc1f 95585->95590 95587 5dd955 __fread_nolock 26 API calls 95586->95587 95586->95590 95588 5ddc43 95587->95588 95625 5e59be 95588->95625 95591 5e4d7a 95590->95591 95592 5e4d90 95591->95592 95594 5de640 95591->95594 95593 5e29c8 _free 20 API calls 95592->95593 95592->95594 95593->95594 95595 5dd955 95594->95595 95596 5dd976 95595->95596 95597 5dd961 95595->95597 95596->95578 95757 5df2d9 20 API calls __dosmaperr 95597->95757 95599 5dd966 95758 5e27ec 26 API calls __cftof 95599->95758 95601 5dd971 95601->95578 95603 5e863e 95602->95603 95604 5e8653 95602->95604 95762 5df2c6 20 API calls __dosmaperr 95603->95762 95605 5e868e 95604->95605 95610 5e867a 95604->95610 95764 5df2c6 20 API calls __dosmaperr 95605->95764 95607 5e8643 95763 5df2d9 20 API calls __dosmaperr 95607->95763 95759 5e8607 95610->95759 95611 5e8693 95765 5df2d9 20 API calls __dosmaperr 95611->95765 95614 5de64c 95614->95574 95619 5e29c8 95614->95619 95615 5e869b 95766 5e27ec 26 API calls __cftof 95615->95766 95617->95571 95618->95574 95620 5e29d3 RtlFreeHeap 95619->95620 95621 5e29fc _free 95619->95621 95620->95621 95622 5e29e8 95620->95622 95621->95574 95816 5df2d9 20 API calls __dosmaperr 95622->95816 95624 5e29ee GetLastError 95624->95621 95626 5e59ca ___BuildCatchObject 95625->95626 95627 5e59ea 95626->95627 95628 5e59d2 95626->95628 95629 5e5a88 95627->95629 95634 5e5a1f 95627->95634 95704 5df2c6 20 API calls __dosmaperr 95628->95704 95709 5df2c6 20 API calls __dosmaperr 95629->95709 95632 5e59d7 95705 5df2d9 20 API calls __dosmaperr 95632->95705 95633 5e5a8d 95710 5df2d9 20 API calls __dosmaperr 95633->95710 95650 5e5147 EnterCriticalSection 95634->95650 95638 5e59df __wsopen_s 95638->95590 95639 5e5a95 95711 5e27ec 26 API calls __cftof 95639->95711 95640 5e5a25 95642 5e5a56 95640->95642 95643 5e5a41 95640->95643 95651 5e5aa9 95642->95651 95706 5df2d9 20 API calls __dosmaperr 95643->95706 95646 5e5a46 95707 5df2c6 20 API calls __dosmaperr 95646->95707 95648 5e5a51 95708 5e5a80 LeaveCriticalSection __wsopen_s 95648->95708 95650->95640 95652 5e5ad7 95651->95652 95692 5e5ad0 95651->95692 95653 5e5afa 95652->95653 95654 5e5adb 95652->95654 95657 5e5b4b 95653->95657 95658 5e5b2e 95653->95658 95719 5df2c6 20 API calls __dosmaperr 95654->95719 95662 5e5b61 95657->95662 95725 5e9424 28 API calls __wsopen_s 95657->95725 95722 5df2c6 20 API calls __dosmaperr 95658->95722 95659 5e5cb1 95659->95648 95660 5e5ae0 95720 5df2d9 20 API calls __dosmaperr 95660->95720 95712 5e564e 95662->95712 95665 5e5ae7 95721 5e27ec 26 API calls __cftof 95665->95721 95667 5e5b33 95723 5df2d9 20 API calls __dosmaperr 95667->95723 95671 5e5b6f 95674 5e5b95 95671->95674 95675 5e5b73 95671->95675 95672 5e5ba8 95677 5e5bbc 95672->95677 95678 5e5c02 WriteFile 95672->95678 95673 5e5b3b 95724 5e27ec 26 API calls __cftof 95673->95724 95727 5e542e 45 API calls 3 library calls 95674->95727 95681 5e5c69 95675->95681 95726 5e55e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 95675->95726 95679 5e5bc4 95677->95679 95680 5e5bf2 95677->95680 95683 5e5c25 GetLastError 95678->95683 95688 5e5b8b 95678->95688 95684 5e5bc9 95679->95684 95685 5e5be2 95679->95685 95730 5e56c4 7 API calls 2 library calls 95680->95730 95681->95692 95734 5df2d9 20 API calls __dosmaperr 95681->95734 95683->95688 95684->95681 95689 5e5bd2 95684->95689 95729 5e5891 8 API calls 2 library calls 95685->95729 95688->95681 95688->95692 95694 5e5c45 95688->95694 95728 5e57a3 7 API calls 2 library calls 95689->95728 95691 5e5be0 95691->95688 95736 5d0a8c 95692->95736 95698 5e5c4c 95694->95698 95699 5e5c60 95694->95699 95696 5e5c8e 95735 5df2c6 20 API calls __dosmaperr 95696->95735 95731 5df2d9 20 API calls __dosmaperr 95698->95731 95733 5df2a3 20 API calls 2 library calls 95699->95733 95702 5e5c51 95732 5df2c6 20 API calls __dosmaperr 95702->95732 95704->95632 95705->95638 95706->95646 95707->95648 95708->95638 95709->95633 95710->95639 95711->95638 95743 5ef89b 95712->95743 95714 5e565e 95715 5e5663 95714->95715 95752 5e2d74 38 API calls 3 library calls 95714->95752 95715->95671 95715->95672 95717 5e5686 95717->95715 95718 5e56a4 GetConsoleMode 95717->95718 95718->95715 95719->95660 95720->95665 95721->95692 95722->95667 95723->95673 95724->95692 95725->95662 95726->95688 95727->95688 95728->95691 95729->95691 95730->95691 95731->95702 95732->95692 95733->95692 95734->95696 95735->95692 95737 5d0a95 95736->95737 95738 5d0a97 IsProcessorFeaturePresent 95736->95738 95737->95659 95740 5d0c5d 95738->95740 95756 5d0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95740->95756 95742 5d0d40 95742->95659 95744 5ef8a8 95743->95744 95746 5ef8b5 95743->95746 95753 5df2d9 20 API calls __dosmaperr 95744->95753 95748 5ef8c1 95746->95748 95754 5df2d9 20 API calls __dosmaperr 95746->95754 95747 5ef8ad 95747->95714 95748->95714 95750 5ef8e2 95755 5e27ec 26 API calls __cftof 95750->95755 95752->95717 95753->95747 95754->95750 95755->95747 95756->95742 95757->95599 95758->95601 95767 5e8585 95759->95767 95761 5e862b 95761->95614 95762->95607 95763->95614 95764->95611 95765->95615 95766->95614 95768 5e8591 ___BuildCatchObject 95767->95768 95778 5e5147 EnterCriticalSection 95768->95778 95770 5e859f 95771 5e85c6 95770->95771 95772 5e85d1 95770->95772 95779 5e86ae 95771->95779 95794 5df2d9 20 API calls __dosmaperr 95772->95794 95775 5e85cc 95795 5e85fb LeaveCriticalSection __wsopen_s 95775->95795 95777 5e85ee __wsopen_s 95777->95761 95778->95770 95796 5e53c4 95779->95796 95781 5e86c4 95809 5e5333 21 API calls 3 library calls 95781->95809 95782 5e86be 95782->95781 95784 5e86f6 95782->95784 95787 5e53c4 __wsopen_s 26 API calls 95782->95787 95784->95781 95785 5e53c4 __wsopen_s 26 API calls 95784->95785 95789 5e8702 CloseHandle 95785->95789 95786 5e871c 95790 5e873e 95786->95790 95810 5df2a3 20 API calls 2 library calls 95786->95810 95788 5e86ed 95787->95788 95791 5e53c4 __wsopen_s 26 API calls 95788->95791 95789->95781 95792 5e870e GetLastError 95789->95792 95790->95775 95791->95784 95792->95781 95794->95775 95795->95777 95797 5e53e6 95796->95797 95798 5e53d1 95796->95798 95804 5e540b 95797->95804 95813 5df2c6 20 API calls __dosmaperr 95797->95813 95811 5df2c6 20 API calls __dosmaperr 95798->95811 95800 5e53d6 95812 5df2d9 20 API calls __dosmaperr 95800->95812 95802 5e5416 95814 5df2d9 20 API calls __dosmaperr 95802->95814 95804->95782 95806 5e53de 95806->95782 95807 5e541e 95815 5e27ec 26 API calls __cftof 95807->95815 95809->95786 95810->95790 95811->95800 95812->95806 95813->95802 95814->95807 95815->95806 95816->95624 95855 5b7510 95817->95855 95821 638281 95822 63844f 95821->95822 95826 63828f 95821->95826 95919 638ee4 60 API calls 95822->95919 95825 63845e 95825->95826 95827 63846a 95825->95827 95891 637e86 95826->95891 95842 637fd5 ISource 95827->95842 95828 5b7510 53 API calls 95846 638049 95828->95846 95833 6382c8 95906 5cfc70 95833->95906 95836 638302 95913 5b63eb 22 API calls 95836->95913 95837 6382e8 95912 62359c 82 API calls __wsopen_s 95837->95912 95840 638311 95914 5b6a50 22 API calls 95840->95914 95841 6382f3 GetCurrentProcess TerminateProcess 95841->95836 95842->95427 95844 63832a 95853 638352 95844->95853 95915 5c04f0 22 API calls 95844->95915 95846->95821 95846->95828 95846->95842 95910 61417d 22 API calls __fread_nolock 95846->95910 95911 63851d 42 API calls _strftime 95846->95911 95847 6384c5 95847->95842 95849 6384d9 FreeLibrary 95847->95849 95848 638341 95916 638b7b 75 API calls 95848->95916 95849->95842 95853->95847 95917 5c04f0 22 API calls 95853->95917 95918 5baceb 23 API calls ISource 95853->95918 95920 638b7b 75 API calls 95853->95920 95856 5b7525 95855->95856 95873 5b7522 95855->95873 95857 5b755b 95856->95857 95858 5b752d 95856->95858 95859 5f50f6 95857->95859 95861 5b756d 95857->95861 95869 5f500f 95857->95869 95921 5d51c6 26 API calls 95858->95921 95924 5d5183 26 API calls 95859->95924 95922 5cfb21 51 API calls 95861->95922 95862 5b753d 95867 5cfddb 22 API calls 95862->95867 95865 5f510e 95865->95865 95870 5b7547 95867->95870 95868 5f5088 95923 5cfb21 51 API calls 95868->95923 95869->95868 95872 5cfe0b 22 API calls 95869->95872 95871 5b9cb3 22 API calls 95870->95871 95871->95873 95874 5f5058 95872->95874 95873->95842 95878 638cd3 95873->95878 95875 5cfddb 22 API calls 95874->95875 95876 5f507f 95875->95876 95877 5b9cb3 22 API calls 95876->95877 95877->95868 95879 5baec9 22 API calls 95878->95879 95880 638cee CharLowerBuffW 95879->95880 95925 618e54 95880->95925 95884 5ba961 22 API calls 95885 638d2a 95884->95885 95932 5b6d25 95885->95932 95887 638d3e 95888 5b93b2 22 API calls 95887->95888 95890 638d48 _wcslen 95888->95890 95889 638e5e _wcslen 95889->95846 95890->95889 95945 63851d 42 API calls _strftime 95890->95945 95892 637ea1 95891->95892 95893 637eec 95891->95893 95894 5cfe0b 22 API calls 95892->95894 95897 639096 95893->95897 95895 637ec3 95894->95895 95895->95893 95896 5cfddb 22 API calls 95895->95896 95896->95895 95898 6392ab ISource 95897->95898 95905 6390ba _strcat _wcslen 95897->95905 95898->95833 95899 5bb38f 39 API calls 95899->95905 95900 5bb567 39 API calls 95900->95905 95901 5bb6b5 39 API calls 95901->95905 95902 5dea0c 21 API calls ___std_exception_copy 95902->95905 95903 5b7510 53 API calls 95903->95905 95905->95898 95905->95899 95905->95900 95905->95901 95905->95902 95905->95903 95948 61efae 24 API calls _wcslen 95905->95948 95907 5cfc85 95906->95907 95908 5cfd1d VirtualProtect 95907->95908 95909 5cfceb 95907->95909 95908->95909 95909->95836 95909->95837 95910->95846 95911->95846 95912->95841 95913->95840 95914->95844 95915->95848 95916->95853 95917->95853 95918->95853 95919->95825 95920->95853 95921->95862 95922->95862 95923->95859 95924->95865 95926 618e74 _wcslen 95925->95926 95927 618f63 95926->95927 95930 618ea9 95926->95930 95931 618f68 95926->95931 95927->95884 95927->95890 95930->95927 95946 5cce60 41 API calls 95930->95946 95931->95927 95947 5cce60 41 API calls 95931->95947 95933 5b6d91 95932->95933 95934 5b6d34 95932->95934 95935 5b93b2 22 API calls 95933->95935 95934->95933 95936 5b6d3f 95934->95936 95942 5b6d62 __fread_nolock 95935->95942 95937 5b6d5a 95936->95937 95938 5f4c9d 95936->95938 95940 5b6f34 22 API calls 95937->95940 95939 5cfddb 22 API calls 95938->95939 95941 5f4ca7 95939->95941 95940->95942 95943 5cfe0b 22 API calls 95941->95943 95942->95887 95944 5f4cda 95943->95944 95945->95889 95946->95930 95947->95931 95948->95905 95950 61d4d5 95949->95950 95951 61dbdc GetFileAttributesW 95949->95951 95950->95270 95951->95950 95952 61dbe8 FindFirstFileW 95951->95952 95952->95950 95953 61dbf9 FindClose 95952->95953 95953->95950 96146 5b4e90 LoadLibraryA 95954->96146 95959 5f3ccf 95962 5b4f39 68 API calls 95959->95962 95960 5b4ef6 LoadLibraryExW 96154 5b4e59 LoadLibraryA 95960->96154 95964 5f3cd6 95962->95964 95966 5b4e59 3 API calls 95964->95966 95968 5f3cde 95966->95968 95967 5b4f20 95967->95968 95969 5b4f2c 95967->95969 96176 5b50f5 95968->96176 95971 5b4f39 68 API calls 95969->95971 95973 5b4f31 95971->95973 95973->95449 95973->95452 95975 5f3d05 95977 5ba961 22 API calls 95976->95977 95978 5b5275 95977->95978 95979 5ba961 22 API calls 95978->95979 95980 5b527d 95979->95980 95981 5ba961 22 API calls 95980->95981 95982 5b5285 95981->95982 95983 5ba961 22 API calls 95982->95983 95984 5b528d 95983->95984 95985 5f3df5 95984->95985 95986 5b52c1 95984->95986 95987 5ba8c7 22 API calls 95985->95987 95988 5b6d25 22 API calls 95986->95988 95989 5f3dfe 95987->95989 95990 5b52cf 95988->95990 95991 5ba6c3 22 API calls 95989->95991 95992 5b93b2 22 API calls 95990->95992 95994 5b5304 95991->95994 95993 5b52d9 95992->95993 95993->95994 95995 5b6d25 22 API calls 95993->95995 95996 5b5325 95994->95996 96011 5b5349 95994->96011 96013 5f3e20 95994->96013 95998 5b52fa 95995->95998 96002 5b4c6d 22 API calls 95996->96002 95996->96011 95997 5b6d25 22 API calls 95999 5b535a 95997->95999 96000 5b93b2 22 API calls 95998->96000 96001 5b5370 95999->96001 96005 5ba8c7 22 API calls 95999->96005 96000->95994 96007 5ba8c7 22 API calls 96001->96007 96009 5b5384 96001->96009 96003 5b5332 96002->96003 96006 5b6d25 22 API calls 96003->96006 96003->96011 96004 5b6b57 22 API calls 96015 5f3ee0 96004->96015 96005->96001 96006->96011 96007->96009 96008 5b538f 96012 5ba8c7 22 API calls 96008->96012 96016 5b539a 96008->96016 96009->96008 96010 5ba8c7 22 API calls 96009->96010 96010->96008 96011->95997 96012->96016 96013->96004 96014 5b4c6d 22 API calls 96014->96015 96015->96011 96015->96014 96416 5b49bd 22 API calls __fread_nolock 96015->96416 96016->95485 96019 5baec9 22 API calls 96018->96019 96020 5b4c78 96019->96020 96020->95489 96020->95490 96022 5b6362 96021->96022 96023 5f4a51 96021->96023 96417 5b6373 96022->96417 96427 5b4a88 22 API calls __fread_nolock 96023->96427 96026 5b636e 96026->95498 96027 5f4a5b 96028 5f4a67 96027->96028 96029 5ba8c7 22 API calls 96027->96029 96029->96028 96031 61d7d8 96030->96031 96032 61d7f3 96031->96032 96033 61d7dd 96031->96033 96034 5ba961 22 API calls 96032->96034 96035 5ba8c7 22 API calls 96033->96035 96083 61d7ee 96033->96083 96036 61d7fb 96034->96036 96035->96083 96037 5ba961 22 API calls 96036->96037 96038 61d803 96037->96038 96039 5ba961 22 API calls 96038->96039 96040 61d80e 96039->96040 96041 5ba961 22 API calls 96040->96041 96042 61d816 96041->96042 96043 5ba961 22 API calls 96042->96043 96044 61d81e 96043->96044 96045 5ba961 22 API calls 96044->96045 96046 61d826 96045->96046 96047 5ba961 22 API calls 96046->96047 96048 61d82e 96047->96048 96049 5ba961 22 API calls 96048->96049 96050 61d836 96049->96050 96051 5b525f 22 API calls 96050->96051 96052 61d84d 96051->96052 96053 5b525f 22 API calls 96052->96053 96054 61d866 96053->96054 96055 5b4c6d 22 API calls 96054->96055 96057 61d872 96055->96057 96056 61d885 96059 5b4c6d 22 API calls 96056->96059 96057->96056 96058 5b93b2 22 API calls 96057->96058 96058->96056 96060 61d88e 96059->96060 96061 61d89e 96060->96061 96062 5b93b2 22 API calls 96060->96062 96063 61d8b0 96061->96063 96064 5ba8c7 22 API calls 96061->96064 96062->96061 96065 5b6350 22 API calls 96063->96065 96064->96063 96066 61d8bb 96065->96066 96428 61d978 22 API calls 96066->96428 96068 61d8ca 96429 61d978 22 API calls 96068->96429 96070 61d8dd 96071 5b4c6d 22 API calls 96070->96071 96072 61d8e7 96071->96072 96073 61d8ec 96072->96073 96074 61d8fe 96072->96074 96075 5b33c6 22 API calls 96073->96075 96076 5b4c6d 22 API calls 96074->96076 96077 61d8f9 96075->96077 96078 61d907 96076->96078 96081 5b6350 22 API calls 96077->96081 96079 61d925 96078->96079 96080 5b33c6 22 API calls 96078->96080 96082 5b6350 22 API calls 96079->96082 96080->96077 96081->96079 96082->96083 96083->95506 96085 622954 __wsopen_s 96084->96085 96086 5cfe0b 22 API calls 96085->96086 96087 622971 96086->96087 96088 5b5722 22 API calls 96087->96088 96089 62297b 96088->96089 96090 62274e 27 API calls 96089->96090 96091 622986 96090->96091 96092 5b511f 64 API calls 96091->96092 96093 62299b 96092->96093 96094 6229bf 96093->96094 96095 622a6c 96093->96095 96443 622e66 96094->96443 96097 622e66 75 API calls 96095->96097 96112 622a38 96097->96112 96100 5b50f5 40 API calls 96101 622a91 96100->96101 96103 5b50f5 40 API calls 96101->96103 96102 622a75 ISource 96102->95513 96105 622aa1 96103->96105 96104 6229ed 96450 5dd583 26 API calls 96104->96450 96106 5b50f5 40 API calls 96105->96106 96108 622abc 96106->96108 96109 5b50f5 40 API calls 96108->96109 96110 622acc 96109->96110 96111 5b50f5 40 API calls 96110->96111 96113 622ae7 96111->96113 96112->96100 96112->96102 96114 5b50f5 40 API calls 96113->96114 96115 622af7 96114->96115 96116 5b50f5 40 API calls 96115->96116 96117 622b07 96116->96117 96118 5b50f5 40 API calls 96117->96118 96119 622b17 96118->96119 96430 623017 GetTempPathW GetTempFileNameW 96119->96430 96121 622b22 96122 5de5eb 29 API calls 96121->96122 96133 622b33 96122->96133 96123 622bed 96124 5de678 67 API calls 96123->96124 96125 622bf8 96124->96125 96127 622c12 96125->96127 96128 622bfe DeleteFileW 96125->96128 96126 5b50f5 40 API calls 96126->96133 96129 622c91 CopyFileW 96127->96129 96135 622c18 96127->96135 96128->96102 96130 622ca7 DeleteFileW 96129->96130 96131 622cb9 DeleteFileW 96129->96131 96130->96102 96440 622fd8 CreateFileW 96131->96440 96133->96102 96133->96123 96133->96126 96431 5ddbb3 96133->96431 96451 6222ce 96135->96451 96138 622c80 DeleteFileW 96138->96102 96140 5bb578 96139->96140 96141 5bb57f 96139->96141 96140->96141 96558 5d62d1 39 API calls 96140->96558 96141->95439 96143 5bb5c2 96143->95439 96144->95474 96145->95486 96147 5b4ea8 GetProcAddress 96146->96147 96148 5b4ec6 96146->96148 96149 5b4eb8 96147->96149 96151 5de5eb 96148->96151 96149->96148 96150 5b4ebf FreeLibrary 96149->96150 96150->96148 96184 5de52a 96151->96184 96153 5b4eea 96153->95959 96153->95960 96155 5b4e6e GetProcAddress 96154->96155 96156 5b4e8d 96154->96156 96157 5b4e7e 96155->96157 96159 5b4f80 96156->96159 96157->96156 96158 5b4e86 FreeLibrary 96157->96158 96158->96156 96160 5cfe0b 22 API calls 96159->96160 96161 5b4f95 96160->96161 96162 5b5722 22 API calls 96161->96162 96163 5b4fa1 __fread_nolock 96162->96163 96164 5f3d1d 96163->96164 96165 5b50a5 96163->96165 96175 5b4fdc 96163->96175 96256 62304d 74 API calls 96164->96256 96245 5b42a2 CreateStreamOnHGlobal 96165->96245 96168 5f3d22 96170 5b511f 64 API calls 96168->96170 96169 5b50f5 40 API calls 96169->96175 96171 5f3d45 96170->96171 96172 5b50f5 40 API calls 96171->96172 96173 5b506e ISource 96172->96173 96173->95967 96175->96168 96175->96169 96175->96173 96251 5b511f 96175->96251 96177 5b5107 96176->96177 96180 5f3d70 96176->96180 96278 5de8c4 96177->96278 96181 6228fe 96399 62274e 96181->96399 96183 622919 96183->95975 96187 5de536 ___BuildCatchObject 96184->96187 96185 5de544 96209 5df2d9 20 API calls __dosmaperr 96185->96209 96187->96185 96189 5de574 96187->96189 96188 5de549 96210 5e27ec 26 API calls __cftof 96188->96210 96191 5de579 96189->96191 96192 5de586 96189->96192 96211 5df2d9 20 API calls __dosmaperr 96191->96211 96201 5e8061 96192->96201 96195 5de58f 96196 5de595 96195->96196 96197 5de5a2 96195->96197 96212 5df2d9 20 API calls __dosmaperr 96196->96212 96213 5de5d4 LeaveCriticalSection __fread_nolock 96197->96213 96198 5de554 __wsopen_s 96198->96153 96202 5e806d ___BuildCatchObject 96201->96202 96214 5e2f5e EnterCriticalSection 96202->96214 96204 5e807b 96215 5e80fb 96204->96215 96208 5e80ac __wsopen_s 96208->96195 96209->96188 96210->96198 96211->96198 96212->96198 96213->96198 96214->96204 96218 5e811e 96215->96218 96216 5e8177 96233 5e4c7d 96216->96233 96218->96216 96224 5e8088 96218->96224 96231 5d918d EnterCriticalSection 96218->96231 96232 5d91a1 LeaveCriticalSection 96218->96232 96221 5e29c8 _free 20 API calls 96222 5e8189 96221->96222 96222->96224 96240 5e3405 11 API calls 2 library calls 96222->96240 96228 5e80b7 96224->96228 96226 5e81a8 96241 5d918d EnterCriticalSection 96226->96241 96244 5e2fa6 LeaveCriticalSection 96228->96244 96230 5e80be 96230->96208 96231->96218 96232->96218 96238 5e4c8a __dosmaperr 96233->96238 96234 5e4cca 96243 5df2d9 20 API calls __dosmaperr 96234->96243 96235 5e4cb5 RtlAllocateHeap 96236 5e4cc8 96235->96236 96235->96238 96236->96221 96238->96234 96238->96235 96242 5d4ead 7 API calls 2 library calls 96238->96242 96240->96226 96241->96224 96242->96238 96243->96236 96244->96230 96246 5b42d9 96245->96246 96247 5b42bc FindResourceExW 96245->96247 96246->96175 96247->96246 96248 5f35ba LoadResource 96247->96248 96248->96246 96249 5f35cf SizeofResource 96248->96249 96249->96246 96250 5f35e3 LockResource 96249->96250 96250->96246 96252 5b512e 96251->96252 96253 5f3d90 96251->96253 96257 5dece3 96252->96257 96256->96168 96260 5deaaa 96257->96260 96259 5b513c 96259->96175 96262 5deab6 ___BuildCatchObject 96260->96262 96261 5deac2 96273 5df2d9 20 API calls __dosmaperr 96261->96273 96262->96261 96263 5deae8 96262->96263 96275 5d918d EnterCriticalSection 96263->96275 96266 5deac7 96274 5e27ec 26 API calls __cftof 96266->96274 96267 5deaf4 96276 5dec0a 62 API calls 2 library calls 96267->96276 96270 5deb08 96277 5deb27 LeaveCriticalSection __fread_nolock 96270->96277 96272 5dead2 __wsopen_s 96272->96259 96273->96266 96274->96272 96275->96267 96276->96270 96277->96272 96281 5de8e1 96278->96281 96280 5b5118 96280->96181 96282 5de8ed ___BuildCatchObject 96281->96282 96283 5de92d 96282->96283 96284 5de900 ___scrt_fastfail 96282->96284 96286 5de925 __wsopen_s 96282->96286 96294 5d918d EnterCriticalSection 96283->96294 96308 5df2d9 20 API calls __dosmaperr 96284->96308 96286->96280 96287 5de937 96295 5de6f8 96287->96295 96290 5de91a 96309 5e27ec 26 API calls __cftof 96290->96309 96294->96287 96299 5de70a ___scrt_fastfail 96295->96299 96301 5de727 96295->96301 96296 5de717 96376 5df2d9 20 API calls __dosmaperr 96296->96376 96298 5de71c 96377 5e27ec 26 API calls __cftof 96298->96377 96299->96296 96299->96301 96306 5de76a __fread_nolock 96299->96306 96310 5de96c LeaveCriticalSection __fread_nolock 96301->96310 96302 5de886 ___scrt_fastfail 96379 5df2d9 20 API calls __dosmaperr 96302->96379 96304 5dd955 __fread_nolock 26 API calls 96304->96306 96306->96301 96306->96302 96306->96304 96311 5e8d45 96306->96311 96378 5dcf78 26 API calls 4 library calls 96306->96378 96308->96290 96309->96286 96310->96286 96312 5e8d6f 96311->96312 96313 5e8d57 96311->96313 96315 5e90d9 96312->96315 96318 5e8db4 96312->96318 96380 5df2c6 20 API calls __dosmaperr 96313->96380 96396 5df2c6 20 API calls __dosmaperr 96315->96396 96316 5e8d5c 96381 5df2d9 20 API calls __dosmaperr 96316->96381 96321 5e8dbf 96318->96321 96324 5e8d64 96318->96324 96329 5e8def 96318->96329 96320 5e90de 96397 5df2d9 20 API calls __dosmaperr 96320->96397 96382 5df2c6 20 API calls __dosmaperr 96321->96382 96324->96306 96325 5e8dcc 96398 5e27ec 26 API calls __cftof 96325->96398 96326 5e8dc4 96383 5df2d9 20 API calls __dosmaperr 96326->96383 96330 5e8e08 96329->96330 96331 5e8e2e 96329->96331 96332 5e8e4a 96329->96332 96330->96331 96338 5e8e15 96330->96338 96384 5df2c6 20 API calls __dosmaperr 96331->96384 96387 5e3820 21 API calls 2 library calls 96332->96387 96334 5e8e33 96385 5df2d9 20 API calls __dosmaperr 96334->96385 96337 5ef89b __fread_nolock 26 API calls 96341 5e8fb3 96337->96341 96338->96337 96339 5e8e61 96342 5e29c8 _free 20 API calls 96339->96342 96340 5e8e3a 96386 5e27ec 26 API calls __cftof 96340->96386 96344 5e9029 96341->96344 96347 5e8fcc GetConsoleMode 96341->96347 96345 5e8e6a 96342->96345 96346 5e902d ReadFile 96344->96346 96348 5e29c8 _free 20 API calls 96345->96348 96349 5e9047 96346->96349 96350 5e90a1 GetLastError 96346->96350 96347->96344 96351 5e8fdd 96347->96351 96352 5e8e71 96348->96352 96349->96350 96355 5e901e 96349->96355 96353 5e90ae 96350->96353 96354 5e9005 96350->96354 96351->96346 96356 5e8fe3 ReadConsoleW 96351->96356 96357 5e8e7b 96352->96357 96358 5e8e96 96352->96358 96394 5df2d9 20 API calls __dosmaperr 96353->96394 96374 5e8e45 __fread_nolock 96354->96374 96391 5df2a3 20 API calls 2 library calls 96354->96391 96369 5e906c 96355->96369 96370 5e9083 96355->96370 96355->96374 96356->96355 96362 5e8fff GetLastError 96356->96362 96388 5df2d9 20 API calls __dosmaperr 96357->96388 96390 5e9424 28 API calls __wsopen_s 96358->96390 96362->96354 96363 5e29c8 _free 20 API calls 96363->96324 96364 5e8e80 96389 5df2c6 20 API calls __dosmaperr 96364->96389 96365 5e90b3 96395 5df2c6 20 API calls __dosmaperr 96365->96395 96392 5e8a61 31 API calls 4 library calls 96369->96392 96372 5e909a 96370->96372 96370->96374 96393 5e88a1 29 API calls __wsopen_s 96372->96393 96374->96363 96375 5e909f 96375->96374 96376->96298 96377->96301 96378->96306 96379->96298 96380->96316 96381->96324 96382->96326 96383->96325 96384->96334 96385->96340 96386->96374 96387->96339 96388->96364 96389->96374 96390->96338 96391->96374 96392->96374 96393->96375 96394->96365 96395->96374 96396->96320 96397->96325 96398->96324 96402 5de4e8 96399->96402 96401 62275d 96401->96183 96405 5de469 96402->96405 96404 5de505 96404->96401 96406 5de48c 96405->96406 96407 5de478 96405->96407 96412 5de488 __alldvrm 96406->96412 96415 5e333f 11 API calls 2 library calls 96406->96415 96413 5df2d9 20 API calls __dosmaperr 96407->96413 96409 5de47d 96414 5e27ec 26 API calls __cftof 96409->96414 96412->96404 96413->96409 96414->96412 96415->96412 96416->96015 96418 5b6382 96417->96418 96423 5b63b6 __fread_nolock 96417->96423 96419 5f4a82 96418->96419 96420 5b63a9 96418->96420 96418->96423 96422 5cfddb 22 API calls 96419->96422 96421 5ba587 22 API calls 96420->96421 96421->96423 96424 5f4a91 96422->96424 96423->96026 96425 5cfe0b 22 API calls 96424->96425 96426 5f4ac5 __fread_nolock 96425->96426 96427->96027 96428->96068 96429->96070 96430->96121 96432 5ddbdd 96431->96432 96433 5ddbc1 96431->96433 96432->96133 96433->96432 96434 5ddbcd 96433->96434 96435 5ddbe3 96433->96435 96483 5df2d9 20 API calls __dosmaperr 96434->96483 96480 5dd9cc 96435->96480 96438 5ddbd2 96484 5e27ec 26 API calls __cftof 96438->96484 96441 623013 96440->96441 96442 622fff SetFileTime CloseHandle 96440->96442 96441->96102 96442->96441 96448 622e7a 96443->96448 96444 5b50f5 40 API calls 96444->96448 96445 6229c4 96445->96102 96449 5dd583 26 API calls 96445->96449 96446 6228fe 27 API calls 96446->96448 96447 5b511f 64 API calls 96447->96448 96448->96444 96448->96445 96448->96446 96448->96447 96449->96104 96450->96112 96452 6222e7 96451->96452 96453 6222d9 96451->96453 96455 62232c 96452->96455 96456 5de5eb 29 API calls 96452->96456 96473 6222f0 96452->96473 96454 5de5eb 29 API calls 96453->96454 96454->96452 96526 622557 96455->96526 96457 622311 96456->96457 96457->96455 96460 62231a 96457->96460 96459 622370 96461 622374 96459->96461 96462 622395 96459->96462 96464 5de678 67 API calls 96460->96464 96460->96473 96463 622381 96461->96463 96466 5de678 67 API calls 96461->96466 96530 622171 96462->96530 96468 5de678 67 API calls 96463->96468 96463->96473 96464->96473 96466->96463 96467 62239d 96469 6223c3 96467->96469 96470 6223a3 96467->96470 96468->96473 96537 6223f3 96469->96537 96472 6223b0 96470->96472 96474 5de678 67 API calls 96470->96474 96472->96473 96475 5de678 67 API calls 96472->96475 96473->96131 96473->96138 96474->96472 96475->96473 96476 6223ca 96477 6223de 96476->96477 96478 5de678 67 API calls 96476->96478 96477->96473 96479 5de678 67 API calls 96477->96479 96478->96477 96479->96473 96485 5dd97b 96480->96485 96482 5dd9f0 96482->96432 96483->96438 96484->96432 96486 5dd987 ___BuildCatchObject 96485->96486 96493 5d918d EnterCriticalSection 96486->96493 96488 5dd995 96494 5dd9f4 96488->96494 96492 5dd9b3 __wsopen_s 96492->96482 96493->96488 96502 5e49a1 96494->96502 96500 5dd9a2 96501 5dd9c0 LeaveCriticalSection __fread_nolock 96500->96501 96501->96492 96503 5dd955 __fread_nolock 26 API calls 96502->96503 96504 5e49b0 96503->96504 96505 5ef89b __fread_nolock 26 API calls 96504->96505 96506 5e49b6 96505->96506 96510 5dda09 96506->96510 96523 5e3820 21 API calls 2 library calls 96506->96523 96508 5e4a15 96509 5e29c8 _free 20 API calls 96508->96509 96509->96510 96511 5dda3a 96510->96511 96514 5dda4c 96511->96514 96517 5dda24 96511->96517 96512 5dda5a 96524 5df2d9 20 API calls __dosmaperr 96512->96524 96514->96512 96514->96517 96521 5dda85 __fread_nolock 96514->96521 96515 5dda5f 96525 5e27ec 26 API calls __cftof 96515->96525 96522 5e4a56 62 API calls 96517->96522 96518 5ddc0b 62 API calls 96518->96521 96519 5dd955 __fread_nolock 26 API calls 96519->96521 96520 5e59be __wsopen_s 62 API calls 96520->96521 96521->96517 96521->96518 96521->96519 96521->96520 96522->96500 96523->96508 96524->96515 96525->96517 96527 62257c 96526->96527 96529 622565 __fread_nolock 96526->96529 96528 5de8c4 __fread_nolock 40 API calls 96527->96528 96528->96529 96529->96459 96531 5dea0c ___std_exception_copy 21 API calls 96530->96531 96532 62217f 96531->96532 96533 5dea0c ___std_exception_copy 21 API calls 96532->96533 96534 622190 96533->96534 96535 5dea0c ___std_exception_copy 21 API calls 96534->96535 96536 62219c 96535->96536 96536->96467 96541 622408 96537->96541 96538 6224c0 96549 622724 96538->96549 96540 6221cc 40 API calls 96540->96541 96541->96538 96541->96540 96544 6224c7 96541->96544 96545 622606 96541->96545 96553 622269 40 API calls 96541->96553 96544->96476 96546 622617 96545->96546 96547 62261d 96545->96547 96546->96547 96554 6226d7 96546->96554 96547->96541 96550 622731 96549->96550 96551 622742 96549->96551 96552 5ddbb3 65 API calls 96550->96552 96551->96544 96552->96551 96553->96541 96555 622703 96554->96555 96556 622714 96554->96556 96557 5ddbb3 65 API calls 96555->96557 96556->96546 96557->96556 96558->96143 96559->95523 96589 5b6270 96560->96589 96562 5b9fd2 96595 5ba4a1 96562->96595 96564 5b9fec 96564->95531 96567 5ba6c3 22 API calls 96587 5b9eb5 96567->96587 96568 5ff7c4 96607 6196e2 84 API calls __wsopen_s 96568->96607 96569 5ff699 96574 5cfddb 22 API calls 96569->96574 96570 5ba405 96570->96564 96608 6196e2 84 API calls __wsopen_s 96570->96608 96577 5ff754 96574->96577 96575 5ff7d2 96576 5ba4a1 22 API calls 96575->96576 96578 5ff7e8 96576->96578 96579 5cfe0b 22 API calls 96577->96579 96578->96564 96581 5ba12c __fread_nolock 96579->96581 96581->96568 96581->96570 96582 5ba587 22 API calls 96582->96587 96583 5ba4a1 22 API calls 96583->96587 96584 5baec9 22 API calls 96585 5ba0db CharUpperBuffW 96584->96585 96603 5ba673 22 API calls 96585->96603 96587->96562 96587->96567 96587->96568 96587->96569 96587->96570 96587->96581 96587->96582 96587->96583 96587->96584 96594 5b4573 41 API calls _wcslen 96587->96594 96604 5b48c8 23 API calls 96587->96604 96605 5b49bd 22 API calls __fread_nolock 96587->96605 96606 5ba673 22 API calls 96587->96606 96588->95535 96590 5cfe0b 22 API calls 96589->96590 96591 5b6295 96590->96591 96592 5cfddb 22 API calls 96591->96592 96593 5b62a3 96592->96593 96593->96587 96594->96587 96596 5ba52b 96595->96596 96602 5ba4b1 __fread_nolock 96595->96602 96598 5cfe0b 22 API calls 96596->96598 96597 5cfddb 22 API calls 96599 5ba4b8 96597->96599 96598->96602 96600 5ba4d6 96599->96600 96601 5cfddb 22 API calls 96599->96601 96600->96564 96601->96600 96602->96597 96603->96587 96604->96587 96605->96587 96606->96587 96607->96575 96608->96564 96610 5bae01 96609->96610 96613 5bae1c ISource 96609->96613 96611 5baec9 22 API calls 96610->96611 96612 5bae09 CharUpperBuffW 96611->96612 96612->96613 96613->95308 96615 5bacae 96614->96615 96617 5bacd1 96615->96617 96644 62359c 82 API calls __wsopen_s 96615->96644 96617->95362 96619 5ffadb 96618->96619 96620 5bad92 96618->96620 96621 5cfddb 22 API calls 96620->96621 96622 5bad99 96621->96622 96645 5badcd 96622->96645 96625->95358 96626->95361 96627->95361 96628->95313 96629->95349 96630->95326 96631->95349 96632->95349 96633->95362 96634->95362 96635->95362 96636->95362 96637->95362 96638->95362 96639->95339 96640->95349 96641->95346 96642->95354 96643->95349 96644->96617 96648 5baddd 96645->96648 96646 5badb6 96646->95362 96647 5cfddb 22 API calls 96647->96648 96648->96646 96648->96647 96649 5ba961 22 API calls 96648->96649 96650 5ba8c7 22 API calls 96648->96650 96651 5badcd 22 API calls 96648->96651 96649->96648 96650->96648 96651->96648 96652->95369 96653->95369 96654->95372 96655->95372 96656->95371 96657->95372 96658 603a41 96662 6210c0 96658->96662 96660 603a4c 96661 6210c0 53 API calls 96660->96661 96661->96660 96668 6210fa 96662->96668 96669 6210cd 96662->96669 96663 6210fc 96674 5cfa11 53 API calls 96663->96674 96665 621101 96666 5b7510 53 API calls 96665->96666 96667 621108 96666->96667 96670 5b6350 22 API calls 96667->96670 96668->96660 96669->96663 96669->96665 96669->96668 96671 6210f4 96669->96671 96670->96668 96673 5bb270 39 API calls 96671->96673 96673->96668 96674->96665 96675 5b1098 96680 5b42de 96675->96680 96679 5b10a7 96681 5ba961 22 API calls 96680->96681 96682 5b42f5 GetVersionExW 96681->96682 96683 5b6b57 22 API calls 96682->96683 96684 5b4342 96683->96684 96685 5b93b2 22 API calls 96684->96685 96695 5b4378 96684->96695 96686 5b436c 96685->96686 96688 5b37a0 22 API calls 96686->96688 96687 5b441b GetCurrentProcess IsWow64Process 96689 5b4437 96687->96689 96688->96695 96690 5b444f LoadLibraryA 96689->96690 96691 5f3824 GetSystemInfo 96689->96691 96692 5b449c GetSystemInfo 96690->96692 96693 5b4460 GetProcAddress 96690->96693 96694 5b4476 96692->96694 96693->96692 96697 5b4470 GetNativeSystemInfo 96693->96697 96698 5b447a FreeLibrary 96694->96698 96699 5b109d 96694->96699 96695->96687 96696 5f37df 96695->96696 96697->96694 96698->96699 96700 5d00a3 29 API calls __onexit 96699->96700 96700->96679 96701 5e90fa 96702 5e9107 96701->96702 96706 5e911f 96701->96706 96751 5df2d9 20 API calls __dosmaperr 96702->96751 96704 5e910c 96752 5e27ec 26 API calls __cftof 96704->96752 96707 5e917a 96706->96707 96715 5e9117 96706->96715 96753 5efdc4 21 API calls 2 library calls 96706->96753 96709 5dd955 __fread_nolock 26 API calls 96707->96709 96710 5e9192 96709->96710 96721 5e8c32 96710->96721 96712 5e9199 96713 5dd955 __fread_nolock 26 API calls 96712->96713 96712->96715 96714 5e91c5 96713->96714 96714->96715 96716 5dd955 __fread_nolock 26 API calls 96714->96716 96717 5e91d3 96716->96717 96717->96715 96718 5dd955 __fread_nolock 26 API calls 96717->96718 96719 5e91e3 96718->96719 96720 5dd955 __fread_nolock 26 API calls 96719->96720 96720->96715 96722 5e8c3e ___BuildCatchObject 96721->96722 96723 5e8c5e 96722->96723 96724 5e8c46 96722->96724 96726 5e8d24 96723->96726 96731 5e8c97 96723->96731 96755 5df2c6 20 API calls __dosmaperr 96724->96755 96762 5df2c6 20 API calls __dosmaperr 96726->96762 96728 5e8c4b 96756 5df2d9 20 API calls __dosmaperr 96728->96756 96729 5e8d29 96763 5df2d9 20 API calls __dosmaperr 96729->96763 96733 5e8cbb 96731->96733 96734 5e8ca6 96731->96734 96754 5e5147 EnterCriticalSection 96733->96754 96757 5df2c6 20 API calls __dosmaperr 96734->96757 96736 5e8cb3 96764 5e27ec 26 API calls __cftof 96736->96764 96738 5e8cc1 96740 5e8cdd 96738->96740 96741 5e8cf2 96738->96741 96739 5e8cab 96758 5df2d9 20 API calls __dosmaperr 96739->96758 96759 5df2d9 20 API calls __dosmaperr 96740->96759 96746 5e8d45 __fread_nolock 38 API calls 96741->96746 96743 5e8c53 __wsopen_s 96743->96712 96748 5e8ced 96746->96748 96747 5e8ce2 96760 5df2c6 20 API calls __dosmaperr 96747->96760 96761 5e8d1c LeaveCriticalSection __wsopen_s 96748->96761 96751->96704 96752->96715 96753->96707 96754->96738 96755->96728 96756->96743 96757->96739 96758->96736 96759->96747 96760->96748 96761->96743 96762->96729 96763->96736 96764->96743 96765 5bf7bf 96766 5bf7d3 96765->96766 96767 5bfcb6 96765->96767 96769 5bfcc2 96766->96769 96770 5cfddb 22 API calls 96766->96770 96802 5baceb 23 API calls ISource 96767->96802 96803 5baceb 23 API calls ISource 96769->96803 96772 5bf7e5 96770->96772 96772->96769 96773 5bf83e 96772->96773 96774 5bfd3d 96772->96774 96776 5c1310 235 API calls 96773->96776 96799 5bed9d ISource 96773->96799 96804 621155 22 API calls 96774->96804 96797 5bec76 ISource 96776->96797 96777 5cfddb 22 API calls 96777->96797 96779 5bfef7 96784 5ba8c7 22 API calls 96779->96784 96779->96799 96781 604600 96786 5ba8c7 22 API calls 96781->96786 96781->96799 96782 604b0b 96806 62359c 82 API calls __wsopen_s 96782->96806 96784->96799 96786->96799 96788 5ba8c7 22 API calls 96788->96797 96789 5d0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96789->96797 96790 5bfbe3 96792 604bdc 96790->96792 96798 5bf3ae ISource 96790->96798 96790->96799 96791 5ba961 22 API calls 96791->96797 96807 62359c 82 API calls __wsopen_s 96792->96807 96794 604beb 96808 62359c 82 API calls __wsopen_s 96794->96808 96795 5d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96795->96797 96796 5d00a3 29 API calls pre_c_initialization 96796->96797 96797->96777 96797->96779 96797->96781 96797->96782 96797->96788 96797->96789 96797->96790 96797->96791 96797->96794 96797->96795 96797->96796 96797->96798 96797->96799 96800 5c01e0 235 API calls 2 library calls 96797->96800 96801 5c06a0 41 API calls ISource 96797->96801 96798->96799 96805 62359c 82 API calls __wsopen_s 96798->96805 96800->96797 96801->96797 96802->96769 96803->96774 96804->96799 96805->96799 96806->96799 96807->96794 96808->96799 96809 5d03fb 96810 5d0407 ___BuildCatchObject 96809->96810 96838 5cfeb1 96810->96838 96812 5d040e 96813 5d0561 96812->96813 96816 5d0438 96812->96816 96865 5d083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96813->96865 96815 5d0568 96866 5d4e52 28 API calls _abort 96815->96866 96827 5d0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96816->96827 96849 5e247d 96816->96849 96818 5d056e 96867 5d4e04 28 API calls _abort 96818->96867 96822 5d0576 96823 5d0457 96825 5d04d8 96857 5d0959 96825->96857 96827->96825 96861 5d4e1a 38 API calls 3 library calls 96827->96861 96829 5d04de 96830 5d04f3 96829->96830 96862 5d0992 GetModuleHandleW 96830->96862 96832 5d04fa 96832->96815 96833 5d04fe 96832->96833 96834 5d0507 96833->96834 96863 5d4df5 28 API calls _abort 96833->96863 96864 5d0040 13 API calls 2 library calls 96834->96864 96837 5d050f 96837->96823 96839 5cfeba 96838->96839 96868 5d0698 IsProcessorFeaturePresent 96839->96868 96841 5cfec6 96869 5d2c94 10 API calls 3 library calls 96841->96869 96843 5cfecb 96848 5cfecf 96843->96848 96870 5e2317 96843->96870 96846 5cfee6 96846->96812 96848->96812 96852 5e2494 96849->96852 96850 5d0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96851 5d0451 96850->96851 96851->96823 96853 5e2421 96851->96853 96852->96850 96854 5e2450 96853->96854 96855 5d0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96854->96855 96856 5e2479 96855->96856 96856->96827 96921 5d2340 96857->96921 96860 5d097f 96860->96829 96861->96825 96862->96832 96863->96834 96864->96837 96865->96815 96866->96818 96867->96822 96868->96841 96869->96843 96874 5ed1f6 96870->96874 96873 5d2cbd 8 API calls 3 library calls 96873->96848 96875 5ed20f 96874->96875 96876 5ed213 96874->96876 96877 5d0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96875->96877 96876->96875 96880 5e4bfb 96876->96880 96878 5cfed8 96877->96878 96878->96846 96878->96873 96881 5e4c07 ___BuildCatchObject 96880->96881 96892 5e2f5e EnterCriticalSection 96881->96892 96883 5e4c0e 96893 5e50af 96883->96893 96885 5e4c1d 96891 5e4c2c 96885->96891 96906 5e4a8f 29 API calls 96885->96906 96888 5e4c27 96907 5e4b45 GetStdHandle GetFileType 96888->96907 96890 5e4c3d __wsopen_s 96890->96876 96908 5e4c48 LeaveCriticalSection _abort 96891->96908 96892->96883 96894 5e50bb ___BuildCatchObject 96893->96894 96895 5e50df 96894->96895 96896 5e50c8 96894->96896 96909 5e2f5e EnterCriticalSection 96895->96909 96917 5df2d9 20 API calls __dosmaperr 96896->96917 96899 5e50cd 96918 5e27ec 26 API calls __cftof 96899->96918 96902 5e50eb 96905 5e5117 96902->96905 96910 5e5000 96902->96910 96903 5e50d7 __wsopen_s 96903->96885 96919 5e513e LeaveCriticalSection _abort 96905->96919 96906->96888 96907->96891 96908->96890 96909->96902 96911 5e4c7d __dosmaperr 20 API calls 96910->96911 96913 5e5012 96911->96913 96912 5e501f 96914 5e29c8 _free 20 API calls 96912->96914 96913->96912 96920 5e3405 11 API calls 2 library calls 96913->96920 96916 5e5071 96914->96916 96916->96902 96917->96899 96918->96903 96919->96903 96920->96913 96922 5d096c GetStartupInfoW 96921->96922 96922->96860 96923 5b1033 96928 5b4c91 96923->96928 96927 5b1042 96929 5ba961 22 API calls 96928->96929 96930 5b4cff 96929->96930 96936 5b3af0 96930->96936 96932 5b4d9c 96934 5b1038 96932->96934 96939 5b51f7 22 API calls __fread_nolock 96932->96939 96935 5d00a3 29 API calls __onexit 96934->96935 96935->96927 96940 5b3b1c 96936->96940 96939->96932 96941 5b3b0f 96940->96941 96942 5b3b29 96940->96942 96941->96932 96942->96941 96943 5b3b30 RegOpenKeyExW 96942->96943 96943->96941 96944 5b3b4a RegQueryValueExW 96943->96944 96945 5b3b6b 96944->96945 96946 5b3b80 RegCloseKey 96944->96946 96945->96946 96946->96941 96947 5b2e37 96948 5ba961 22 API calls 96947->96948 96949 5b2e4d 96948->96949 97026 5b4ae3 96949->97026 96951 5b2e6b 96952 5b3a5a 24 API calls 96951->96952 96953 5b2e7f 96952->96953 96954 5b9cb3 22 API calls 96953->96954 96955 5b2e8c 96954->96955 96956 5b4ecb 94 API calls 96955->96956 96957 5b2ea5 96956->96957 96958 5b2ead 96957->96958 96959 5f2cb0 96957->96959 96962 5ba8c7 22 API calls 96958->96962 97056 622cf9 96959->97056 96961 5f2cc3 96963 5f2ccf 96961->96963 96964 5b4f39 68 API calls 96961->96964 96965 5b2ec3 96962->96965 96967 5b4f39 68 API calls 96963->96967 96964->96963 97040 5b6f88 22 API calls 96965->97040 96969 5f2ce5 96967->96969 96968 5b2ecf 96970 5b9cb3 22 API calls 96968->96970 97082 5b3084 22 API calls 96969->97082 96971 5b2edc 96970->96971 97041 5ba81b 41 API calls 96971->97041 96974 5b2eec 96976 5b9cb3 22 API calls 96974->96976 96975 5f2d02 97083 5b3084 22 API calls 96975->97083 96977 5b2f12 96976->96977 97042 5ba81b 41 API calls 96977->97042 96980 5f2d1e 96981 5b3a5a 24 API calls 96980->96981 96982 5f2d44 96981->96982 97084 5b3084 22 API calls 96982->97084 96983 5b2f21 96986 5ba961 22 API calls 96983->96986 96985 5f2d50 96987 5ba8c7 22 API calls 96985->96987 96988 5b2f3f 96986->96988 96989 5f2d5e 96987->96989 97043 5b3084 22 API calls 96988->97043 97085 5b3084 22 API calls 96989->97085 96992 5b2f4b 97044 5d4a28 40 API calls 3 library calls 96992->97044 96993 5f2d6d 96998 5ba8c7 22 API calls 96993->96998 96995 5b2f59 96995->96969 96996 5b2f63 96995->96996 97045 5d4a28 40 API calls 3 library calls 96996->97045 97000 5f2d83 96998->97000 96999 5b2f6e 96999->96975 97001 5b2f78 96999->97001 97086 5b3084 22 API calls 97000->97086 97046 5d4a28 40 API calls 3 library calls 97001->97046 97004 5f2d90 97005 5b2f83 97005->96980 97006 5b2f8d 97005->97006 97047 5d4a28 40 API calls 3 library calls 97006->97047 97008 5b2fdc 97008->96993 97010 5b2fe8 97008->97010 97009 5b2f98 97009->97008 97048 5b3084 22 API calls 97009->97048 97010->97004 97050 5b63eb 22 API calls 97010->97050 97013 5b2fbf 97015 5ba8c7 22 API calls 97013->97015 97014 5b2ff8 97051 5b6a50 22 API calls 97014->97051 97017 5b2fcd 97015->97017 97049 5b3084 22 API calls 97017->97049 97019 5b3006 97052 5b70b0 23 API calls 97019->97052 97023 5b3021 97024 5b3065 97023->97024 97053 5b6f88 22 API calls 97023->97053 97054 5b70b0 23 API calls 97023->97054 97055 5b3084 22 API calls 97023->97055 97027 5b4af0 __wsopen_s 97026->97027 97028 5b6b57 22 API calls 97027->97028 97029 5b4b22 97027->97029 97028->97029 97030 5b4c6d 22 API calls 97029->97030 97035 5b4b58 97029->97035 97030->97029 97031 5b4c6d 22 API calls 97031->97035 97032 5b4c29 97033 5b4c5e 97032->97033 97034 5b9cb3 22 API calls 97032->97034 97033->96951 97037 5b4c52 97034->97037 97035->97031 97035->97032 97036 5b9cb3 22 API calls 97035->97036 97039 5b515f 22 API calls 97035->97039 97036->97035 97038 5b515f 22 API calls 97037->97038 97038->97033 97039->97035 97040->96968 97041->96974 97042->96983 97043->96992 97044->96995 97045->96999 97046->97005 97047->97009 97048->97013 97049->97008 97050->97014 97051->97019 97052->97023 97053->97023 97054->97023 97055->97023 97057 622d15 97056->97057 97058 5b511f 64 API calls 97057->97058 97059 622d29 97058->97059 97060 622e66 75 API calls 97059->97060 97061 622d3b 97060->97061 97062 622d3f 97061->97062 97063 5b50f5 40 API calls 97061->97063 97062->96961 97064 622d56 97063->97064 97065 5b50f5 40 API calls 97064->97065 97066 622d66 97065->97066 97067 5b50f5 40 API calls 97066->97067 97068 622d81 97067->97068 97069 5b50f5 40 API calls 97068->97069 97070 622d9c 97069->97070 97071 5b511f 64 API calls 97070->97071 97072 622db3 97071->97072 97073 5dea0c ___std_exception_copy 21 API calls 97072->97073 97074 622dba 97073->97074 97075 5dea0c ___std_exception_copy 21 API calls 97074->97075 97076 622dc4 97075->97076 97077 5b50f5 40 API calls 97076->97077 97078 622dd8 97077->97078 97079 6228fe 27 API calls 97078->97079 97080 622dee 97079->97080 97080->97062 97081 6222ce 79 API calls 97080->97081 97081->97062 97082->96975 97083->96980 97084->96985 97085->96993 97086->97004 97087 5b3156 97090 5b3170 97087->97090 97091 5b3187 97090->97091 97092 5b31eb 97091->97092 97093 5b318c 97091->97093 97131 5b31e9 97091->97131 97094 5f2dfb 97092->97094 97095 5b31f1 97092->97095 97096 5b3199 97093->97096 97097 5b3265 PostQuitMessage 97093->97097 97139 5b18e2 10 API calls 97094->97139 97099 5b31f8 97095->97099 97100 5b321d SetTimer RegisterWindowMessageW 97095->97100 97102 5f2e7c 97096->97102 97103 5b31a4 97096->97103 97104 5b316a 97097->97104 97098 5b31d0 DefWindowProcW 97098->97104 97105 5f2d9c 97099->97105 97106 5b3201 KillTimer 97099->97106 97100->97104 97108 5b3246 CreatePopupMenu 97100->97108 97154 61bf30 34 API calls ___scrt_fastfail 97102->97154 97109 5b31ae 97103->97109 97110 5f2e68 97103->97110 97118 5f2dd7 MoveWindow 97105->97118 97119 5f2da1 97105->97119 97135 5b30f2 Shell_NotifyIconW ___scrt_fastfail 97106->97135 97107 5f2e1c 97140 5ce499 42 API calls 97107->97140 97108->97104 97115 5f2e4d 97109->97115 97116 5b31b9 97109->97116 97153 61c161 27 API calls ___scrt_fastfail 97110->97153 97115->97098 97152 610ad7 22 API calls 97115->97152 97122 5b31c4 97116->97122 97123 5b3253 97116->97123 97117 5f2e8e 97117->97098 97117->97104 97118->97104 97124 5f2da7 97119->97124 97125 5f2dc6 SetFocus 97119->97125 97120 5b3214 97136 5b3c50 DeleteObject DestroyWindow 97120->97136 97121 5b3263 97121->97104 97122->97098 97141 5b30f2 Shell_NotifyIconW ___scrt_fastfail 97122->97141 97137 5b326f 44 API calls ___scrt_fastfail 97123->97137 97124->97122 97126 5f2db0 97124->97126 97125->97104 97138 5b18e2 10 API calls 97126->97138 97131->97098 97133 5f2e41 97142 5b3837 97133->97142 97135->97120 97136->97104 97137->97121 97138->97104 97139->97107 97140->97122 97141->97133 97143 5b3862 ___scrt_fastfail 97142->97143 97155 5b4212 97143->97155 97147 5f3386 Shell_NotifyIconW 97148 5b3906 Shell_NotifyIconW 97159 5b3923 97148->97159 97150 5b38e8 97150->97147 97150->97148 97151 5b391c 97151->97131 97152->97131 97153->97121 97154->97117 97156 5f35a4 97155->97156 97157 5b38b7 97155->97157 97156->97157 97158 5f35ad DestroyIcon 97156->97158 97157->97150 97181 61c874 42 API calls _strftime 97157->97181 97158->97157 97160 5b393f 97159->97160 97161 5b3a13 97159->97161 97162 5b6270 22 API calls 97160->97162 97161->97151 97163 5b394d 97162->97163 97164 5b395a 97163->97164 97165 5f3393 LoadStringW 97163->97165 97166 5b6b57 22 API calls 97164->97166 97167 5f33ad 97165->97167 97168 5b396f 97166->97168 97171 5ba8c7 22 API calls 97167->97171 97175 5b3994 ___scrt_fastfail 97167->97175 97169 5f33c9 97168->97169 97170 5b397c 97168->97170 97173 5b6350 22 API calls 97169->97173 97170->97167 97172 5b3986 97170->97172 97171->97175 97174 5b6350 22 API calls 97172->97174 97176 5f33d7 97173->97176 97174->97175 97178 5b39f9 Shell_NotifyIconW 97175->97178 97176->97175 97177 5b33c6 22 API calls 97176->97177 97179 5f33f9 97177->97179 97178->97161 97180 5b33c6 22 API calls 97179->97180 97180->97175 97181->97150 97182 603f75 97193 5cceb1 97182->97193 97184 603f8b 97185 604006 97184->97185 97202 5ce300 23 API calls 97184->97202 97188 5bbf40 235 API calls 97185->97188 97187 603fe6 97191 604052 97187->97191 97203 621abf 22 API calls 97187->97203 97188->97191 97190 604a88 97191->97190 97204 62359c 82 API calls __wsopen_s 97191->97204 97194 5ccebf 97193->97194 97195 5cced2 97193->97195 97205 5baceb 23 API calls ISource 97194->97205 97197 5ccf05 97195->97197 97198 5cced7 97195->97198 97206 5baceb 23 API calls ISource 97197->97206 97199 5cfddb 22 API calls 97198->97199 97201 5ccec9 97199->97201 97201->97184 97202->97187 97203->97185 97204->97190 97205->97201 97206->97201 97207 5b1cad SystemParametersInfoW 97208 5b2de3 97209 5b2df0 __wsopen_s 97208->97209 97210 5b2e09 97209->97210 97211 5f2c2b ___scrt_fastfail 97209->97211 97212 5b3aa2 23 API calls 97210->97212 97213 5f2c47 GetOpenFileNameW 97211->97213 97214 5b2e12 97212->97214 97215 5f2c96 97213->97215 97224 5b2da5 97214->97224 97217 5b6b57 22 API calls 97215->97217 97219 5f2cab 97217->97219 97219->97219 97221 5b2e27 97242 5b44a8 97221->97242 97225 5f1f50 __wsopen_s 97224->97225 97226 5b2db2 GetLongPathNameW 97225->97226 97227 5b6b57 22 API calls 97226->97227 97228 5b2dda 97227->97228 97229 5b3598 97228->97229 97230 5ba961 22 API calls 97229->97230 97231 5b35aa 97230->97231 97232 5b3aa2 23 API calls 97231->97232 97233 5b35b5 97232->97233 97234 5b35c0 97233->97234 97239 5f32eb 97233->97239 97235 5b515f 22 API calls 97234->97235 97237 5b35cc 97235->97237 97272 5b35f3 97237->97272 97240 5f330d 97239->97240 97278 5cce60 41 API calls 97239->97278 97241 5b35df 97241->97221 97243 5b4ecb 94 API calls 97242->97243 97244 5b44cd 97243->97244 97245 5f3833 97244->97245 97247 5b4ecb 94 API calls 97244->97247 97246 622cf9 80 API calls 97245->97246 97248 5f3848 97246->97248 97249 5b44e1 97247->97249 97250 5f384c 97248->97250 97251 5f3869 97248->97251 97249->97245 97252 5b44e9 97249->97252 97253 5b4f39 68 API calls 97250->97253 97254 5cfe0b 22 API calls 97251->97254 97255 5f3854 97252->97255 97256 5b44f5 97252->97256 97253->97255 97262 5f38ae 97254->97262 97286 61da5a 82 API calls 97255->97286 97285 5b940c 136 API calls 2 library calls 97256->97285 97259 5f3862 97259->97251 97260 5b2e31 97261 5f3a5f 97264 5f3a67 97261->97264 97262->97261 97262->97264 97265 5ba4a1 22 API calls 97262->97265 97269 5b9cb3 22 API calls 97262->97269 97279 5b3ff7 97262->97279 97287 61967e 22 API calls __fread_nolock 97262->97287 97288 6195ad 42 API calls _wcslen 97262->97288 97289 620b5a 22 API calls 97262->97289 97263 5b4f39 68 API calls 97263->97264 97264->97263 97290 61989b 82 API calls __wsopen_s 97264->97290 97265->97262 97269->97262 97273 5b3605 97272->97273 97277 5b3624 __fread_nolock 97272->97277 97275 5cfe0b 22 API calls 97273->97275 97274 5cfddb 22 API calls 97276 5b363b 97274->97276 97275->97277 97276->97241 97277->97274 97278->97239 97280 5b400a 97279->97280 97282 5b40ae 97279->97282 97281 5cfe0b 22 API calls 97280->97281 97284 5b403c 97280->97284 97281->97284 97282->97262 97283 5cfddb 22 API calls 97283->97284 97284->97282 97284->97283 97285->97260 97286->97259 97287->97262 97288->97262 97289->97262 97290->97264 97291 5f2ba5 97292 5f2baf 97291->97292 97293 5b2b25 97291->97293 97295 5b3a5a 24 API calls 97292->97295 97319 5b2b83 7 API calls 97293->97319 97297 5f2bb8 97295->97297 97298 5b9cb3 22 API calls 97297->97298 97300 5f2bc6 97298->97300 97302 5f2bce 97300->97302 97303 5f2bf5 97300->97303 97301 5b2b2f 97305 5b3837 49 API calls 97301->97305 97308 5b2b44 97301->97308 97304 5b33c6 22 API calls 97302->97304 97306 5b33c6 22 API calls 97303->97306 97307 5f2bd9 97304->97307 97305->97308 97309 5f2bf1 GetForegroundWindow ShellExecuteW 97306->97309 97310 5b6350 22 API calls 97307->97310 97311 5b2b5f 97308->97311 97323 5b30f2 Shell_NotifyIconW ___scrt_fastfail 97308->97323 97315 5f2c26 97309->97315 97313 5f2be7 97310->97313 97317 5b2b66 SetCurrentDirectoryW 97311->97317 97316 5b33c6 22 API calls 97313->97316 97315->97311 97316->97309 97318 5b2b7a 97317->97318 97324 5b2cd4 7 API calls 97319->97324 97321 5b2b2a 97322 5b2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97321->97322 97322->97301 97323->97311 97324->97321 97325 5e8402 97330 5e81be 97325->97330 97328 5e842a 97335 5e81ef try_get_first_available_module 97330->97335 97332 5e83ee 97349 5e27ec 26 API calls __cftof 97332->97349 97334 5e8343 97334->97328 97342 5f0984 97334->97342 97338 5e8338 97335->97338 97345 5d8e0b 40 API calls 2 library calls 97335->97345 97337 5e838c 97337->97338 97346 5d8e0b 40 API calls 2 library calls 97337->97346 97338->97334 97348 5df2d9 20 API calls __dosmaperr 97338->97348 97340 5e83ab 97340->97338 97347 5d8e0b 40 API calls 2 library calls 97340->97347 97350 5f0081 97342->97350 97344 5f099f 97344->97328 97345->97337 97346->97340 97347->97338 97348->97332 97349->97334 97353 5f008d ___BuildCatchObject 97350->97353 97351 5f009b 97407 5df2d9 20 API calls __dosmaperr 97351->97407 97353->97351 97355 5f00d4 97353->97355 97354 5f00a0 97408 5e27ec 26 API calls __cftof 97354->97408 97361 5f065b 97355->97361 97360 5f00aa __wsopen_s 97360->97344 97362 5f0678 97361->97362 97363 5f068d 97362->97363 97364 5f06a6 97362->97364 97424 5df2c6 20 API calls __dosmaperr 97363->97424 97410 5e5221 97364->97410 97367 5f0692 97425 5df2d9 20 API calls __dosmaperr 97367->97425 97368 5f06ab 97369 5f06cb 97368->97369 97370 5f06b4 97368->97370 97423 5f039a CreateFileW 97369->97423 97426 5df2c6 20 API calls __dosmaperr 97370->97426 97374 5f00f8 97409 5f0121 LeaveCriticalSection __wsopen_s 97374->97409 97375 5f06b9 97427 5df2d9 20 API calls __dosmaperr 97375->97427 97376 5f0781 GetFileType 97379 5f078c GetLastError 97376->97379 97380 5f07d3 97376->97380 97378 5f0756 GetLastError 97429 5df2a3 20 API calls 2 library calls 97378->97429 97430 5df2a3 20 API calls 2 library calls 97379->97430 97432 5e516a 21 API calls 3 library calls 97380->97432 97381 5f0704 97381->97376 97381->97378 97428 5f039a CreateFileW 97381->97428 97385 5f079a CloseHandle 97385->97367 97388 5f07c3 97385->97388 97387 5f0749 97387->97376 97387->97378 97431 5df2d9 20 API calls __dosmaperr 97388->97431 97389 5f07f4 97392 5f0840 97389->97392 97433 5f05ab 72 API calls 4 library calls 97389->97433 97391 5f07c8 97391->97367 97396 5f086d 97392->97396 97434 5f014d 72 API calls 4 library calls 97392->97434 97395 5f0866 97395->97396 97397 5f087e 97395->97397 97398 5e86ae __wsopen_s 29 API calls 97396->97398 97397->97374 97399 5f08fc CloseHandle 97397->97399 97398->97374 97435 5f039a CreateFileW 97399->97435 97401 5f0927 97402 5f0931 GetLastError 97401->97402 97406 5f095d 97401->97406 97436 5df2a3 20 API calls 2 library calls 97402->97436 97404 5f093d 97437 5e5333 21 API calls 3 library calls 97404->97437 97406->97374 97407->97354 97408->97360 97409->97360 97411 5e522d ___BuildCatchObject 97410->97411 97438 5e2f5e EnterCriticalSection 97411->97438 97413 5e5234 97414 5e5259 97413->97414 97419 5e52c7 EnterCriticalSection 97413->97419 97421 5e527b 97413->97421 97416 5e5000 __wsopen_s 21 API calls 97414->97416 97418 5e525e 97416->97418 97417 5e52a4 __wsopen_s 97417->97368 97418->97421 97442 5e5147 EnterCriticalSection 97418->97442 97420 5e52d4 LeaveCriticalSection 97419->97420 97419->97421 97420->97413 97439 5e532a 97421->97439 97423->97381 97424->97367 97425->97374 97426->97375 97427->97367 97428->97387 97429->97367 97430->97385 97431->97391 97432->97389 97433->97392 97434->97395 97435->97401 97436->97404 97437->97406 97438->97413 97443 5e2fa6 LeaveCriticalSection 97439->97443 97441 5e5331 97441->97417 97442->97421 97443->97441 97444 fe2fc0 97458 fe0be0 97444->97458 97446 fe3061 97461 fe2eb0 97446->97461 97448 fe308a CreateFileW 97450 fe30de 97448->97450 97457 fe30d9 97448->97457 97451 fe30f5 VirtualAlloc 97450->97451 97450->97457 97452 fe3116 ReadFile 97451->97452 97451->97457 97453 fe3131 97452->97453 97452->97457 97454 fe1c50 12 API calls 97453->97454 97455 fe314b 97454->97455 97456 fe1eb0 GetPEB GetPEB 97455->97456 97456->97457 97464 fe40b0 GetPEB 97458->97464 97460 fe126b 97460->97446 97462 fe2eb9 Sleep 97461->97462 97463 fe2ec7 97462->97463 97465 fe40da 97464->97465 97465->97460 97466 5b1044 97471 5b10f3 97466->97471 97468 5b104a 97507 5d00a3 29 API calls __onexit 97468->97507 97470 5b1054 97508 5b1398 97471->97508 97475 5b116a 97476 5ba961 22 API calls 97475->97476 97477 5b1174 97476->97477 97478 5ba961 22 API calls 97477->97478 97479 5b117e 97478->97479 97480 5ba961 22 API calls 97479->97480 97481 5b1188 97480->97481 97482 5ba961 22 API calls 97481->97482 97483 5b11c6 97482->97483 97484 5ba961 22 API calls 97483->97484 97485 5b1292 97484->97485 97518 5b171c 97485->97518 97489 5b12c4 97490 5ba961 22 API calls 97489->97490 97491 5b12ce 97490->97491 97492 5c1940 9 API calls 97491->97492 97493 5b12f9 97492->97493 97539 5b1aab 97493->97539 97495 5b1315 97496 5b1325 GetStdHandle 97495->97496 97497 5f2485 97496->97497 97499 5b137a 97496->97499 97498 5f248e 97497->97498 97497->97499 97500 5cfddb 22 API calls 97498->97500 97502 5b1387 OleInitialize 97499->97502 97501 5f2495 97500->97501 97546 62011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97501->97546 97502->97468 97504 5f249e 97547 620944 CreateThread 97504->97547 97506 5f24aa CloseHandle 97506->97499 97507->97470 97548 5b13f1 97508->97548 97511 5b13f1 22 API calls 97512 5b13d0 97511->97512 97513 5ba961 22 API calls 97512->97513 97514 5b13dc 97513->97514 97515 5b6b57 22 API calls 97514->97515 97516 5b1129 97515->97516 97517 5b1bc3 6 API calls 97516->97517 97517->97475 97519 5ba961 22 API calls 97518->97519 97520 5b172c 97519->97520 97521 5ba961 22 API calls 97520->97521 97522 5b1734 97521->97522 97523 5ba961 22 API calls 97522->97523 97524 5b174f 97523->97524 97525 5cfddb 22 API calls 97524->97525 97526 5b129c 97525->97526 97527 5b1b4a 97526->97527 97528 5b1b58 97527->97528 97529 5ba961 22 API calls 97528->97529 97530 5b1b63 97529->97530 97531 5ba961 22 API calls 97530->97531 97532 5b1b6e 97531->97532 97533 5ba961 22 API calls 97532->97533 97534 5b1b79 97533->97534 97535 5ba961 22 API calls 97534->97535 97536 5b1b84 97535->97536 97537 5cfddb 22 API calls 97536->97537 97538 5b1b96 RegisterWindowMessageW 97537->97538 97538->97489 97540 5b1abb 97539->97540 97541 5f272d 97539->97541 97543 5cfddb 22 API calls 97540->97543 97555 623209 23 API calls 97541->97555 97545 5b1ac3 97543->97545 97544 5f2738 97545->97495 97546->97504 97547->97506 97556 62092a 28 API calls 97547->97556 97549 5ba961 22 API calls 97548->97549 97550 5b13fc 97549->97550 97551 5ba961 22 API calls 97550->97551 97552 5b1404 97551->97552 97553 5ba961 22 API calls 97552->97553 97554 5b13c6 97553->97554 97554->97511 97555->97544

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 234 5b42de-5b434d call 5ba961 GetVersionExW call 5b6b57 239 5f3617-5f362a 234->239 240 5b4353 234->240 241 5f362b-5f362f 239->241 242 5b4355-5b4357 240->242 243 5f3632-5f363e 241->243 244 5f3631 241->244 245 5b435d-5b43bc call 5b93b2 call 5b37a0 242->245 246 5f3656 242->246 243->241 247 5f3640-5f3642 243->247 244->243 261 5f37df-5f37e6 245->261 262 5b43c2-5b43c4 245->262 250 5f365d-5f3660 246->250 247->242 249 5f3648-5f364f 247->249 249->239 252 5f3651 249->252 253 5b441b-5b4435 GetCurrentProcess IsWow64Process 250->253 254 5f3666-5f36a8 250->254 252->246 256 5b4437 253->256 257 5b4494-5b449a 253->257 254->253 258 5f36ae-5f36b1 254->258 260 5b443d-5b4449 256->260 257->260 263 5f36db-5f36e5 258->263 264 5f36b3-5f36bd 258->264 270 5b444f-5b445e LoadLibraryA 260->270 271 5f3824-5f3828 GetSystemInfo 260->271 266 5f37e8 261->266 267 5f3806-5f3809 261->267 262->250 265 5b43ca-5b43dd 262->265 268 5f36f8-5f3702 263->268 269 5f36e7-5f36f3 263->269 272 5f36bf-5f36c5 264->272 273 5f36ca-5f36d6 264->273 274 5b43e3-5b43e5 265->274 275 5f3726-5f372f 265->275 276 5f37ee 266->276 279 5f380b-5f381a 267->279 280 5f37f4-5f37fc 267->280 277 5f3715-5f3721 268->277 278 5f3704-5f3710 268->278 269->253 281 5b449c-5b44a6 GetSystemInfo 270->281 282 5b4460-5b446e GetProcAddress 270->282 272->253 273->253 284 5b43eb-5b43ee 274->284 285 5f374d-5f3762 274->285 286 5f373c-5f3748 275->286 287 5f3731-5f3737 275->287 276->280 277->253 278->253 279->276 288 5f381c-5f3822 279->288 280->267 283 5b4476-5b4478 281->283 282->281 289 5b4470-5b4474 GetNativeSystemInfo 282->289 294 5b447a-5b447b FreeLibrary 283->294 295 5b4481-5b4493 283->295 290 5f3791-5f3794 284->290 291 5b43f4-5b440f 284->291 292 5f376f-5f377b 285->292 293 5f3764-5f376a 285->293 286->253 287->253 288->280 289->283 290->253 298 5f379a-5f37c1 290->298 296 5b4415 291->296 297 5f3780-5f378c 291->297 292->253 293->253 294->295 296->253 297->253 299 5f37ce-5f37da 298->299 300 5f37c3-5f37c9 298->300 299->253 300->253
                                                                            APIs
                                                                            • GetVersionExW.KERNEL32(?), ref: 005B430D
                                                                              • Part of subcall function 005B6B57: _wcslen.LIBCMT ref: 005B6B6A
                                                                            • GetCurrentProcess.KERNEL32(?,0064CB64,00000000,?,?), ref: 005B4422
                                                                            • IsWow64Process.KERNEL32(00000000,?,?), ref: 005B4429
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 005B4454
                                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 005B4466
                                                                            • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 005B4474
                                                                            • FreeLibrary.KERNEL32(00000000,?,?), ref: 005B447B
                                                                            • GetSystemInfo.KERNEL32(?,?,?), ref: 005B44A0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                            • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                            • API String ID: 3290436268-3101561225
                                                                            • Opcode ID: 9774b67865abf1d2063b5f84d11505ac6f17e90f8769c13776612308bb2e6e61
                                                                            • Instruction ID: 9723cf71b368655198beb023677243cb555753d087aef46c2139140ff17ae0d3
                                                                            • Opcode Fuzzy Hash: 9774b67865abf1d2063b5f84d11505ac6f17e90f8769c13776612308bb2e6e61
                                                                            • Instruction Fuzzy Hash: 5AA1D57190A6D4FFDB22D7697C401E53FAFBB27700B187A99D0819BB22D264560ACF21

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1147 5b42a2-5b42ba CreateStreamOnHGlobal 1148 5b42da-5b42dd 1147->1148 1149 5b42bc-5b42d3 FindResourceExW 1147->1149 1150 5b42d9 1149->1150 1151 5f35ba-5f35c9 LoadResource 1149->1151 1150->1148 1151->1150 1152 5f35cf-5f35dd SizeofResource 1151->1152 1152->1150 1153 5f35e3-5f35ee LockResource 1152->1153 1153->1150 1154 5f35f4-5f3612 1153->1154 1154->1150
                                                                            APIs
                                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,005B50AA,?,?,00000000,00000000), ref: 005B42B2
                                                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,005B50AA,?,?,00000000,00000000), ref: 005B42C9
                                                                            • LoadResource.KERNEL32(?,00000000,?,?,005B50AA,?,?,00000000,00000000,?,?,?,?,?,?,005B4F20), ref: 005F35BE
                                                                            • SizeofResource.KERNEL32(?,00000000,?,?,005B50AA,?,?,00000000,00000000,?,?,?,?,?,?,005B4F20), ref: 005F35D3
                                                                            • LockResource.KERNEL32(005B50AA,?,?,005B50AA,?,?,00000000,00000000,?,?,?,?,?,?,005B4F20,?), ref: 005F35E6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                            • String ID: SCRIPT
                                                                            • API String ID: 3051347437-3967369404
                                                                            • Opcode ID: 6691a4df40222469c767445cfc7c5f407fe6f9c362d4dc4d2c48732059a16c77
                                                                            • Instruction ID: 4f66a7ca044ad844f046eb2576150be17aed640c43eef3f5570bbd29ff2752d5
                                                                            • Opcode Fuzzy Hash: 6691a4df40222469c767445cfc7c5f407fe6f9c362d4dc4d2c48732059a16c77
                                                                            • Instruction Fuzzy Hash: 2D117378201700BFD7218F65DC4AF677FBAFBC5B51F104159B40296660DBB1E9009A20

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 005B2B6B
                                                                              • Part of subcall function 005B3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00681418,?,005B2E7F,?,?,?,00000000), ref: 005B3A78
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            • GetForegroundWindow.USER32(runas,?,?,?,?,?,00672224), ref: 005F2C10
                                                                            • ShellExecuteW.SHELL32(00000000,?,?,00672224), ref: 005F2C17
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                            • String ID: runas
                                                                            • API String ID: 448630720-4000483414
                                                                            • Opcode ID: c2b6ed73f8603ed134faa58332500012d2446a04ca457f7e0195b90d14bd0d1a
                                                                            • Instruction ID: d93ef51c41fe140f1c3ced4da260be1ac3985175157016a1fbc6bac2a1b5e999
                                                                            • Opcode Fuzzy Hash: c2b6ed73f8603ed134faa58332500012d2446a04ca457f7e0195b90d14bd0d1a
                                                                            • Instruction Fuzzy Hash: 7211B4312083466AC704FF60D8599FE7FEABBD2350F54592DF146160A2CF21AA4AC722
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,005F5222), ref: 0061DBCE
                                                                            • GetFileAttributesW.KERNELBASE(?), ref: 0061DBDD
                                                                            • FindFirstFileW.KERNELBASE(?,?), ref: 0061DBEE
                                                                            • FindClose.KERNEL32(00000000), ref: 0061DBFA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                            • String ID:
                                                                            • API String ID: 2695905019-0
                                                                            • Opcode ID: 191a62502ed4ab93792dda486453bb88310972834559b12c56907e12f0c060c1
                                                                            • Instruction ID: 16f1a68ba03f15fcfdc9c537b2c50e4def326fe53d82a06a6849fdfbb96f9e0b
                                                                            • Opcode Fuzzy Hash: 191a62502ed4ab93792dda486453bb88310972834559b12c56907e12f0c060c1
                                                                            • Instruction Fuzzy Hash: ECF0A07881191057C3206B78AC0D8EB376E9E03374B184B02F936C22E0EBF05A95C6D5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper
                                                                            • String ID: p#h
                                                                            • API String ID: 3964851224-1450192713
                                                                            • Opcode ID: d5e130c877e39b24c97c36c52d86ec0d566912532ba9dbb5602c90b85b4eb0a1
                                                                            • Instruction ID: f232f502a6090103e4c46222bb23bc98e60dff34c7dfa54b643dc58997ec27f1
                                                                            • Opcode Fuzzy Hash: d5e130c877e39b24c97c36c52d86ec0d566912532ba9dbb5602c90b85b4eb0a1
                                                                            • Instruction Fuzzy Hash: C3A248706083019FD714DF18C484BAABBE2BF89304F14896DF89A9B392D775EC45CB96
                                                                            APIs
                                                                            • GetInputState.USER32 ref: 005BD807
                                                                            • timeGetTime.WINMM ref: 005BDA07
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005BDB28
                                                                            • TranslateMessage.USER32(?), ref: 005BDB7B
                                                                            • DispatchMessageW.USER32(?), ref: 005BDB89
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005BDB9F
                                                                            • Sleep.KERNEL32(0000000A), ref: 005BDBB1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                            • String ID:
                                                                            • API String ID: 2189390790-0
                                                                            • Opcode ID: 8dd0c1363172367b9f6f6bfdfa635643fa0f3b0d7dfc243e93fe36e4c0fcc14a
                                                                            • Instruction ID: 8d1444c962eb8220387740c2ebf98b45e413b7d0ebfd7b6027289b073e2e18c6
                                                                            • Opcode Fuzzy Hash: 8dd0c1363172367b9f6f6bfdfa635643fa0f3b0d7dfc243e93fe36e4c0fcc14a
                                                                            • Instruction Fuzzy Hash: B142E270644242AFD728CF24C899BEABBF2BF86314F14465DE4558B391E774F844CBA2

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 005B2D07
                                                                            • RegisterClassExW.USER32(00000030), ref: 005B2D31
                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005B2D42
                                                                            • InitCommonControlsEx.COMCTL32(?), ref: 005B2D5F
                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005B2D6F
                                                                            • LoadIconW.USER32(000000A9), ref: 005B2D85
                                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005B2D94
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                            • API String ID: 2914291525-1005189915
                                                                            • Opcode ID: 4c33478a72c6253e7b9c055c89c0e7187a267fae1d121d091a66960339a5f1de
                                                                            • Instruction ID: e62c2cde88fb767335b426b4895678156d9b62885f201686ebe947bfa9b90720
                                                                            • Opcode Fuzzy Hash: 4c33478a72c6253e7b9c055c89c0e7187a267fae1d121d091a66960339a5f1de
                                                                            • Instruction Fuzzy Hash: 7C21E3B5902308AFDB40DFA4E849BDDBBBAFB0A711F00521AF511AA3A0D7B10541CF90

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 302 5e8d45-5e8d55 303 5e8d6f-5e8d71 302->303 304 5e8d57-5e8d6a call 5df2c6 call 5df2d9 302->304 306 5e90d9-5e90e6 call 5df2c6 call 5df2d9 303->306 307 5e8d77-5e8d7d 303->307 321 5e90f1 304->321 323 5e90ec call 5e27ec 306->323 307->306 308 5e8d83-5e8dae 307->308 308->306 311 5e8db4-5e8dbd 308->311 314 5e8dbf-5e8dd2 call 5df2c6 call 5df2d9 311->314 315 5e8dd7-5e8dd9 311->315 314->323 319 5e8ddf-5e8de3 315->319 320 5e90d5-5e90d7 315->320 319->320 326 5e8de9-5e8ded 319->326 324 5e90f4-5e90f9 320->324 321->324 323->321 326->314 329 5e8def-5e8e06 326->329 331 5e8e08-5e8e0b 329->331 332 5e8e23-5e8e2c 329->332 333 5e8e0d-5e8e13 331->333 334 5e8e15-5e8e1e 331->334 335 5e8e2e-5e8e45 call 5df2c6 call 5df2d9 call 5e27ec 332->335 336 5e8e4a-5e8e54 332->336 333->334 333->335 340 5e8ebf-5e8ed9 334->340 365 5e900c 335->365 338 5e8e5b-5e8e79 call 5e3820 call 5e29c8 * 2 336->338 339 5e8e56-5e8e58 336->339 375 5e8e7b-5e8e91 call 5df2d9 call 5df2c6 338->375 376 5e8e96-5e8ebc call 5e9424 338->376 339->338 342 5e8edf-5e8eef 340->342 343 5e8fad-5e8fb6 call 5ef89b 340->343 342->343 347 5e8ef5-5e8ef7 342->347 354 5e8fb8-5e8fca 343->354 355 5e9029 343->355 347->343 351 5e8efd-5e8f23 347->351 351->343 356 5e8f29-5e8f3c 351->356 354->355 360 5e8fcc-5e8fdb GetConsoleMode 354->360 358 5e902d-5e9045 ReadFile 355->358 356->343 361 5e8f3e-5e8f40 356->361 363 5e9047-5e904d 358->363 364 5e90a1-5e90ac GetLastError 358->364 360->355 366 5e8fdd-5e8fe1 360->366 361->343 367 5e8f42-5e8f6d 361->367 363->364 371 5e904f 363->371 369 5e90ae-5e90c0 call 5df2d9 call 5df2c6 364->369 370 5e90c5-5e90c8 364->370 373 5e900f-5e9019 call 5e29c8 365->373 366->358 372 5e8fe3-5e8ffd ReadConsoleW 366->372 367->343 374 5e8f6f-5e8f82 367->374 369->365 383 5e90ce-5e90d0 370->383 384 5e9005-5e900b call 5df2a3 370->384 379 5e9052-5e9064 371->379 381 5e901e-5e9027 372->381 382 5e8fff GetLastError 372->382 373->324 374->343 386 5e8f84-5e8f86 374->386 375->365 376->340 379->373 390 5e9066-5e906a 379->390 381->379 382->384 383->373 384->365 386->343 387 5e8f88-5e8fa8 386->387 387->343 396 5e906c-5e907c call 5e8a61 390->396 397 5e9083-5e908e 390->397 408 5e907f-5e9081 396->408 402 5e909a-5e909f call 5e88a1 397->402 403 5e9090 call 5e8bb1 397->403 409 5e9095-5e9098 402->409 403->409 408->373 409->408
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .]
                                                                            • API String ID: 0-3162272647
                                                                            • Opcode ID: 580d347b8fe7ec5fb1428c9913d12dd60756de03cb95c5efabb99d1471e5f28b
                                                                            • Instruction ID: f67ce6dcdc98d43b8181735d73302d9ca72c21f08ebe793ba21da5624ccbb760
                                                                            • Opcode Fuzzy Hash: 580d347b8fe7ec5fb1428c9913d12dd60756de03cb95c5efabb99d1471e5f28b
                                                                            • Instruction Fuzzy Hash: EFC13974D04289AFDF29DFAACC48BADBFB5BF49310F044199E99997392C7309941CB60

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 410 5f065b-5f068b call 5f042f 413 5f068d-5f0698 call 5df2c6 410->413 414 5f06a6-5f06b2 call 5e5221 410->414 419 5f069a-5f06a1 call 5df2d9 413->419 420 5f06cb-5f0714 call 5f039a 414->420 421 5f06b4-5f06c9 call 5df2c6 call 5df2d9 414->421 430 5f097d-5f0983 419->430 428 5f0716-5f071f 420->428 429 5f0781-5f078a GetFileType 420->429 421->419 432 5f0756-5f077c GetLastError call 5df2a3 428->432 433 5f0721-5f0725 428->433 434 5f078c-5f07bd GetLastError call 5df2a3 CloseHandle 429->434 435 5f07d3-5f07d6 429->435 432->419 433->432 439 5f0727-5f0754 call 5f039a 433->439 434->419 449 5f07c3-5f07ce call 5df2d9 434->449 437 5f07df-5f07e5 435->437 438 5f07d8-5f07dd 435->438 442 5f07e9-5f0837 call 5e516a 437->442 443 5f07e7 437->443 438->442 439->429 439->432 453 5f0839-5f0845 call 5f05ab 442->453 454 5f0847-5f086b call 5f014d 442->454 443->442 449->419 453->454 459 5f086f-5f0879 call 5e86ae 453->459 460 5f087e-5f08c1 454->460 461 5f086d 454->461 459->430 463 5f08c3-5f08c7 460->463 464 5f08e2-5f08f0 460->464 461->459 463->464 466 5f08c9-5f08dd 463->466 467 5f097b 464->467 468 5f08f6-5f08fa 464->468 466->464 467->430 468->467 469 5f08fc-5f092f CloseHandle call 5f039a 468->469 472 5f0963-5f0977 469->472 473 5f0931-5f095d GetLastError call 5df2a3 call 5e5333 469->473 472->467 473->472
                                                                            APIs
                                                                              • Part of subcall function 005F039A: CreateFileW.KERNELBASE(00000000,00000000,?,005F0704,?,?,00000000,?,005F0704,00000000,0000000C), ref: 005F03B7
                                                                            • GetLastError.KERNEL32 ref: 005F076F
                                                                            • __dosmaperr.LIBCMT ref: 005F0776
                                                                            • GetFileType.KERNELBASE(00000000), ref: 005F0782
                                                                            • GetLastError.KERNEL32 ref: 005F078C
                                                                            • __dosmaperr.LIBCMT ref: 005F0795
                                                                            • CloseHandle.KERNEL32(00000000), ref: 005F07B5
                                                                            • CloseHandle.KERNEL32(?), ref: 005F08FF
                                                                            • GetLastError.KERNEL32 ref: 005F0931
                                                                            • __dosmaperr.LIBCMT ref: 005F0938
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                            • String ID: H
                                                                            • API String ID: 4237864984-2852464175
                                                                            • Opcode ID: ce063a37b75fe2f0c60f1d932f2db022e01deaa8043c693d4a4a3fb55541baaa
                                                                            • Instruction ID: 7b652d8130759589d4ee45e47727c989c9e38248d91c52ce87d53107609203f9
                                                                            • Opcode Fuzzy Hash: ce063a37b75fe2f0c60f1d932f2db022e01deaa8043c693d4a4a3fb55541baaa
                                                                            • Instruction Fuzzy Hash: BCA12236A001098FDF29AF68DC55BBE7FA1BB46320F18515AF9119F3D2D7389812CB91

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 005B3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00681418,?,005B2E7F,?,?,?,00000000), ref: 005B3A78
                                                                              • Part of subcall function 005B3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 005B3379
                                                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 005B356A
                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 005F318D
                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 005F31CE
                                                                            • RegCloseKey.ADVAPI32(?), ref: 005F3210
                                                                            • _wcslen.LIBCMT ref: 005F3277
                                                                            • _wcslen.LIBCMT ref: 005F3286
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                            • API String ID: 98802146-2727554177
                                                                            • Opcode ID: 30c5a789781c08916204a4307daf15899a9e354a75b65fcff27abe62ebd40483
                                                                            • Instruction ID: 95cf241ec198cbd50ac2e21e684d909216aa012bfcda650f8878e078b75e04fd
                                                                            • Opcode Fuzzy Hash: 30c5a789781c08916204a4307daf15899a9e354a75b65fcff27abe62ebd40483
                                                                            • Instruction Fuzzy Hash: 1B71C271405302AFC314EF69ECA59ABBFE9FF85740F40192EF545932A0EB349A48CB52

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 005B2B8E
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 005B2B9D
                                                                            • LoadIconW.USER32(00000063), ref: 005B2BB3
                                                                            • LoadIconW.USER32(000000A4), ref: 005B2BC5
                                                                            • LoadIconW.USER32(000000A2), ref: 005B2BD7
                                                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 005B2BEF
                                                                            • RegisterClassExW.USER32(?), ref: 005B2C40
                                                                              • Part of subcall function 005B2CD4: GetSysColorBrush.USER32(0000000F), ref: 005B2D07
                                                                              • Part of subcall function 005B2CD4: RegisterClassExW.USER32(00000030), ref: 005B2D31
                                                                              • Part of subcall function 005B2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005B2D42
                                                                              • Part of subcall function 005B2CD4: InitCommonControlsEx.COMCTL32(?), ref: 005B2D5F
                                                                              • Part of subcall function 005B2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005B2D6F
                                                                              • Part of subcall function 005B2CD4: LoadIconW.USER32(000000A9), ref: 005B2D85
                                                                              • Part of subcall function 005B2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005B2D94
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                            • String ID: #$0$AutoIt v3
                                                                            • API String ID: 423443420-4155596026
                                                                            • Opcode ID: 140d3fb687cdcad58e10c1409547b6bf59519c252585ea4ca9b1b2402bf4b310
                                                                            • Instruction ID: 9fb81f439b8b68e41007f875d31f5f7479f15b8b5f4236876764faf408dc0358
                                                                            • Opcode Fuzzy Hash: 140d3fb687cdcad58e10c1409547b6bf59519c252585ea4ca9b1b2402bf4b310
                                                                            • Instruction Fuzzy Hash: CA212C74E01314BBDB109FA5EC55ADD7FBAFB4AB50F00111AE500AABA0D7B11A41CF90

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 551 5b3170-5b3185 552 5b3187-5b318a 551->552 553 5b31e5-5b31e7 551->553 554 5b31eb 552->554 555 5b318c-5b3193 552->555 553->552 556 5b31e9 553->556 557 5f2dfb-5f2e23 call 5b18e2 call 5ce499 554->557 558 5b31f1-5b31f6 554->558 559 5b3199-5b319e 555->559 560 5b3265-5b326d PostQuitMessage 555->560 561 5b31d0-5b31d8 DefWindowProcW 556->561 597 5f2e28-5f2e2f 557->597 562 5b31f8-5b31fb 558->562 563 5b321d-5b3244 SetTimer RegisterWindowMessageW 558->563 565 5f2e7c-5f2e90 call 61bf30 559->565 566 5b31a4-5b31a8 559->566 568 5b3219-5b321b 560->568 567 5b31de-5b31e4 561->567 569 5f2d9c-5f2d9f 562->569 570 5b3201-5b3214 KillTimer call 5b30f2 call 5b3c50 562->570 563->568 572 5b3246-5b3251 CreatePopupMenu 563->572 565->568 590 5f2e96 565->590 573 5b31ae-5b31b3 566->573 574 5f2e68-5f2e77 call 61c161 566->574 568->567 582 5f2dd7-5f2df6 MoveWindow 569->582 583 5f2da1-5f2da5 569->583 570->568 572->568 579 5f2e4d-5f2e54 573->579 580 5b31b9-5b31be 573->580 574->568 579->561 584 5f2e5a-5f2e63 call 610ad7 579->584 588 5b3253-5b3263 call 5b326f 580->588 589 5b31c4-5b31ca 580->589 582->568 591 5f2da7-5f2daa 583->591 592 5f2dc6-5f2dd2 SetFocus 583->592 584->561 588->568 589->561 589->597 590->561 591->589 593 5f2db0-5f2dc1 call 5b18e2 591->593 592->568 593->568 597->561 601 5f2e35-5f2e48 call 5b30f2 call 5b3837 597->601 601->561
                                                                            APIs
                                                                            • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,005B316A,?,?), ref: 005B31D8
                                                                            • KillTimer.USER32(?,00000001,?,?,?,?,?,005B316A,?,?), ref: 005B3204
                                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005B3227
                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,005B316A,?,?), ref: 005B3232
                                                                            • CreatePopupMenu.USER32 ref: 005B3246
                                                                            • PostQuitMessage.USER32(00000000), ref: 005B3267
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                            • String ID: TaskbarCreated
                                                                            • API String ID: 129472671-2362178303
                                                                            • Opcode ID: 4c14b5daf0c68b34ccd6f157184cf0516443766bb87837b8bf813e32eb41797a
                                                                            • Instruction ID: 45f0cd23e771d15823c5b70934a3eef96731768de1f7a927cb93c9de0be2f9c8
                                                                            • Opcode Fuzzy Hash: 4c14b5daf0c68b34ccd6f157184cf0516443766bb87837b8bf813e32eb41797a
                                                                            • Instruction Fuzzy Hash: 1A410779240608ABDB142B7CDC1EBFD3E1FFB46350F141625F601A92A1CB75AA42D761
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: D%h$D%h$D%h$D%h$D%hD%h$Variable must be of type 'Object'.
                                                                            • API String ID: 0-1434231027
                                                                            • Opcode ID: 1d4be9071c9fe37050548fdcb3e3a1fdf0f09853184fa5634f601eadaf0c8ede
                                                                            • Instruction ID: 2424e147aaf37a39387920a9628d34bd1b6a0f0543781e9df7194cd6c056afb7
                                                                            • Opcode Fuzzy Hash: 1d4be9071c9fe37050548fdcb3e3a1fdf0f09853184fa5634f601eadaf0c8ede
                                                                            • Instruction Fuzzy Hash: A1C26B75A00215DFCB24CF58C886AEDBBF6BF48300F288569E906AB391D375BD41CB91

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1117 fe1500-fe1552 call fe1400 CreateFileW 1120 fe155b-fe1568 1117->1120 1121 fe1554-fe1556 1117->1121 1124 fe156a-fe1576 1120->1124 1125 fe157b-fe1592 VirtualAlloc 1120->1125 1122 fe16b4-fe16b8 1121->1122 1124->1122 1126 fe159b-fe15c1 CreateFileW 1125->1126 1127 fe1594-fe1596 1125->1127 1128 fe15e5-fe15ff ReadFile 1126->1128 1129 fe15c3-fe15e0 1126->1129 1127->1122 1131 fe1623-fe1627 1128->1131 1132 fe1601-fe161e 1128->1132 1129->1122 1134 fe1648-fe165f WriteFile 1131->1134 1135 fe1629-fe1646 1131->1135 1132->1122 1136 fe168a-fe16af CloseHandle VirtualFree 1134->1136 1137 fe1661-fe1688 1134->1137 1135->1122 1136->1122 1137->1122
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00FE1545
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1692154303.0000000000FE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fe0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                                            • Instruction ID: 316d3d40be761227526ab59b156c58a46696e0355a4755fed7567af6805d9d29
                                                                            • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                                            • Instruction Fuzzy Hash: 22511A75A10248FBEF20DFA5CC49FEE7778BF48710F108614F60AEA180DA749A44DB64

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1157 5b2c63-5b2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                            APIs
                                                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 005B2C91
                                                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 005B2CB2
                                                                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,005B1CAD,?), ref: 005B2CC6
                                                                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,005B1CAD,?), ref: 005B2CCF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateShow
                                                                            • String ID: AutoIt v3$edit
                                                                            • API String ID: 1584632944-3779509399
                                                                            • Opcode ID: 7bd8378b4855cac4b252f72121e74ef335e3a6b7c12ba1b0012350682d4ca54d
                                                                            • Instruction ID: 592535426d13b8d90f659990211e57870d10ddd4240fd3d2992d0daf5139a9b8
                                                                            • Opcode Fuzzy Hash: 7bd8378b4855cac4b252f72121e74ef335e3a6b7c12ba1b0012350682d4ca54d
                                                                            • Instruction Fuzzy Hash: CFF0DA755813907BEB711B17AC08EB72EBFD7C7F60B01215AF900EA6A0C6751852DBB0

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1272 622947-6229b9 call 5f1f50 call 6225d6 call 5cfe0b call 5b5722 call 62274e call 5b511f call 5d5232 1287 6229bf-6229c6 call 622e66 1272->1287 1288 622a6c-622a73 call 622e66 1272->1288 1293 622a75-622a77 1287->1293 1294 6229cc-622a6a call 5dd583 call 5d4983 call 5d9038 call 5dd583 call 5d9038 * 2 1287->1294 1288->1293 1295 622a7c 1288->1295 1296 622cb6-622cb7 1293->1296 1298 622a7f-622b3a call 5b50f5 * 8 call 623017 call 5de5eb 1294->1298 1295->1298 1299 622cd5-622cdb 1296->1299 1337 622b43-622b5e call 622792 1298->1337 1338 622b3c-622b3e 1298->1338 1302 622cf0-622cf6 1299->1302 1303 622cdd-622ce8 call 5cfdcd call 5cfe14 1299->1303 1315 622ced 1303->1315 1315->1302 1341 622bf0-622bfc call 5de678 1337->1341 1342 622b64-622b6c 1337->1342 1338->1296 1349 622c12-622c16 1341->1349 1350 622bfe-622c0d DeleteFileW 1341->1350 1343 622b74 1342->1343 1344 622b6e-622b72 1342->1344 1346 622b79-622b97 call 5b50f5 1343->1346 1344->1346 1354 622bc1-622bd7 call 62211d call 5ddbb3 1346->1354 1355 622b99-622b9e 1346->1355 1352 622c91-622ca5 CopyFileW 1349->1352 1353 622c18-622c7e call 6225d6 call 5dd2eb * 2 call 6222ce 1349->1353 1350->1296 1357 622ca7-622cb4 DeleteFileW 1352->1357 1358 622cb9-622ccf DeleteFileW call 622fd8 1352->1358 1353->1358 1377 622c80-622c8f DeleteFileW 1353->1377 1372 622bdc-622be7 1354->1372 1360 622ba1-622bb4 call 6228d2 1355->1360 1357->1296 1363 622cd4 1358->1363 1370 622bb6-622bbf 1360->1370 1363->1299 1370->1354 1372->1342 1374 622bed 1372->1374 1374->1341 1377->1296
                                                                            APIs
                                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00622C05
                                                                            • DeleteFileW.KERNEL32(?), ref: 00622C87
                                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00622C9D
                                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00622CAE
                                                                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00622CC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: File$Delete$Copy
                                                                            • String ID:
                                                                            • API String ID: 3226157194-0
                                                                            • Opcode ID: 19346f25001df21311c2941ac9a2f2b462d36b44b87f08c3fe13598a5189114e
                                                                            • Instruction ID: 60269d0c283569ced070b3e735d0d7b7451078dfdd15d7f33e646ff47b1e875f
                                                                            • Opcode Fuzzy Hash: 19346f25001df21311c2941ac9a2f2b462d36b44b87f08c3fe13598a5189114e
                                                                            • Instruction Fuzzy Hash: 53B1717190052EABDF25EFA4DC99EDE7B7DFF48310F0040A6F509E6241EA309A448F61

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1378 5e5aa9-5e5ace 1379 5e5ad7-5e5ad9 1378->1379 1380 5e5ad0-5e5ad2 1378->1380 1382 5e5afa-5e5b1f 1379->1382 1383 5e5adb-5e5af5 call 5df2c6 call 5df2d9 call 5e27ec 1379->1383 1381 5e5ca5-5e5cb4 call 5d0a8c 1380->1381 1384 5e5b26-5e5b2c 1382->1384 1385 5e5b21-5e5b24 1382->1385 1383->1381 1389 5e5b2e-5e5b46 call 5df2c6 call 5df2d9 call 5e27ec 1384->1389 1390 5e5b4b 1384->1390 1385->1384 1388 5e5b4e-5e5b53 1385->1388 1394 5e5b64-5e5b6d call 5e564e 1388->1394 1395 5e5b55-5e5b61 call 5e9424 1388->1395 1429 5e5c9c-5e5c9f 1389->1429 1390->1388 1406 5e5b6f-5e5b71 1394->1406 1407 5e5ba8-5e5bba 1394->1407 1395->1394 1409 5e5b95-5e5b9e call 5e542e 1406->1409 1410 5e5b73-5e5b78 1406->1410 1412 5e5bbc-5e5bc2 1407->1412 1413 5e5c02-5e5c23 WriteFile 1407->1413 1428 5e5ba3-5e5ba6 1409->1428 1416 5e5b7e-5e5b8b call 5e55e1 1410->1416 1417 5e5c6c-5e5c7e 1410->1417 1414 5e5bc4-5e5bc7 1412->1414 1415 5e5bf2-5e5c00 call 5e56c4 1412->1415 1420 5e5c2e 1413->1420 1421 5e5c25-5e5c2b GetLastError 1413->1421 1422 5e5bc9-5e5bcc 1414->1422 1423 5e5be2-5e5bf0 call 5e5891 1414->1423 1415->1428 1438 5e5b8e-5e5b90 1416->1438 1426 5e5c89-5e5c99 call 5df2d9 call 5df2c6 1417->1426 1427 5e5c80-5e5c83 1417->1427 1430 5e5c31-5e5c3c 1420->1430 1421->1420 1422->1417 1431 5e5bd2-5e5be0 call 5e57a3 1422->1431 1423->1428 1426->1429 1427->1426 1436 5e5c85-5e5c87 1427->1436 1428->1438 1432 5e5ca4 1429->1432 1439 5e5c3e-5e5c43 1430->1439 1440 5e5ca1 1430->1440 1431->1428 1432->1381 1436->1432 1438->1430 1441 5e5c69 1439->1441 1442 5e5c45-5e5c4a 1439->1442 1440->1432 1441->1417 1447 5e5c4c-5e5c5e call 5df2d9 call 5df2c6 1442->1447 1448 5e5c60-5e5c67 call 5df2a3 1442->1448 1447->1429 1448->1429
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: JO[
                                                                            • API String ID: 0-152308402
                                                                            • Opcode ID: a33ba44f3325395ad357c275b2afd832cac89c83dff7f27e365d33c602ae26bf
                                                                            • Instruction ID: 9c7688def9c48527339544145a73db66fae2cb2548ef2967944a8fc22c06e055
                                                                            • Opcode Fuzzy Hash: a33ba44f3325395ad357c275b2afd832cac89c83dff7f27e365d33c602ae26bf
                                                                            • Instruction Fuzzy Hash: 3951F875D0064A9FCB289FAACC49FAE7FB8FF45318F24045AF446A7291E6309D01CB61

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1457 fe2fc0-fe30d7 call fe0be0 call fe2eb0 CreateFileW 1464 fe30de-fe30ee 1457->1464 1465 fe30d9 1457->1465 1468 fe30f5-fe310f VirtualAlloc 1464->1468 1469 fe30f0 1464->1469 1466 fe31ab-fe31b0 1465->1466 1470 fe3116-fe312d ReadFile 1468->1470 1471 fe3111 1468->1471 1469->1466 1472 fe312f 1470->1472 1473 fe3131-fe3146 call fe1c50 1470->1473 1471->1466 1472->1466 1475 fe314b-fe3185 call fe2ef0 call fe1eb0 1473->1475 1480 fe3187-fe319c call fe2f40 1475->1480 1481 fe31a1-fe31a9 1475->1481 1480->1481 1481->1466
                                                                            APIs
                                                                              • Part of subcall function 00FE2EB0: Sleep.KERNELBASE(000001F4), ref: 00FE2EC1
                                                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00FE30CD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1692154303.0000000000FE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fe0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFileSleep
                                                                            • String ID: P51NUY175B2
                                                                            • API String ID: 2694422964-458732679
                                                                            • Opcode ID: f60684611b95369855ce2c3c0ba4f2d01dd250ff6e5bde6c27f0f8e302d1fee4
                                                                            • Instruction ID: b15eea7b2cf7badfe3cccaf1501cd7f788b8daf2da09c54a005703926922717f
                                                                            • Opcode Fuzzy Hash: f60684611b95369855ce2c3c0ba4f2d01dd250ff6e5bde6c27f0f8e302d1fee4
                                                                            • Instruction Fuzzy Hash: 76518131D14289DAEF10DBA5C819BEFB779AF48300F1045A9A608BB2C0D7B91B45DBA5
                                                                            APIs
                                                                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,005B3B0F,SwapMouseButtons,00000004,?), ref: 005B3B40
                                                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,005B3B0F,SwapMouseButtons,00000004,?), ref: 005B3B61
                                                                            • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,005B3B0F,SwapMouseButtons,00000004,?), ref: 005B3B83
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID: Control Panel\Mouse
                                                                            • API String ID: 3677997916-824357125
                                                                            • Opcode ID: bfc4cb6cc7797dd89d5c126ca85ad88c6246fae5f49aaa46a2306c13473e1633
                                                                            • Instruction ID: 2894d3ac31f39a213c669e60fac9abbe6f94e74a0b4aa77d9930032cdf2ccb8e
                                                                            • Opcode Fuzzy Hash: bfc4cb6cc7797dd89d5c126ca85ad88c6246fae5f49aaa46a2306c13473e1633
                                                                            • Instruction Fuzzy Hash: B0112AB5511208FFDB208FA9DC44AEEBBB8FF05754B104959A805E7214E631AE409760
                                                                            APIs
                                                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 005F33A2
                                                                              • Part of subcall function 005B6B57: _wcslen.LIBCMT ref: 005B6B6A
                                                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 005B3A04
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: IconLoadNotifyShell_String_wcslen
                                                                            • String ID: Line:
                                                                            • API String ID: 2289894680-1585850449
                                                                            • Opcode ID: 7780c9b712f68f50d66a700d3e0f04ec2c8ed270303b5d30a5a98affc170dc0b
                                                                            • Instruction ID: 83fd8603a8cdc0d59878300475c5516ea2f97d641c3cf293d50bec4be5ebfc08
                                                                            • Opcode Fuzzy Hash: 7780c9b712f68f50d66a700d3e0f04ec2c8ed270303b5d30a5a98affc170dc0b
                                                                            • Instruction Fuzzy Hash: A531D471408305ABD325EB20DC49BEBBBDDBB81710F104A2AF59993191EB74AA49C7C2
                                                                            APIs
                                                                            • GetOpenFileNameW.COMDLG32(?), ref: 005F2C8C
                                                                              • Part of subcall function 005B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005B3A97,?,?,005B2E7F,?,?,?,00000000), ref: 005B3AC2
                                                                              • Part of subcall function 005B2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005B2DC4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Name$Path$FileFullLongOpen
                                                                            • String ID: X$`eg
                                                                            • API String ID: 779396738-1654319943
                                                                            • Opcode ID: d52692412a67fc2accdc91766b71066ac288f11ec42d6401770fdb8e983b4453
                                                                            • Instruction ID: f9a97f6e87c4847d6125d5466dd6e8b49088bf6e60971a2e904d34b78dc9bd58
                                                                            • Opcode Fuzzy Hash: d52692412a67fc2accdc91766b71066ac288f11ec42d6401770fdb8e983b4453
                                                                            • Instruction Fuzzy Hash: B9218471A002589BDB019F94C8497EE7FFDBF89714F008059E505A7241DBB869498F61
                                                                            APIs
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 005D0668
                                                                              • Part of subcall function 005D32A4: RaiseException.KERNEL32(?,?,?,005D068A,?,00681444,?,?,?,?,?,?,005D068A,005B1129,00678738,005B1129), ref: 005D3304
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 005D0685
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throw$ExceptionRaise
                                                                            • String ID: Unknown exception
                                                                            • API String ID: 3476068407-410509341
                                                                            • Opcode ID: 0ccef843256d54d65f7fca17f78767a18f67fbbd1f3abc81f4b791e7b099d4e8
                                                                            • Instruction ID: b6c737b71f86b4baf340c54b5f84d36e2d06348932c3b65ab82a5bb054ca72b9
                                                                            • Opcode Fuzzy Hash: 0ccef843256d54d65f7fca17f78767a18f67fbbd1f3abc81f4b791e7b099d4e8
                                                                            • Instruction Fuzzy Hash: E4F0A43490020ABB8B20BAACE84EE5D7F6D7E80350B604537B814966D1EF71DA55CA81
                                                                            APIs
                                                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 00FE1C25
                                                                            • ExitProcess.KERNEL32(00000000), ref: 00FE1C44
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1692154303.0000000000FE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fe0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CreateExit
                                                                            • String ID: D
                                                                            • API String ID: 126409537-2746444292
                                                                            • Opcode ID: 5eb2aae7a9647d9e2c45f82c1b7c95c0f5ecba5966e3f1c76f424d9cb9e516ac
                                                                            • Instruction ID: 823a5731f34fa8d8fa756a8b93a7f11b61c6209f200a91597860d11659de944c
                                                                            • Opcode Fuzzy Hash: 5eb2aae7a9647d9e2c45f82c1b7c95c0f5ecba5966e3f1c76f424d9cb9e516ac
                                                                            • Instruction Fuzzy Hash: FAF0EC7694024CABDB64DFE5CC49FEE777CBF44701F108508BA0A9A180DA7896089B61
                                                                            APIs
                                                                            • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0062302F
                                                                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00623044
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Temp$FileNamePath
                                                                            • String ID: aut
                                                                            • API String ID: 3285503233-3010740371
                                                                            • Opcode ID: b7281d55ac4ba940f69aadb3475a524c8b888f0476051d549b3e066af3f9ded5
                                                                            • Instruction ID: 300b1482b617f51918ef0d36690cedb7d69979db92fa0be1b1ff67c8a7dae012
                                                                            • Opcode Fuzzy Hash: b7281d55ac4ba940f69aadb3475a524c8b888f0476051d549b3e066af3f9ded5
                                                                            • Instruction Fuzzy Hash: D3D05E7650132867DB60A7A4AC0EFCB3A6CDB05760F0002A1B655E21A1DAF09A84CAD4
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 006382F5
                                                                            • TerminateProcess.KERNEL32(00000000), ref: 006382FC
                                                                            • FreeLibrary.KERNEL32(?,?,?,?), ref: 006384DD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentFreeLibraryTerminate
                                                                            • String ID:
                                                                            • API String ID: 146820519-0
                                                                            • Opcode ID: 6cc262d897c998371230c50aef2920ca6c0fa379a32f5f6e5a36c995b2f1eb7e
                                                                            • Instruction ID: c5541893a7217df4b98f895b6aaefc1b1d843def3deae06074998e27b8c67a7d
                                                                            • Opcode Fuzzy Hash: 6cc262d897c998371230c50aef2920ca6c0fa379a32f5f6e5a36c995b2f1eb7e
                                                                            • Instruction Fuzzy Hash: A1125A719083019FC714DF28C484BAABBE6BF85318F14895DF8898B352DB31E945CF92
                                                                            APIs
                                                                              • Part of subcall function 005B1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 005B1BF4
                                                                              • Part of subcall function 005B1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 005B1BFC
                                                                              • Part of subcall function 005B1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 005B1C07
                                                                              • Part of subcall function 005B1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 005B1C12
                                                                              • Part of subcall function 005B1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 005B1C1A
                                                                              • Part of subcall function 005B1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 005B1C22
                                                                              • Part of subcall function 005B1B4A: RegisterWindowMessageW.USER32(00000004,?,005B12C4), ref: 005B1BA2
                                                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 005B136A
                                                                            • OleInitialize.OLE32 ref: 005B1388
                                                                            • CloseHandle.KERNEL32(00000000,00000000), ref: 005F24AB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                            • String ID:
                                                                            • API String ID: 1986988660-0
                                                                            • Opcode ID: 2435808457363fd4a5e43190e1478ced7f505be93af48b452fabad4b49673c2c
                                                                            • Instruction ID: 979e9d635381fa704715a237b4c7645afb5109e6459c14abc8ee736bf84d6f06
                                                                            • Opcode Fuzzy Hash: 2435808457363fd4a5e43190e1478ced7f505be93af48b452fabad4b49673c2c
                                                                            • Instruction Fuzzy Hash: 9671ACF4911201AFC384EF79E85A6953EEBBB8B354754A32AD01ADF361EB3054438F46
                                                                            APIs
                                                                            • CloseHandle.KERNELBASE(00000000,00000000,?,?,005E85CC,?,00678CC8,0000000C), ref: 005E8704
                                                                            • GetLastError.KERNEL32(?,005E85CC,?,00678CC8,0000000C), ref: 005E870E
                                                                            • __dosmaperr.LIBCMT ref: 005E8739
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CloseErrorHandleLast__dosmaperr
                                                                            • String ID:
                                                                            • API String ID: 2583163307-0
                                                                            • Opcode ID: 3ba2ae6c77cc9e22a7198c5c2b7cd7e2e59667b565c2d36947a84f8e9d0c6ae0
                                                                            • Instruction ID: d226faa7e1effe396b9e760c3cd6e87c14668922fa321b04ae23c364b45ea368
                                                                            • Opcode Fuzzy Hash: 3ba2ae6c77cc9e22a7198c5c2b7cd7e2e59667b565c2d36947a84f8e9d0c6ae0
                                                                            • Instruction Fuzzy Hash: 4D01C2326052E026D77C6736584973E2F457BD2778F340509F88C8B1D2DD61CC80C250
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00622CD4,?,?,?,00000004,00000001), ref: 00622FF2
                                                                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00622CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00623006
                                                                            • CloseHandle.KERNEL32(00000000,?,00622CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0062300D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: File$CloseCreateHandleTime
                                                                            • String ID:
                                                                            • API String ID: 3397143404-0
                                                                            • Opcode ID: f5bd3f94ac657fb38ccb2caf5776d6d58293492ad546f47073397e323d3ff185
                                                                            • Instruction ID: c5748566341b0a6fdb670b64ad44fcbdbed5f186b4346bd46a0e76a8ca0eb250
                                                                            • Opcode Fuzzy Hash: f5bd3f94ac657fb38ccb2caf5776d6d58293492ad546f47073397e323d3ff185
                                                                            • Instruction Fuzzy Hash: A9E0863628162077D7311755BC0DFCB3A1ED787B75F104210F759762D046A0650146A8
                                                                            APIs
                                                                            • __Init_thread_footer.LIBCMT ref: 005C17F6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Init_thread_footer
                                                                            • String ID: CALL
                                                                            • API String ID: 1385522511-4196123274
                                                                            • Opcode ID: 8ea6fe03919e5e634c2545f2c2599d503f2714077b16eb2bf9390313340296d8
                                                                            • Instruction ID: 20a17dfc514cc7d06f22db326dbf5de1d353cbff3bb9cdab8f5f7c0ba51f5730
                                                                            • Opcode Fuzzy Hash: 8ea6fe03919e5e634c2545f2c2599d503f2714077b16eb2bf9390313340296d8
                                                                            • Instruction Fuzzy Hash: 9A228A706086029FC718DF54C894F6ABBF2BF86314F24891DF4968B3A2D771E851CB96
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 00626F6B
                                                                              • Part of subcall function 005B4ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4EFD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad_wcslen
                                                                            • String ID: >>>AUTOIT SCRIPT<<<
                                                                            • API String ID: 3312870042-2806939583
                                                                            • Opcode ID: 9962baeac519aedf5b7d497ed32125252dd2fa87d150d6c18ea4956da9babb33
                                                                            • Instruction ID: dcb0d19afddc53894c1a5f76fff09886e92199256364432e1ca5f5ad818a2c0a
                                                                            • Opcode Fuzzy Hash: 9962baeac519aedf5b7d497ed32125252dd2fa87d150d6c18ea4956da9babb33
                                                                            • Instruction Fuzzy Hash: 11B15B311086128FCB14EF24D4959EABBE6BFD4300F14895DF496972A2EB30FD49CB92
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock
                                                                            • String ID: EA06
                                                                            • API String ID: 2638373210-3962188686
                                                                            • Opcode ID: 9d04569ff6d6d29ba14582ba1bcfe381f7893f8990fe138f0fcb8143db9f6fa8
                                                                            • Instruction ID: 910feb73ff03bab0d0bdef8188e187adb76057ac78608d20ac031c10d4288edf
                                                                            • Opcode Fuzzy Hash: 9d04569ff6d6d29ba14582ba1bcfe381f7893f8990fe138f0fcb8143db9f6fa8
                                                                            • Instruction Fuzzy Hash: 2401B9719042597EDF28D7A8C85AFEE7BF8DB05301F00855BF152E62C1E574E6088B60
                                                                            APIs
                                                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 005B3908
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_
                                                                            • String ID:
                                                                            • API String ID: 1144537725-0
                                                                            • Opcode ID: 389ce62da1e18f5468e1385bb12fc8fbd61d1fe1db041c5cfbb7ce700f65f299
                                                                            • Instruction ID: 1a3ce6851f3cf849fd52b572cb88896ce64829a6e1e4ca3bf5133f643068f889
                                                                            • Opcode Fuzzy Hash: 389ce62da1e18f5468e1385bb12fc8fbd61d1fe1db041c5cfbb7ce700f65f299
                                                                            • Instruction Fuzzy Hash: 9A318D706057019FD761DF24D8847DBBBE8FB4A718F00092EF69A97280E771BA44CB52
                                                                            APIs
                                                                              • Part of subcall function 00FE14C0: GetFileAttributesW.KERNELBASE(?), ref: 00FE14CB
                                                                            • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00FE1DAC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1692154303.0000000000FE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fe0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesCreateDirectoryFile
                                                                            • String ID:
                                                                            • API String ID: 3401506121-0
                                                                            • Opcode ID: f1fe0256e00fa941666a8de88ce44781d6668b5ac1c373e12979c0895c762976
                                                                            • Instruction ID: 1a7b362bfb18e7580c9122cab33b3b51fc128d6bb481c561181821a5c0c59b3f
                                                                            • Opcode Fuzzy Hash: f1fe0256e00fa941666a8de88ce44781d6668b5ac1c373e12979c0895c762976
                                                                            • Instruction Fuzzy Hash: E5516F31A1024896EF14DFA1D844BEF737AFF58700F00456DFA09E7290EB759A85CBA5
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ProtectVirtual
                                                                            • String ID:
                                                                            • API String ID: 544645111-0
                                                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                            • Instruction ID: a972fb22154d24c4b76d46faf6e49bebce0ed3f17d3727be92d34a6d361d2d7e
                                                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                            • Instruction Fuzzy Hash: 6331D175A041099FC718CF99D480E69FBA6FF49310B6486A9E80ACF656D731EDC1CBD0
                                                                            APIs
                                                                              • Part of subcall function 005B4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,005B4EDD,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4E9C
                                                                              • Part of subcall function 005B4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005B4EAE
                                                                              • Part of subcall function 005B4E90: FreeLibrary.KERNEL32(00000000,?,?,005B4EDD,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4EC0
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4EFD
                                                                              • Part of subcall function 005B4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,005F3CDE,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4E62
                                                                              • Part of subcall function 005B4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005B4E74
                                                                              • Part of subcall function 005B4E59: FreeLibrary.KERNEL32(00000000,?,?,005F3CDE,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4E87
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Load$AddressFreeProc
                                                                            • String ID:
                                                                            • API String ID: 2632591731-0
                                                                            • Opcode ID: cab1813da1c620c29c80e216c39d1dbe04c450daf78cf8c854f2a0dd8a569b33
                                                                            • Instruction ID: 351592e16f2f858ea011c515d5e9cf2ac83eb87927923c7f2de6a024c0181ef1
                                                                            • Opcode Fuzzy Hash: cab1813da1c620c29c80e216c39d1dbe04c450daf78cf8c854f2a0dd8a569b33
                                                                            • Instruction Fuzzy Hash: 79119432610606AADF24BB64DC1ABFD7BA5BF80710F10442DF542A72D2EE74EA459B50
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: __wsopen_s
                                                                            • String ID:
                                                                            • API String ID: 3347428461-0
                                                                            • Opcode ID: 49bec75a45af5288f664f1bb15f0630be09ddb656bb8e1103fc2b0ad22e9a7ab
                                                                            • Instruction ID: 9d80e9da4daef87c59e1f3e76d4a87d3659b82da63bf500535b0a2a3f1d43ffb
                                                                            • Opcode Fuzzy Hash: 49bec75a45af5288f664f1bb15f0630be09ddb656bb8e1103fc2b0ad22e9a7ab
                                                                            • Instruction Fuzzy Hash: 2611487190410AAFCF09DF59E9409AA7BF5FF48314F144099F808AB352DA31DA11CBA4
                                                                            APIs
                                                                              • Part of subcall function 005E4C7D: RtlAllocateHeap.NTDLL(00000008,005B1129,00000000,?,005E2E29,00000001,00000364,?,?,?,005DF2DE,005E3863,00681444,?,005CFDF5,?), ref: 005E4CBE
                                                                            • _free.LIBCMT ref: 005E506C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap_free
                                                                            • String ID:
                                                                            • API String ID: 614378929-0
                                                                            • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                            • Instruction ID: 95963d4098f95e59853f4fb068d4315910594c40beb9a906804096327ca9a9b3
                                                                            • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                            • Instruction Fuzzy Hash: 9F0126722047456BE3258F669889A5AFFECFB89370F65051DF1C4832C0EA70A805C6B4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                            • Instruction ID: 50e446ac714a88d3901e83afd664ca69fea10a57ffca8a1f561c24e4461971b5
                                                                            • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                            • Instruction Fuzzy Hash: 94F0D632510A1596C6353A6EAC0EB563F98BF92334F10071BF465963D2DB74E802C6A5
                                                                            APIs
                                                                            • RtlAllocateHeap.NTDLL(00000008,005B1129,00000000,?,005E2E29,00000001,00000364,?,?,?,005DF2DE,005E3863,00681444,?,005CFDF5,?), ref: 005E4CBE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: 49b8d06e64f34f7da0072f057f497400298b205a179001f74afb31aac80c9f03
                                                                            • Instruction ID: 1878a1be53891791b64b330682cde9b36ee3da15ff31d156a15c76bafbfc32a6
                                                                            • Opcode Fuzzy Hash: 49b8d06e64f34f7da0072f057f497400298b205a179001f74afb31aac80c9f03
                                                                            • Instruction Fuzzy Hash: F0F0BB3150316567DB255F679C09B5A3F49BF81760B244522B85D97791CA30DC019ED0
                                                                            APIs
                                                                            • RtlAllocateHeap.NTDLL(00000000,?,00681444,?,005CFDF5,?,?,005BA976,00000010,00681440,005B13FC,?,005B13C6,?,005B1129), ref: 005E3852
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: 7bbf6343aae027b961df34d09cf667d083e4698ed1dccbb8fac77df98e25fac3
                                                                            • Instruction ID: 059a9bcf7dc531364eae9d66d3f440b2c00a077a81f112fe9c70fbb018469d09
                                                                            • Opcode Fuzzy Hash: 7bbf6343aae027b961df34d09cf667d083e4698ed1dccbb8fac77df98e25fac3
                                                                            • Instruction Fuzzy Hash: 41E0E53110B2A577D735266B9C0DB9A3F49BBC27B0F050222FCC597690CB20DD0186E1
                                                                            APIs
                                                                            • FreeLibrary.KERNEL32(?,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4F6D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID:
                                                                            • API String ID: 3664257935-0
                                                                            • Opcode ID: 9fcc7354ff9db6a9bef2839c1e8e49dd19f808ca067021e6bb75e6aac523c288
                                                                            • Instruction ID: a7f0b80c67d5192823b341d549ceb65086930cd57bf45af6ccd9718c2e31c49c
                                                                            • Opcode Fuzzy Hash: 9fcc7354ff9db6a9bef2839c1e8e49dd19f808ca067021e6bb75e6aac523c288
                                                                            • Instruction Fuzzy Hash: 9FF01571505792CFDB349F64E4948A2BBE4BF14329320896EE1EA83722C731A844DF10
                                                                            APIs
                                                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005B2DC4
                                                                              • Part of subcall function 005B6B57: _wcslen.LIBCMT ref: 005B6B6A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: LongNamePath_wcslen
                                                                            • String ID:
                                                                            • API String ID: 541455249-0
                                                                            • Opcode ID: 1bef4e16d276ea5b634cf1da8f3d54dc8a5aab442ccf9032226dde817ead13f6
                                                                            • Instruction ID: 9b9f128e7e4e9190486c87760a955cd9717705d786b6f8238971eb4437e4d55c
                                                                            • Opcode Fuzzy Hash: 1bef4e16d276ea5b634cf1da8f3d54dc8a5aab442ccf9032226dde817ead13f6
                                                                            • Instruction Fuzzy Hash: FCE0CD766011245BC71092589C09FEA77EDEFC9790F040071FD09D7248D9A4AD808550
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock
                                                                            • String ID:
                                                                            • API String ID: 2638373210-0
                                                                            • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                            • Instruction ID: 4f8e33344fcffa0f5aa1702ef6ff4c7eaa4268d98856def3c1fbcd556ca2facd
                                                                            • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                            • Instruction Fuzzy Hash: 74E0DFB1209B105FCF386E28A8617F677E99F49300F00082EF69BC2352E57228418A0D
                                                                            APIs
                                                                              • Part of subcall function 005B3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 005B3908
                                                                              • Part of subcall function 005BD730: GetInputState.USER32 ref: 005BD807
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 005B2B6B
                                                                              • Part of subcall function 005B30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 005B314E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                            • String ID:
                                                                            • API String ID: 3667716007-0
                                                                            • Opcode ID: ffb62afbb71a79d0d74ebb2714df51271ae17f61ad43df7702c856b8f22fdd3f
                                                                            • Instruction ID: 66ce1bee2874f0c8cccd0d87c0747a4fc2d224bea94444d09bb858858b901c33
                                                                            • Opcode Fuzzy Hash: ffb62afbb71a79d0d74ebb2714df51271ae17f61ad43df7702c856b8f22fdd3f
                                                                            • Instruction Fuzzy Hash: 58E0863130424616C704BB74985A5FDAF9ABBD2351F40163EF14257163DE2566464362
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?), ref: 00FE14CB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1692154303.0000000000FE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fe0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                            • Instruction ID: b97bc65d580604cf7e817dff881f2c2e14c94fbdfb963027374cfdcdc815cc32
                                                                            • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                            • Instruction Fuzzy Hash: 94E08C31A0524CEBCB20CAEB8C04AAA73A8F706320F204664E806CB3C0D5309E40F614
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(00000000,00000000,?,005F0704,?,?,00000000,?,005F0704,00000000,0000000C), ref: 005F03B7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: 79d05b85ca7f5357ed3ac589e32f121c7663515f3a352089e43145cb20fdfc51
                                                                            • Instruction ID: f7fa88cb3fec2473a234189d9de8c6e3bdae8bb3f111740ab19182077e15c833
                                                                            • Opcode Fuzzy Hash: 79d05b85ca7f5357ed3ac589e32f121c7663515f3a352089e43145cb20fdfc51
                                                                            • Instruction Fuzzy Hash: 87D06C3204010DBBDF028F84DD06EDA3BAAFB48714F014000BE1856120C732E821AB90
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?), ref: 00FE149B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1692154303.0000000000FE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fe0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                            • Instruction ID: 60efdd26be07f309ffb4ba54e60e768d6e3c1720e33b8c62f2683106fe174d0b
                                                                            • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                            • Instruction Fuzzy Hash: 1AD05E3190520CABCB20CEA69804A9A73B8A705371F104754ED15833C0D5359940A690
                                                                            APIs
                                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 005B1CBC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: InfoParametersSystem
                                                                            • String ID:
                                                                            • API String ID: 3098949447-0
                                                                            • Opcode ID: 13d5226052d76b8f93f3edcd3c916cd808de012dd7f3f2ce58f006115d02aa75
                                                                            • Instruction ID: b91a06e5515e76949857ba9f93115a2a8fef4b11d23d1223bf91d672fc872015
                                                                            • Opcode Fuzzy Hash: 13d5226052d76b8f93f3edcd3c916cd808de012dd7f3f2ce58f006115d02aa75
                                                                            • Instruction Fuzzy Hash: 2CC0923A2C0305BFF3188B80FC5AF54776BA349B10F04A101F709A96E3C3A22830EB51
                                                                            APIs
                                                                            • Sleep.KERNELBASE(000001F4), ref: 00FE2EC1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1692154303.0000000000FE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fe0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID:
                                                                            • API String ID: 3472027048-0
                                                                            • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                            • Instruction ID: d875cc8431e4eb53ec05408436ea9fd1b9d41f85500970d38d3f7a8e0a91c09e
                                                                            • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                            • Instruction Fuzzy Hash: B7E0BF7494010DEFDB00EFB4D5496DE7BB4EF04301F1005A1FD05D7680DB309E549A62
                                                                            APIs
                                                                            • Sleep.KERNELBASE(000001F4), ref: 00FE2EC1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1692154303.0000000000FE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fe0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID:
                                                                            • API String ID: 3472027048-0
                                                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                            • Instruction ID: 34d8c1583639aec0c3afebe31af961dd01d1076bb7f007cd3915876c996df328
                                                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                            • Instruction Fuzzy Hash: EAE0E67494010DDFDB00EFB4D54969E7FB4EF04301F100161FD01D2280DA309D509A62
                                                                            APIs
                                                                              • Part of subcall function 005C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005C9BB2
                                                                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0064961A
                                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0064965B
                                                                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0064969F
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006496C9
                                                                            • SendMessageW.USER32 ref: 006496F2
                                                                            • GetKeyState.USER32(00000011), ref: 0064978B
                                                                            • GetKeyState.USER32(00000009), ref: 00649798
                                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006497AE
                                                                            • GetKeyState.USER32(00000010), ref: 006497B8
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006497E9
                                                                            • SendMessageW.USER32 ref: 00649810
                                                                            • SendMessageW.USER32(?,00001030,?,00647E95), ref: 00649918
                                                                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0064992E
                                                                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00649941
                                                                            • SetCapture.USER32(?), ref: 0064994A
                                                                            • ClientToScreen.USER32(?,?), ref: 006499AF
                                                                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 006499BC
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006499D6
                                                                            • ReleaseCapture.USER32 ref: 006499E1
                                                                            • GetCursorPos.USER32(?), ref: 00649A19
                                                                            • ScreenToClient.USER32(?,?), ref: 00649A26
                                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00649A80
                                                                            • SendMessageW.USER32 ref: 00649AAE
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00649AEB
                                                                            • SendMessageW.USER32 ref: 00649B1A
                                                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00649B3B
                                                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00649B4A
                                                                            • GetCursorPos.USER32(?), ref: 00649B68
                                                                            • ScreenToClient.USER32(?,?), ref: 00649B75
                                                                            • GetParent.USER32(?), ref: 00649B93
                                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00649BFA
                                                                            • SendMessageW.USER32 ref: 00649C2B
                                                                            • ClientToScreen.USER32(?,?), ref: 00649C84
                                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00649CB4
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00649CDE
                                                                            • SendMessageW.USER32 ref: 00649D01
                                                                            • ClientToScreen.USER32(?,?), ref: 00649D4E
                                                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00649D82
                                                                              • Part of subcall function 005C9944: GetWindowLongW.USER32(?,000000EB), ref: 005C9952
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00649E05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                            • String ID: @GUI_DRAGID$F$p#h
                                                                            • API String ID: 3429851547-2824891623
                                                                            • Opcode ID: 568584074be23f5b26a333b6cd1f40accaaa2d76c53b8c2710a0df1c5b8e29dd
                                                                            • Instruction ID: 131b2c437e10bc3f581825fef585ca28b4a7072429025ab1b6011f6dfa11f687
                                                                            • Opcode Fuzzy Hash: 568584074be23f5b26a333b6cd1f40accaaa2d76c53b8c2710a0df1c5b8e29dd
                                                                            • Instruction Fuzzy Hash: 25427D34645201AFEB24CF24CC49EABBBE6FF4A320F154619F699873A1D731A851CF61
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 006448F3
                                                                            • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00644908
                                                                            • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00644927
                                                                            • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0064494B
                                                                            • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0064495C
                                                                            • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0064497B
                                                                            • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 006449AE
                                                                            • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 006449D4
                                                                            • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00644A0F
                                                                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00644A56
                                                                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00644A7E
                                                                            • IsMenu.USER32(?), ref: 00644A97
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00644AF2
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00644B20
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00644B94
                                                                            • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00644BE3
                                                                            • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00644C82
                                                                            • wsprintfW.USER32 ref: 00644CAE
                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00644CC9
                                                                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00644CF1
                                                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00644D13
                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00644D33
                                                                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00644D5A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                            • String ID: %d/%02d/%02d
                                                                            • API String ID: 4054740463-328681919
                                                                            • Opcode ID: 973c412049f58d6d1159d5863da101ad222a495ebc8f88612b3d7f4173410812
                                                                            • Instruction ID: 4ec6ea98abe476d82d61928be3c8ea5e35629a2c1b113794d943032bfa9406ac
                                                                            • Opcode Fuzzy Hash: 973c412049f58d6d1159d5863da101ad222a495ebc8f88612b3d7f4173410812
                                                                            • Instruction Fuzzy Hash: 0312DE71600215ABEB249F28CC4AFEE7BFAFF85710F104129F916EA2E1DB749941CB50
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 005CF998
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0060F474
                                                                            • IsIconic.USER32(00000000), ref: 0060F47D
                                                                            • ShowWindow.USER32(00000000,00000009), ref: 0060F48A
                                                                            • SetForegroundWindow.USER32(00000000), ref: 0060F494
                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0060F4AA
                                                                            • GetCurrentThreadId.KERNEL32 ref: 0060F4B1
                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0060F4BD
                                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0060F4CE
                                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0060F4D6
                                                                            • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0060F4DE
                                                                            • SetForegroundWindow.USER32(00000000), ref: 0060F4E1
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0060F4F6
                                                                            • keybd_event.USER32(00000012,00000000), ref: 0060F501
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0060F50B
                                                                            • keybd_event.USER32(00000012,00000000), ref: 0060F510
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0060F519
                                                                            • keybd_event.USER32(00000012,00000000), ref: 0060F51E
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0060F528
                                                                            • keybd_event.USER32(00000012,00000000), ref: 0060F52D
                                                                            • SetForegroundWindow.USER32(00000000), ref: 0060F530
                                                                            • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0060F557
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 4125248594-2988720461
                                                                            • Opcode ID: 0573fa05e14a93d7bc1bf66d077797c2b8800c2076d1ac70927b75144c660977
                                                                            • Instruction ID: 604dbe17dc82403f4224391c5de473bf733354e75996d308b3705c3f088c17da
                                                                            • Opcode Fuzzy Hash: 0573fa05e14a93d7bc1bf66d077797c2b8800c2076d1ac70927b75144c660977
                                                                            • Instruction Fuzzy Hash: 3731A675A81318BFEB356BB54C4AFBF7E6EEB45B60F101025FA00E62D1C7B05D10AA60
                                                                            APIs
                                                                              • Part of subcall function 006116C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0061170D
                                                                              • Part of subcall function 006116C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0061173A
                                                                              • Part of subcall function 006116C3: GetLastError.KERNEL32 ref: 0061174A
                                                                            • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00611286
                                                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 006112A8
                                                                            • CloseHandle.KERNEL32(?), ref: 006112B9
                                                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 006112D1
                                                                            • GetProcessWindowStation.USER32 ref: 006112EA
                                                                            • SetProcessWindowStation.USER32(00000000), ref: 006112F4
                                                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00611310
                                                                              • Part of subcall function 006110BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006111FC), ref: 006110D4
                                                                              • Part of subcall function 006110BF: CloseHandle.KERNEL32(?,?,006111FC), ref: 006110E9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                            • String ID: $default$winsta0$Zg
                                                                            • API String ID: 22674027-538764135
                                                                            • Opcode ID: 221f40009210838172f6d2e90c7a4899e034c56c823009957d34e7dfb9e403f1
                                                                            • Instruction ID: 98e5e03892fb0f49442c0344216003095549ee712e19653e69840efe02e74966
                                                                            • Opcode Fuzzy Hash: 221f40009210838172f6d2e90c7a4899e034c56c823009957d34e7dfb9e403f1
                                                                            • Instruction Fuzzy Hash: BC81C471900209AFDF219FA4DC49FEE7BBAFF06710F185129FA11EA250D7718984CB61
                                                                            APIs
                                                                              • Part of subcall function 006110F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00611114
                                                                              • Part of subcall function 006110F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00610B9B,?,?,?), ref: 00611120
                                                                              • Part of subcall function 006110F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00610B9B,?,?,?), ref: 0061112F
                                                                              • Part of subcall function 006110F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00610B9B,?,?,?), ref: 00611136
                                                                              • Part of subcall function 006110F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0061114D
                                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00610BCC
                                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00610C00
                                                                            • GetLengthSid.ADVAPI32(?), ref: 00610C17
                                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 00610C51
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00610C6D
                                                                            • GetLengthSid.ADVAPI32(?), ref: 00610C84
                                                                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00610C8C
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 00610C93
                                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00610CB4
                                                                            • CopySid.ADVAPI32(00000000), ref: 00610CBB
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00610CEA
                                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00610D0C
                                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00610D1E
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00610D45
                                                                            • HeapFree.KERNEL32(00000000), ref: 00610D4C
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00610D55
                                                                            • HeapFree.KERNEL32(00000000), ref: 00610D5C
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00610D65
                                                                            • HeapFree.KERNEL32(00000000), ref: 00610D6C
                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00610D78
                                                                            • HeapFree.KERNEL32(00000000), ref: 00610D7F
                                                                              • Part of subcall function 00611193: GetProcessHeap.KERNEL32(00000008,00610BB1,?,00000000,?,00610BB1,?), ref: 006111A1
                                                                              • Part of subcall function 00611193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00610BB1,?), ref: 006111A8
                                                                              • Part of subcall function 00611193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00610BB1,?), ref: 006111B7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                            • String ID:
                                                                            • API String ID: 4175595110-0
                                                                            • Opcode ID: 2928a26a30bde9675a778bf02169aa60549f5440d01f1c03b0564c5196eada56
                                                                            • Instruction ID: 838f9f5a136b06d2f4264671a74f3389a46b872b432610c3210d0db28cdde0ee
                                                                            • Opcode Fuzzy Hash: 2928a26a30bde9675a778bf02169aa60549f5440d01f1c03b0564c5196eada56
                                                                            • Instruction Fuzzy Hash: 3D717F75D0120AABEF10DFA4DC44BEEBBBABF09710F084515E914A7251D7B1A985CB60
                                                                            APIs
                                                                            • OpenClipboard.USER32(0064CC08), ref: 0062EB29
                                                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0062EB37
                                                                            • GetClipboardData.USER32(0000000D), ref: 0062EB43
                                                                            • CloseClipboard.USER32 ref: 0062EB4F
                                                                            • GlobalLock.KERNEL32(00000000), ref: 0062EB87
                                                                            • CloseClipboard.USER32 ref: 0062EB91
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0062EBBC
                                                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 0062EBC9
                                                                            • GetClipboardData.USER32(00000001), ref: 0062EBD1
                                                                            • GlobalLock.KERNEL32(00000000), ref: 0062EBE2
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0062EC22
                                                                            • IsClipboardFormatAvailable.USER32(0000000F), ref: 0062EC38
                                                                            • GetClipboardData.USER32(0000000F), ref: 0062EC44
                                                                            • GlobalLock.KERNEL32(00000000), ref: 0062EC55
                                                                            • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0062EC77
                                                                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0062EC94
                                                                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0062ECD2
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0062ECF3
                                                                            • CountClipboardFormats.USER32 ref: 0062ED14
                                                                            • CloseClipboard.USER32 ref: 0062ED59
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                            • String ID:
                                                                            • API String ID: 420908878-0
                                                                            • Opcode ID: e1ed84b95be17a9627b030f3a1597d9c6ee40603f34c1dad3dcc33209c3f8b86
                                                                            • Instruction ID: d959cd8a616b7c6035e364d7795eeea14f5eb3d43adf337d22ba5bebbb22b0ee
                                                                            • Opcode Fuzzy Hash: e1ed84b95be17a9627b030f3a1597d9c6ee40603f34c1dad3dcc33209c3f8b86
                                                                            • Instruction Fuzzy Hash: E161C0382046029FD300EF24E888FAA7BA6BF85714F14552DF456973A1CB72ED45CF62
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 006269BE
                                                                            • FindClose.KERNEL32(00000000), ref: 00626A12
                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00626A4E
                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00626A75
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00626AB2
                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00626ADF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                            • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                            • API String ID: 3830820486-3289030164
                                                                            • Opcode ID: 1231e2f8810a7ab680a805d941c532f0022cef3c27ae51f2ef0cff9479184d57
                                                                            • Instruction ID: a0800168532ced2035178273d6e6f8492475a669e20bab0ba40bded77e6dce91
                                                                            • Opcode Fuzzy Hash: 1231e2f8810a7ab680a805d941c532f0022cef3c27ae51f2ef0cff9479184d57
                                                                            • Instruction Fuzzy Hash: AFD13E71508305AFC710EBA4D885EABBBEDBFC8704F04491DF589D6291EB74EA44CB62
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00629663
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 006296A1
                                                                            • SetFileAttributesW.KERNEL32(?,?), ref: 006296BB
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 006296D3
                                                                            • FindClose.KERNEL32(00000000), ref: 006296DE
                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 006296FA
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0062974A
                                                                            • SetCurrentDirectoryW.KERNEL32(00676B7C), ref: 00629768
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00629772
                                                                            • FindClose.KERNEL32(00000000), ref: 0062977F
                                                                            • FindClose.KERNEL32(00000000), ref: 0062978F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                            • String ID: *.*
                                                                            • API String ID: 1409584000-438819550
                                                                            • Opcode ID: 6e0b6d5338436e76eae34a9fbbd110cf3e6515199c5d47482deef37330cc559c
                                                                            • Instruction ID: ac6653e145055c2612aef29780be710adfa9982cf5edbcaf7e30ceb51818a9d9
                                                                            • Opcode Fuzzy Hash: 6e0b6d5338436e76eae34a9fbbd110cf3e6515199c5d47482deef37330cc559c
                                                                            • Instruction Fuzzy Hash: C131D835501A2A6FDF149FB4EC48ADE77AEAF8A320F104156F505E2290D770DE44CE24
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 006297BE
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00629819
                                                                            • FindClose.KERNEL32(00000000), ref: 00629824
                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00629840
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00629890
                                                                            • SetCurrentDirectoryW.KERNEL32(00676B7C), ref: 006298AE
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 006298B8
                                                                            • FindClose.KERNEL32(00000000), ref: 006298C5
                                                                            • FindClose.KERNEL32(00000000), ref: 006298D5
                                                                              • Part of subcall function 0061DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0061DB00
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                            • String ID: *.*
                                                                            • API String ID: 2640511053-438819550
                                                                            • Opcode ID: c507ac00db2480117132b1c8abe8b2c788fd3873ab29886e847a23aae11d74e7
                                                                            • Instruction ID: e3d767cb63a63d3c9ecb083df5a61fe397df5f9666b2e5178433adb1bb4d332e
                                                                            • Opcode Fuzzy Hash: c507ac00db2480117132b1c8abe8b2c788fd3873ab29886e847a23aae11d74e7
                                                                            • Instruction Fuzzy Hash: EB31D335501A296EDB24AFB4EC48ADE37BEAF87330F184556E914A22D0DB74DA448E34
                                                                            APIs
                                                                            • GetLocalTime.KERNEL32(?), ref: 00628257
                                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00628267
                                                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00628273
                                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00628310
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00628324
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00628356
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0062838C
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00628395
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectoryTime$File$Local$System
                                                                            • String ID: *.*
                                                                            • API String ID: 1464919966-438819550
                                                                            • Opcode ID: 2066896413c72cdd71fd66f9a9646926aa59c05e532f7089804da2f81f202bcc
                                                                            • Instruction ID: 5de2bb83caac68e9f5c8e9c637cdea500e4f3858be74f1ceffe79cf0ca8ca0cb
                                                                            • Opcode Fuzzy Hash: 2066896413c72cdd71fd66f9a9646926aa59c05e532f7089804da2f81f202bcc
                                                                            • Instruction Fuzzy Hash: D2618A725047169FCB10EF60D8449AEB7EAFF89310F04881EF98983251EB31EA45CF92
                                                                            APIs
                                                                              • Part of subcall function 005B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005B3A97,?,?,005B2E7F,?,?,?,00000000), ref: 005B3AC2
                                                                              • Part of subcall function 0061E199: GetFileAttributesW.KERNEL32(?,0061CF95), ref: 0061E19A
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0061D122
                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0061D1DD
                                                                            • MoveFileW.KERNEL32(?,?), ref: 0061D1F0
                                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 0061D20D
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0061D237
                                                                              • Part of subcall function 0061D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0061D21C,?,?), ref: 0061D2B2
                                                                            • FindClose.KERNEL32(00000000,?,?,?), ref: 0061D253
                                                                            • FindClose.KERNEL32(00000000), ref: 0061D264
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                            • String ID: \*.*
                                                                            • API String ID: 1946585618-1173974218
                                                                            • Opcode ID: f233b4d560b4b81f12a381cd6cb926e2436aa6d1d01db72ff5a079b15bbcfe40
                                                                            • Instruction ID: 3bb77c0330b5eb209b6ac56cd11cd98d904ecf5eb3e91a23bf6235280843b06b
                                                                            • Opcode Fuzzy Hash: f233b4d560b4b81f12a381cd6cb926e2436aa6d1d01db72ff5a079b15bbcfe40
                                                                            • Instruction Fuzzy Hash: 16615D3180110EABCF05EBE0C9969EDBBB6BF95300F284169E51177291EB31AF49DB60
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                            • String ID:
                                                                            • API String ID: 1737998785-0
                                                                            • Opcode ID: 2b17afa329914d34e6def1d2986a93fa7fd8b78e35a1d2ed67973289ce68026b
                                                                            • Instruction ID: 876c227ba128e582a7e97ec52127f8eaca56a094625c1969ebd152d3aec21eaf
                                                                            • Opcode Fuzzy Hash: 2b17afa329914d34e6def1d2986a93fa7fd8b78e35a1d2ed67973289ce68026b
                                                                            • Instruction Fuzzy Hash: 2341D035204A21AFD320CF15E848B59BBE2FF45328F15C0A9E4558B762C776EC42CF90
                                                                            APIs
                                                                              • Part of subcall function 006116C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0061170D
                                                                              • Part of subcall function 006116C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0061173A
                                                                              • Part of subcall function 006116C3: GetLastError.KERNEL32 ref: 0061174A
                                                                            • ExitWindowsEx.USER32(?,00000000), ref: 0061E932
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                            • String ID: $ $@$SeShutdownPrivilege
                                                                            • API String ID: 2234035333-3163812486
                                                                            • Opcode ID: 13597afbb8e605f4647540d907d46b90e6f1ec00353512381703461ed72572a8
                                                                            • Instruction ID: 3606ea00a4809f88dbb02759f03950a261f959c3eb9a3359e0278d0ddce70d4c
                                                                            • Opcode Fuzzy Hash: 13597afbb8e605f4647540d907d46b90e6f1ec00353512381703461ed72572a8
                                                                            • Instruction Fuzzy Hash: FE012632A10311ABEB9422B49C86FFF725E9B18751F1D4C26FD03E22D1D5A69CC081E4
                                                                            APIs
                                                                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00631276
                                                                            • WSAGetLastError.WSOCK32 ref: 00631283
                                                                            • bind.WSOCK32(00000000,?,00000010), ref: 006312BA
                                                                            • WSAGetLastError.WSOCK32 ref: 006312C5
                                                                            • closesocket.WSOCK32(00000000), ref: 006312F4
                                                                            • listen.WSOCK32(00000000,00000005), ref: 00631303
                                                                            • WSAGetLastError.WSOCK32 ref: 0063130D
                                                                            • closesocket.WSOCK32(00000000), ref: 0063133C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$closesocket$bindlistensocket
                                                                            • String ID:
                                                                            • API String ID: 540024437-0
                                                                            • Opcode ID: 9650df80f4d9f4382531c318294d91a2542c0e3690e65c0ff4ef51d7c56d15b4
                                                                            • Instruction ID: 37bad498f45382c5f469cc884521e2a1246a12562b4e71a17a07888a29977008
                                                                            • Opcode Fuzzy Hash: 9650df80f4d9f4382531c318294d91a2542c0e3690e65c0ff4ef51d7c56d15b4
                                                                            • Instruction Fuzzy Hash: 7C4161356001119FD710DF64C498BAABBE6BF87324F188198E8569F396C771ED82CBE1
                                                                            APIs
                                                                              • Part of subcall function 005B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005B3A97,?,?,005B2E7F,?,?,?,00000000), ref: 005B3AC2
                                                                              • Part of subcall function 0061E199: GetFileAttributesW.KERNEL32(?,0061CF95), ref: 0061E19A
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0061D420
                                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 0061D470
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0061D481
                                                                            • FindClose.KERNEL32(00000000), ref: 0061D498
                                                                            • FindClose.KERNEL32(00000000), ref: 0061D4A1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                            • String ID: \*.*
                                                                            • API String ID: 2649000838-1173974218
                                                                            • Opcode ID: 55438e423412e9a8d0aea01ac251896a5f25658f7a358e48488f6c923532d955
                                                                            • Instruction ID: 657ed93859bcbaebc9dea1a8213465b531c2b69b407a28bceb3ec2d6484f2f56
                                                                            • Opcode Fuzzy Hash: 55438e423412e9a8d0aea01ac251896a5f25658f7a358e48488f6c923532d955
                                                                            • Instruction Fuzzy Hash: 98317031009342ABC304EF64D8958EFBBE9BED6310F444E1DF4D1932A1EB60AA49C763
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: __floor_pentium4
                                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                            • API String ID: 4168288129-2761157908
                                                                            • Opcode ID: f41abf37d36ffb2f465c893c0d6dd6d7e8a0f449d3772a4ede4b49f0d529c7fb
                                                                            • Instruction ID: 8cf32773261ebc14038688d2d0d825cc3dc18e13eb99f8f7449046254ea2fa16
                                                                            • Opcode Fuzzy Hash: f41abf37d36ffb2f465c893c0d6dd6d7e8a0f449d3772a4ede4b49f0d529c7fb
                                                                            • Instruction Fuzzy Hash: F1C26B71E086698FDB28CE29DD457EABBB5FB44304F1445EAD48DE7240EB74AE818F40
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 006264DC
                                                                            • CoInitialize.OLE32(00000000), ref: 00626639
                                                                            • CoCreateInstance.OLE32(0064FCF8,00000000,00000001,0064FB68,?), ref: 00626650
                                                                            • CoUninitialize.OLE32 ref: 006268D4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                            • String ID: .lnk
                                                                            • API String ID: 886957087-24824748
                                                                            • Opcode ID: 4fdc6b7c1a319950dc4ba3b190901766c4423f09666000e876f8661ecb0e5bac
                                                                            • Instruction ID: 2e5fc245a21e7a36798f6ed25246161208ed55e68f2a346edb3fe8de504aaa62
                                                                            • Opcode Fuzzy Hash: 4fdc6b7c1a319950dc4ba3b190901766c4423f09666000e876f8661ecb0e5bac
                                                                            • Instruction Fuzzy Hash: 2ED15971508611AFC314EF24C8859ABBBE9FFD8304F10496DF5959B2A1EB70ED05CBA2
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(?,?,00000000), ref: 006322E8
                                                                              • Part of subcall function 0062E4EC: GetWindowRect.USER32(?,?), ref: 0062E504
                                                                            • GetDesktopWindow.USER32 ref: 00632312
                                                                            • GetWindowRect.USER32(00000000), ref: 00632319
                                                                            • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00632355
                                                                            • GetCursorPos.USER32(?), ref: 00632381
                                                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 006323DF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                            • String ID:
                                                                            • API String ID: 2387181109-0
                                                                            • Opcode ID: 561af1aaba1905463be3e28ad71c44e990bab48267b3432e8ef845f2f29ae046
                                                                            • Instruction ID: 8a695ff774b787fef85aca013826d7008817739b68e15d47740fa69570a79b82
                                                                            • Opcode Fuzzy Hash: 561af1aaba1905463be3e28ad71c44e990bab48267b3432e8ef845f2f29ae046
                                                                            • Instruction Fuzzy Hash: DD31E072505316AFE720DF14D849B9BBBAAFF85320F00091DF98597291DB35EA08CBD2
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00629B78
                                                                            • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00629C8B
                                                                              • Part of subcall function 00623874: GetInputState.USER32 ref: 006238CB
                                                                              • Part of subcall function 00623874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00623966
                                                                            • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00629BA8
                                                                            • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00629C75
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                            • String ID: *.*
                                                                            • API String ID: 1972594611-438819550
                                                                            • Opcode ID: 644e0ade6ab88002544e0744ca22d805aa27652c13a64f484eff2798af9a1454
                                                                            • Instruction ID: 84dfc0cd6cc0d9aea6ccd30025fe2b2c74279e4d650af2525ccf557cf69cc195
                                                                            • Opcode Fuzzy Hash: 644e0ade6ab88002544e0744ca22d805aa27652c13a64f484eff2798af9a1454
                                                                            • Instruction Fuzzy Hash: C241927190061AAFDF55DF64D889AEE7BF6FF85310F20405AF805A2291EB309E84CF60
                                                                            APIs
                                                                              • Part of subcall function 005C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005C9BB2
                                                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 005C9A4E
                                                                            • GetSysColor.USER32(0000000F), ref: 005C9B23
                                                                            • SetBkColor.GDI32(?,00000000), ref: 005C9B36
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Color$LongProcWindow
                                                                            • String ID:
                                                                            • API String ID: 3131106179-0
                                                                            • Opcode ID: cc612c95518dda26ac8d29997be3cfc415dd6a875aa1dd1b1bc00b6088c8015c
                                                                            • Instruction ID: b65cc85fbd1e0d07d801a5a48b198236c11207944239d33ba017587a75ce5865
                                                                            • Opcode Fuzzy Hash: cc612c95518dda26ac8d29997be3cfc415dd6a875aa1dd1b1bc00b6088c8015c
                                                                            • Instruction Fuzzy Hash: E0A107B1549444BEE72DAAAC8C5DFBB2E9FFB83340B14460DF002DA6D1CA25AD01D376
                                                                            APIs
                                                                              • Part of subcall function 0063304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0063307A
                                                                              • Part of subcall function 0063304E: _wcslen.LIBCMT ref: 0063309B
                                                                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0063185D
                                                                            • WSAGetLastError.WSOCK32 ref: 00631884
                                                                            • bind.WSOCK32(00000000,?,00000010), ref: 006318DB
                                                                            • WSAGetLastError.WSOCK32 ref: 006318E6
                                                                            • closesocket.WSOCK32(00000000), ref: 00631915
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 1601658205-0
                                                                            • Opcode ID: 88186482a2dee920b56c0141c7bce9d6de89089d568aa6f29a3b13b698a52076
                                                                            • Instruction ID: 51bcf2ce46f483a2d9296b007a6e177ae081b1a51f2f137eba1d452ea8a560f8
                                                                            • Opcode Fuzzy Hash: 88186482a2dee920b56c0141c7bce9d6de89089d568aa6f29a3b13b698a52076
                                                                            • Instruction Fuzzy Hash: 0E51C675A002009FDB10AF24C88AFAA7BE6AB85718F14809CF9055F3D3D771AD418BE1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                            • String ID:
                                                                            • API String ID: 292994002-0
                                                                            • Opcode ID: 0b7290728aa0a03d828590c1a49d1cdb9bad73a28c23ffc6d2abf218f7c4f8eb
                                                                            • Instruction ID: da3f372a547fa23dbe9dda1964260e1881594229927b3422f48977afe275e98c
                                                                            • Opcode Fuzzy Hash: 0b7290728aa0a03d828590c1a49d1cdb9bad73a28c23ffc6d2abf218f7c4f8eb
                                                                            • Instruction Fuzzy Hash: 9421D3317412019FD7208F1ADC94BAA7BE7FF86325B198058E84A8F352C775EC82CB94
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                            • API String ID: 0-1546025612
                                                                            • Opcode ID: 8c8613a33a27d8ebc43c7a874fa39240926d41cf9e4c87d37b36439060502568
                                                                            • Instruction ID: a5a2612071154b168dd9d87e9ae1f3ae6b28ecb7455575cac275e8e09bc6583a
                                                                            • Opcode Fuzzy Hash: 8c8613a33a27d8ebc43c7a874fa39240926d41cf9e4c87d37b36439060502568
                                                                            • Instruction Fuzzy Hash: E2A27E74E0061ECBDF24CF58C8447FDBBB5BB54314F2485AADA15A7285EB34AD81CB90
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006182AA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen
                                                                            • String ID: ($tbg$|
                                                                            • API String ID: 1659193697-2243794742
                                                                            • Opcode ID: dcee26893879e9ed1a092b4cf7dec0d9ac1fd99eee94f932a1e564111bc9733b
                                                                            • Instruction ID: 453a93435464a7213443849dfd9a34ad9d39443d6ea3a38dc219724ea2b4c4c3
                                                                            • Opcode Fuzzy Hash: dcee26893879e9ed1a092b4cf7dec0d9ac1fd99eee94f932a1e564111bc9733b
                                                                            • Instruction Fuzzy Hash: F1323875A007059FC728CF59C481AAAB7F1FF48710B19C56EE49ADB3A1EB70E981CB44
                                                                            APIs
                                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 0063A6AC
                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0063A6BA
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            • Process32NextW.KERNEL32(00000000,?), ref: 0063A79C
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0063A7AB
                                                                              • Part of subcall function 005CCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,005F3303,?), ref: 005CCE8A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                            • String ID:
                                                                            • API String ID: 1991900642-0
                                                                            • Opcode ID: ccc1c5d4116bbf4ba7a8665de642a181042340cfb1d1110c58205b2ddd71f31c
                                                                            • Instruction ID: 6a1fc00c9294cf25c3eef24e85e19f41e2da476864d1df87e82700493a2a0ec5
                                                                            • Opcode Fuzzy Hash: ccc1c5d4116bbf4ba7a8665de642a181042340cfb1d1110c58205b2ddd71f31c
                                                                            • Instruction Fuzzy Hash: 98514C75508301AFD710EF64C88AAABBBE9FFC9754F00491DF58597291EB30E904CB92
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0061AAAC
                                                                            • SetKeyboardState.USER32(00000080), ref: 0061AAC8
                                                                            • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0061AB36
                                                                            • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0061AB88
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: KeyboardState$InputMessagePostSend
                                                                            • String ID:
                                                                            • API String ID: 432972143-0
                                                                            • Opcode ID: 62963fb48066b2cf9e9829ae3d3712ebe68bd4b430bab44bcc90a93db21bed1d
                                                                            • Instruction ID: 881b867845b2c705f28a516a3b3a0a8aaa258d4a82f5c7058cb8754249446377
                                                                            • Opcode Fuzzy Hash: 62963fb48066b2cf9e9829ae3d3712ebe68bd4b430bab44bcc90a93db21bed1d
                                                                            • Instruction Fuzzy Hash: 7D312570A46288AFEB34CBA4CC05BFA7BA7AF45320F0C421AF0C1922D1D37589C1D762
                                                                            APIs
                                                                            • _free.LIBCMT ref: 005EBB7F
                                                                              • Part of subcall function 005E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000), ref: 005E29DE
                                                                              • Part of subcall function 005E29C8: GetLastError.KERNEL32(00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000,00000000), ref: 005E29F0
                                                                            • GetTimeZoneInformation.KERNEL32 ref: 005EBB91
                                                                            • WideCharToMultiByte.KERNEL32(00000000,?,0068121C,000000FF,?,0000003F,?,?), ref: 005EBC09
                                                                            • WideCharToMultiByte.KERNEL32(00000000,?,00681270,000000FF,?,0000003F,?,?,?,0068121C,000000FF,?,0000003F,?,?), ref: 005EBC36
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                            • String ID:
                                                                            • API String ID: 806657224-0
                                                                            • Opcode ID: 513707c13ae965752aeb1b5ec8487c599b32b11d14afc6f9c7e1e45842aa83b7
                                                                            • Instruction ID: 87cce3077b1909fc9225ec04c74eca045766d26dd7e19f811b1b2a2f98699e3a
                                                                            • Opcode Fuzzy Hash: 513707c13ae965752aeb1b5ec8487c599b32b11d14afc6f9c7e1e45842aa83b7
                                                                            • Instruction Fuzzy Hash: 0631E530904286EFDB18DF6ADC5142EBFBDFF46311B14565AE094DB2A1C7319E41CB50
                                                                            APIs
                                                                            • InternetReadFile.WININET(?,?,00000400,?), ref: 0062CE89
                                                                            • GetLastError.KERNEL32(?,00000000), ref: 0062CEEA
                                                                            • SetEvent.KERNEL32(?,?,00000000), ref: 0062CEFE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorEventFileInternetLastRead
                                                                            • String ID:
                                                                            • API String ID: 234945975-0
                                                                            • Opcode ID: 5ad173b06119dd04fb2e10a97a32fc43fb8c1e5a0dbfa67c8c9b901470a21a3e
                                                                            • Instruction ID: 77659c4316220eda89dda8831d5362e76f0b91f9d21724a685d7edbde3a24688
                                                                            • Opcode Fuzzy Hash: 5ad173b06119dd04fb2e10a97a32fc43fb8c1e5a0dbfa67c8c9b901470a21a3e
                                                                            • Instruction Fuzzy Hash: 23219DB1500B159BEB30DFA5E949BAB7BFAEF40368F10441EE58692251E770EE058F60
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00625CC1
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00625D17
                                                                            • FindClose.KERNEL32(?), ref: 00625D5F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstNext
                                                                            • String ID:
                                                                            • API String ID: 3541575487-0
                                                                            • Opcode ID: 343ba4aa81b9b3c38f5d1703850f1fe0912e2a257d7ca9f2accbb863c0dc26c9
                                                                            • Instruction ID: 820f7045e99ac6bd3fa73e3184788a29a0038aa4a9328a902c16724e952bb37d
                                                                            • Opcode Fuzzy Hash: 343ba4aa81b9b3c38f5d1703850f1fe0912e2a257d7ca9f2accbb863c0dc26c9
                                                                            • Instruction Fuzzy Hash: FB518B34604A029FC724CF28D498A96BBE5FF49324F14895EE95A8B3A1DB30FD05CF95
                                                                            APIs
                                                                            • IsDebuggerPresent.KERNEL32 ref: 005E271A
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 005E2724
                                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 005E2731
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                            • String ID:
                                                                            • API String ID: 3906539128-0
                                                                            • Opcode ID: 25ab084bcad92c9e70420fcc9fe5d7d849185ebb5ded74dc3fca0b53804a956c
                                                                            • Instruction ID: 22fa1a861e7e8dfbb6c5598a8d6dd1bf08bf81ed29e5470631ee2ffd3070d254
                                                                            • Opcode Fuzzy Hash: 25ab084bcad92c9e70420fcc9fe5d7d849185ebb5ded74dc3fca0b53804a956c
                                                                            • Instruction Fuzzy Hash: 1531D374901219ABCB21DF68DC8879DBBB8BF08310F5051EAE80CA7260EB709F818F45
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 006251DA
                                                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00625238
                                                                            • SetErrorMode.KERNEL32(00000000), ref: 006252A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$DiskFreeSpace
                                                                            • String ID:
                                                                            • API String ID: 1682464887-0
                                                                            • Opcode ID: 38586cb7b9bfd7b69c9043f29511f0f2e1817d8636e2754c7068f1195d71ccef
                                                                            • Instruction ID: d5e33751c2d6ca3c9466ee68b882656d3434319ad4fc990b25abb42111451a2f
                                                                            • Opcode Fuzzy Hash: 38586cb7b9bfd7b69c9043f29511f0f2e1817d8636e2754c7068f1195d71ccef
                                                                            • Instruction Fuzzy Hash: 0B315E75A00519DFDB00DF54D888EEDBBB5FF49314F188099E805AB3A2DB31E956CB90
                                                                            APIs
                                                                              • Part of subcall function 005CFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 005D0668
                                                                              • Part of subcall function 005CFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 005D0685
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0061170D
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0061173A
                                                                            • GetLastError.KERNEL32 ref: 0061174A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                            • String ID:
                                                                            • API String ID: 577356006-0
                                                                            • Opcode ID: 22e460bb6257a93bfb5335c6433e4d2142f65d7f1c619c953450f73adf220486
                                                                            • Instruction ID: d5bf515729dabaf7ea9e5eed96b7d3193d90d325fd475b9b926b1d9bfff9ee1a
                                                                            • Opcode Fuzzy Hash: 22e460bb6257a93bfb5335c6433e4d2142f65d7f1c619c953450f73adf220486
                                                                            • Instruction Fuzzy Hash: 5F11C4B1400305AFD7189F54DC86EAABBBAFB45714B24852EE05657751EB70BC418B60
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0061D608
                                                                            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0061D645
                                                                            • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0061D650
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CloseControlCreateDeviceFileHandle
                                                                            • String ID:
                                                                            • API String ID: 33631002-0
                                                                            • Opcode ID: 0128c86efa0e3b3fcbfd5f346337d0664d9c15f391cd7a01d3006ad9b43bc3b5
                                                                            • Instruction ID: 049714788ef0b425c5b6474e79703e1fcf772d97be1e48c3e4ad70b1565ffee6
                                                                            • Opcode Fuzzy Hash: 0128c86efa0e3b3fcbfd5f346337d0664d9c15f391cd7a01d3006ad9b43bc3b5
                                                                            • Instruction Fuzzy Hash: 03113C75E05228BBDB208F959C45FEFBBBDEB45B60F108115F904E7290D6B05A058BA1
                                                                            APIs
                                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0061168C
                                                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 006116A1
                                                                            • FreeSid.ADVAPI32(?), ref: 006116B1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                            • String ID:
                                                                            • API String ID: 3429775523-0
                                                                            • Opcode ID: bec2c891397bf590d74982882332bb2f26ccf8a4392ae839b158b6882b13ed47
                                                                            • Instruction ID: 5b6dbab0eb05007f6875f436bbfc5a95570fffccf61038df4e4e723f5670de2b
                                                                            • Opcode Fuzzy Hash: bec2c891397bf590d74982882332bb2f26ccf8a4392ae839b158b6882b13ed47
                                                                            • Instruction Fuzzy Hash: 32F04475A41308FBDB00CFE08C89AAEBBBDEB08610F004860E500E2280E331AA448A50
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(005E28E9,?,005D4CBE,005E28E9,006788B8,0000000C,005D4E15,005E28E9,00000002,00000000,?,005E28E9), ref: 005D4D09
                                                                            • TerminateProcess.KERNEL32(00000000,?,005D4CBE,005E28E9,006788B8,0000000C,005D4E15,005E28E9,00000002,00000000,?,005E28E9), ref: 005D4D10
                                                                            • ExitProcess.KERNEL32 ref: 005D4D22
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentExitTerminate
                                                                            • String ID:
                                                                            • API String ID: 1703294689-0
                                                                            • Opcode ID: ee7e06447ec64e840815c5ecceebcb2e0306e18d19a384784f67ce87987f0004
                                                                            • Instruction ID: 11bcb702a4db59565281f9ee5edfd0a52f38f58ca16d6b431469d34df3bdeeb3
                                                                            • Opcode Fuzzy Hash: ee7e06447ec64e840815c5ecceebcb2e0306e18d19a384784f67ce87987f0004
                                                                            • Instruction Fuzzy Hash: 8CE0B635002588ABCF62BF68DD0DA583F6AFB82791B145016FC058B322CB35DD42CE80
                                                                            APIs
                                                                            • GetUserNameW.ADVAPI32(?,?), ref: 0060D28C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: NameUser
                                                                            • String ID: X64
                                                                            • API String ID: 2645101109-893830106
                                                                            • Opcode ID: caa2a94b75a6fb8ac73f36e4750f886b2967e03896c1ebec574ca1b1effdaa57
                                                                            • Instruction ID: 79404b4f9c38c1f6fd052f173c54221013ad8b7358616513f569163ea5bf7e99
                                                                            • Opcode Fuzzy Hash: caa2a94b75a6fb8ac73f36e4750f886b2967e03896c1ebec574ca1b1effdaa57
                                                                            • Instruction Fuzzy Hash: 0CD0C9B480211DEFCB94DB90DC88DDAB77CBB04315F100655F506E2140D73096499F20
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                            • Instruction ID: 8dc7c9ef675e38d439159dbff63dd50912c3762f80195b1bbc3c46799b75804c
                                                                            • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                            • Instruction Fuzzy Hash: B8020A71E0011A9BDF24CFADC9806ADBFB5FF88314F25426AD919EB380D731A941CB94
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Variable is not of type 'Object'.$p#h
                                                                            • API String ID: 0-314203719
                                                                            • Opcode ID: 2f696ba948c2210fddc04bd32a304f86eea89d13ff23d7d19cf5c66058831ed8
                                                                            • Instruction ID: 11cda7c6a1358c6386859a7d17129b9533fbc8754cc7f2f8690d7198fa235cea
                                                                            • Opcode Fuzzy Hash: 2f696ba948c2210fddc04bd32a304f86eea89d13ff23d7d19cf5c66058831ed8
                                                                            • Instruction Fuzzy Hash: 3B329A74900219DFDF18DF90C885BEEBFB6BF45304F244469E806AB282DB75AE45CB64
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00626918
                                                                            • FindClose.KERNEL32(00000000), ref: 00626961
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileFirst
                                                                            • String ID:
                                                                            • API String ID: 2295610775-0
                                                                            • Opcode ID: 47f42584a22590ffccc0df95e90e44fb60aaf5c2119c27d9e0335fd6e26b106b
                                                                            • Instruction ID: 75798bc6f883541c5bb86f4d00482daf4db0cd5a60384d0f89019ed6f446aa21
                                                                            • Opcode Fuzzy Hash: 47f42584a22590ffccc0df95e90e44fb60aaf5c2119c27d9e0335fd6e26b106b
                                                                            • Instruction Fuzzy Hash: 7311D0356046129FC710CF29D488A26BBE1FF89328F14C699F4698F3A2CB70EC45CB90
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00634891,?,?,00000035,?), ref: 006237E4
                                                                            • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00634891,?,?,00000035,?), ref: 006237F4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFormatLastMessage
                                                                            • String ID:
                                                                            • API String ID: 3479602957-0
                                                                            • Opcode ID: 1178c4e310cd62b12702ee91507b78d34a4307991af5061e273a146116dd3f13
                                                                            • Instruction ID: 2f7b3595a473910b4d9981966244dac94dc5003bbb46c0d29dc8a24299681acb
                                                                            • Opcode Fuzzy Hash: 1178c4e310cd62b12702ee91507b78d34a4307991af5061e273a146116dd3f13
                                                                            • Instruction Fuzzy Hash: 6FF0A7746053296ADB5017655C4DFEB3A5EEFC5761F000165B505D2391D660590486B0
                                                                            APIs
                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0061B25D
                                                                            • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 0061B270
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: InputSendkeybd_event
                                                                            • String ID:
                                                                            • API String ID: 3536248340-0
                                                                            • Opcode ID: d027160f504ca69b86dc73ca8743ab8451b16f47a658f6464b49f1080e14bdd4
                                                                            • Instruction ID: 82bcb75bebddc1c8404df7e4360cb8f84217c843cea10f34efd2908e3564dd98
                                                                            • Opcode Fuzzy Hash: d027160f504ca69b86dc73ca8743ab8451b16f47a658f6464b49f1080e14bdd4
                                                                            • Instruction Fuzzy Hash: BCF06D7480428DABDB058FA0C805BFE7BB1FF04315F049009F951A5291C37982159F94
                                                                            APIs
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006111FC), ref: 006110D4
                                                                            • CloseHandle.KERNEL32(?,?,006111FC), ref: 006110E9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustCloseHandlePrivilegesToken
                                                                            • String ID:
                                                                            • API String ID: 81990902-0
                                                                            • Opcode ID: 264c1850f847524ef3e68fefbb791f1248ddbbbf00ad5d15f929ca20a92fc44c
                                                                            • Instruction ID: 9e8435537e24f8c6c0ba345936beb143208bc9fe10d8871d215841f4d4c21c45
                                                                            • Opcode Fuzzy Hash: 264c1850f847524ef3e68fefbb791f1248ddbbbf00ad5d15f929ca20a92fc44c
                                                                            • Instruction Fuzzy Hash: F9E04F32005611AEE7652B51FC09FB37BAAFB05320B14882DF5A6845B1DB626C90DB10
                                                                            APIs
                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,005E6766,?,?,00000008,?,?,005EFEFE,00000000), ref: 005E6998
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionRaise
                                                                            • String ID:
                                                                            • API String ID: 3997070919-0
                                                                            • Opcode ID: f12ad64e7a2478e3b29523f217719c00e10a736c98817d4a872cf91e2b43dfdd
                                                                            • Instruction ID: 99c0e6805b044f2479737000ba21e55b3a780e7a5d3736accb836bca62b97653
                                                                            • Opcode Fuzzy Hash: f12ad64e7a2478e3b29523f217719c00e10a736c98817d4a872cf91e2b43dfdd
                                                                            • Instruction Fuzzy Hash: 2AB125316106499FD719CF29C48AB657FE0FB553A4F258658E8DACF2A2C335E981CB40
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID: 0-3916222277
                                                                            • Opcode ID: 3032fd424fbe6670aa3158cd6ca0816f6b3ee731e5935ac56828bc1f28845835
                                                                            • Instruction ID: 116a265dd44217ac6f7f846f4ffc9187a4fd6835dfc37cd2775bc2384af52b68
                                                                            • Opcode Fuzzy Hash: 3032fd424fbe6670aa3158cd6ca0816f6b3ee731e5935ac56828bc1f28845835
                                                                            • Instruction Fuzzy Hash: C61232719002299FDF58CF98C881BEEBBB6FF48710F14815AE849EB255DB749E41CB90
                                                                            APIs
                                                                            • BlockInput.USER32(00000001), ref: 0062EABD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: BlockInput
                                                                            • String ID:
                                                                            • API String ID: 3456056419-0
                                                                            • Opcode ID: 1894b8b20e4560cd046efd9a77c6147df8f80658d847d630eea6780354f572b3
                                                                            • Instruction ID: 0cf1ed9213869cc66c99dd94e1d8c5e6b243b613e53deebb709b69c1c1268727
                                                                            • Opcode Fuzzy Hash: 1894b8b20e4560cd046efd9a77c6147df8f80658d847d630eea6780354f572b3
                                                                            • Instruction Fuzzy Hash: 13E012352002159FD710DF59D804D9ABBE9BF99760F00842AFC49C7351D6B1A8418B91
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,005D03EE), ref: 005D09DA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: 515dac26b542db99a86190f21b02f01a25ff3c96f743f093ed9d687f9ef0f8d0
                                                                            • Instruction ID: 9ab663a7116d7cbcae13d631287f79a8e546876feabffa99af986ea690986861
                                                                            • Opcode Fuzzy Hash: 515dac26b542db99a86190f21b02f01a25ff3c96f743f093ed9d687f9ef0f8d0
                                                                            • Instruction Fuzzy Hash:
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0
                                                                            • API String ID: 0-4108050209
                                                                            • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                            • Instruction ID: 85dded6674fff3e6dab59ede117aa63bddde5eb33471b1b756803c6cc78c41a1
                                                                            • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                            • Instruction Fuzzy Hash: 01517A7260C74E5BDB38862C886E7BE6F95BB5E300F18090BD886D7382F611DE01E356
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0&h
                                                                            • API String ID: 0-1537038028
                                                                            • Opcode ID: 29e202e6867f2e38e4862347d872c12d787b44ed91e3d4c187dbe6958d76efd2
                                                                            • Instruction ID: fbc05dcfa0f03fb812b145a7aa7cd9e0a531de3702a3384755f3485b76fa2537
                                                                            • Opcode Fuzzy Hash: 29e202e6867f2e38e4862347d872c12d787b44ed91e3d4c187dbe6958d76efd2
                                                                            • Instruction Fuzzy Hash: D321BB326605129BD728CF79C82367E73E6B754310F15862EE4A7C77D0DE75A944CB40
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 06c30f705c50a3826d275708e5d49d7bd8894d1dc0ee006044b6034b20478d5a
                                                                            • Instruction ID: 6cb13edf403814f549d90ab1fe8568d7dccf062139a771251e78dbc8eff3442e
                                                                            • Opcode Fuzzy Hash: 06c30f705c50a3826d275708e5d49d7bd8894d1dc0ee006044b6034b20478d5a
                                                                            • Instruction Fuzzy Hash: 01323521D29F424ED7279635DC323356A8ABFBB3C5F14D737E85AB59A6EB28C4834100
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4914269ec54aa0f79aa5c6e24416d1761742792e5e44cbfaf2a6ee6197e07ca9
                                                                            • Instruction ID: 308eff38a8276a8dd7529b582dbdfea54ade69b16e2b31cb8d3b67f48b34fb50
                                                                            • Opcode Fuzzy Hash: 4914269ec54aa0f79aa5c6e24416d1761742792e5e44cbfaf2a6ee6197e07ca9
                                                                            • Instruction Fuzzy Hash: 9832C431A801158FDF2CCB69C494ABE7FA3FB45320F28866AD45ADB3D1D6309D82DB41
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 31e612b56c0aa9cca44de1ba02296959b929acd1aa818cb6dc7d02803bb7a0c5
                                                                            • Instruction ID: 354fa2bd903a2d7db405c03d6cc8dd2159b3989167e5cedcab2c4b2b4f49cd3b
                                                                            • Opcode Fuzzy Hash: 31e612b56c0aa9cca44de1ba02296959b929acd1aa818cb6dc7d02803bb7a0c5
                                                                            • Instruction Fuzzy Hash: B3229270A0460A9FDF14CF68C885AFEBBF6FF88300F144529E916A7291E739AD55CB50
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: aa3c1aa5f59e3baee70ee6d8b9b686969c7c8957d7c46b7e730dce4d345ac831
                                                                            • Instruction ID: dec73f56f9e7db66cdd73eb80d1e5a6931d94036847255c808415cf0dc9bd481
                                                                            • Opcode Fuzzy Hash: aa3c1aa5f59e3baee70ee6d8b9b686969c7c8957d7c46b7e730dce4d345ac831
                                                                            • Instruction Fuzzy Hash: 5602B6B0E0020AEFDB14DF54D886AADBFB5FF44300F108569E9169B3A1E735AE50CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                            • Instruction ID: 85432089821a2f08f147e25c533a38d1d78274ec6948f8c163064aa641af49bd
                                                                            • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                            • Instruction Fuzzy Hash: A09167722094A35ADB39863E857403DFFE1BA923A131A079FD4F2CA3C5EE148954D724
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                            • Instruction ID: 86d5a061a75285d8b833f9c9bbf9697f3de5b0f7f675a47f0e193ffefc66a259
                                                                            • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                            • Instruction Fuzzy Hash: 759154722098A35AEB3D427E857403DFFE16A923A231A079FD4F2CA2C5FD24D554D724
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6fd51b59807714ad8d7bbf76c3049a505bca26a1a44bb5c3601d7351a7c78749
                                                                            • Instruction ID: c1e20a1d76593cbcb126a2d9f40975e0a5bbaab711daa2206e9bca29114247a7
                                                                            • Opcode Fuzzy Hash: 6fd51b59807714ad8d7bbf76c3049a505bca26a1a44bb5c3601d7351a7c78749
                                                                            • Instruction Fuzzy Hash: F2613971608B0E96EE349A2C8D9ABBE6F94FF8D704F140D1BE842DB391F6119E42C355
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 499a10764543d36ec07903b5d93bab2fac738de797c7cee151204ea15a5b7498
                                                                            • Instruction ID: 09b24182a871389eaf984d9b5fd90ecd6efebcb274a6fcd97e1f0f3f7d96b377
                                                                            • Opcode Fuzzy Hash: 499a10764543d36ec07903b5d93bab2fac738de797c7cee151204ea15a5b7498
                                                                            • Instruction Fuzzy Hash: 61615A7120870E56DE386A3C8855BBE6F9AFF8E704F50095BE943DB381F612ED828355
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                            • Instruction ID: 6eac789700e909a5c98b5cfc2b3e2e975e3978957c8117fcc0f4333266f1b72b
                                                                            • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                            • Instruction Fuzzy Hash: 358175726094A359DB3D827E853403EFFE17A923A131A079FD4F2CA2D1EE248554E624
                                                                            APIs
                                                                            • DeleteObject.GDI32(00000000), ref: 00632B30
                                                                            • DeleteObject.GDI32(00000000), ref: 00632B43
                                                                            • DestroyWindow.USER32 ref: 00632B52
                                                                            • GetDesktopWindow.USER32 ref: 00632B6D
                                                                            • GetWindowRect.USER32(00000000), ref: 00632B74
                                                                            • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00632CA3
                                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00632CB1
                                                                            • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00632CF8
                                                                            • GetClientRect.USER32(00000000,?), ref: 00632D04
                                                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00632D40
                                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00632D62
                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00632D75
                                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00632D80
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00632D89
                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00632D98
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00632DA1
                                                                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00632DA8
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00632DB3
                                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00632DC5
                                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,0064FC38,00000000), ref: 00632DDB
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00632DEB
                                                                            • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00632E11
                                                                            • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00632E30
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00632E52
                                                                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0063303F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                            • String ID: $AutoIt v3$DISPLAY$static
                                                                            • API String ID: 2211948467-2373415609
                                                                            • Opcode ID: 6c75723dc033db91e9b97abd26176db651d16e2515fccb1bd142c69a202161b6
                                                                            • Instruction ID: ea7365ada775fbd3eb5d28bb09f58140f673c9a7ef1d56d3856f2b9e83f8188b
                                                                            • Opcode Fuzzy Hash: 6c75723dc033db91e9b97abd26176db651d16e2515fccb1bd142c69a202161b6
                                                                            • Instruction Fuzzy Hash: 01028C75900205AFDB14DF64CC89EAE7BBAFF49720F148158F915AB2A1DB70AD01CBA0
                                                                            APIs
                                                                            • SetTextColor.GDI32(?,00000000), ref: 0064712F
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00647160
                                                                            • GetSysColor.USER32(0000000F), ref: 0064716C
                                                                            • SetBkColor.GDI32(?,000000FF), ref: 00647186
                                                                            • SelectObject.GDI32(?,?), ref: 00647195
                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 006471C0
                                                                            • GetSysColor.USER32(00000010), ref: 006471C8
                                                                            • CreateSolidBrush.GDI32(00000000), ref: 006471CF
                                                                            • FrameRect.USER32(?,?,00000000), ref: 006471DE
                                                                            • DeleteObject.GDI32(00000000), ref: 006471E5
                                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 00647230
                                                                            • FillRect.USER32(?,?,?), ref: 00647262
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00647284
                                                                              • Part of subcall function 006473E8: GetSysColor.USER32(00000012), ref: 00647421
                                                                              • Part of subcall function 006473E8: SetTextColor.GDI32(?,?), ref: 00647425
                                                                              • Part of subcall function 006473E8: GetSysColorBrush.USER32(0000000F), ref: 0064743B
                                                                              • Part of subcall function 006473E8: GetSysColor.USER32(0000000F), ref: 00647446
                                                                              • Part of subcall function 006473E8: GetSysColor.USER32(00000011), ref: 00647463
                                                                              • Part of subcall function 006473E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00647471
                                                                              • Part of subcall function 006473E8: SelectObject.GDI32(?,00000000), ref: 00647482
                                                                              • Part of subcall function 006473E8: SetBkColor.GDI32(?,00000000), ref: 0064748B
                                                                              • Part of subcall function 006473E8: SelectObject.GDI32(?,?), ref: 00647498
                                                                              • Part of subcall function 006473E8: InflateRect.USER32(?,000000FF,000000FF), ref: 006474B7
                                                                              • Part of subcall function 006473E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006474CE
                                                                              • Part of subcall function 006473E8: GetWindowLongW.USER32(00000000,000000F0), ref: 006474DB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                            • String ID:
                                                                            • API String ID: 4124339563-0
                                                                            • Opcode ID: cac7bc64c190ec1b50361c3b3e785a41e1e3c5efb5a68cffa9ef7693df56f539
                                                                            • Instruction ID: 6ae5e6fe5c31367759ae4b9448afa1eaf21d251e6c7ef3fde477493eb62e823f
                                                                            • Opcode Fuzzy Hash: cac7bc64c190ec1b50361c3b3e785a41e1e3c5efb5a68cffa9ef7693df56f539
                                                                            • Instruction Fuzzy Hash: B6A1D076009301BFDB509F64DC48EAB7BAAFF8A330F101A19F962962E1D771E900CB51
                                                                            APIs
                                                                            • DestroyWindow.USER32(?,?), ref: 005C8E14
                                                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 00606AC5
                                                                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00606AFE
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00606F43
                                                                              • Part of subcall function 005C8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005C8BE8,?,00000000,?,?,?,?,005C8BBA,00000000,?), ref: 005C8FC5
                                                                            • SendMessageW.USER32(?,00001053), ref: 00606F7F
                                                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00606F96
                                                                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00606FAC
                                                                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00606FB7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                            • String ID: 0
                                                                            • API String ID: 2760611726-4108050209
                                                                            • Opcode ID: b945a086a9357438763a1cb60d001da16b500fa37888d397392e71ee91cb1e25
                                                                            • Instruction ID: c9e158dff45caa60bea8ec35e8a0bf0ff67c64ab577e53d3991dae5f49e951db
                                                                            • Opcode Fuzzy Hash: b945a086a9357438763a1cb60d001da16b500fa37888d397392e71ee91cb1e25
                                                                            • Instruction Fuzzy Hash: 4D128B34245211EFDB29CF14C854BBABBEAFF45310F14556DF4998B2A2CB31A862CB91
                                                                            APIs
                                                                            • DestroyWindow.USER32(00000000), ref: 0063273E
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0063286A
                                                                            • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 006328A9
                                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 006328B9
                                                                            • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00632900
                                                                            • GetClientRect.USER32(00000000,?), ref: 0063290C
                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00632955
                                                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00632964
                                                                            • GetStockObject.GDI32(00000011), ref: 00632974
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00632978
                                                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00632988
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00632991
                                                                            • DeleteDC.GDI32(00000000), ref: 0063299A
                                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 006329C6
                                                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 006329DD
                                                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00632A1D
                                                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00632A31
                                                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 00632A42
                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00632A77
                                                                            • GetStockObject.GDI32(00000011), ref: 00632A82
                                                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00632A8D
                                                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00632A97
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                            • API String ID: 2910397461-517079104
                                                                            • Opcode ID: 1994ddc3fddc6bad75ffb3b1255c854616b8f85f66cd4405e5e143bc9857a28c
                                                                            • Instruction ID: ecfbc4255a5d5482dd48bf3c5680feb2ee44cf9b5f3c9c5b5088026094d4796e
                                                                            • Opcode Fuzzy Hash: 1994ddc3fddc6bad75ffb3b1255c854616b8f85f66cd4405e5e143bc9857a28c
                                                                            • Instruction Fuzzy Hash: 8CB14C75A00219BFEB14DF68CC49EAE7BBAFB49710F108515F915EB290D770AD40CBA4
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 00624AED
                                                                            • GetDriveTypeW.KERNEL32(?,0064CB68,?,\\.\,0064CC08), ref: 00624BCA
                                                                            • SetErrorMode.KERNEL32(00000000,0064CB68,?,\\.\,0064CC08), ref: 00624D36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$DriveType
                                                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                            • API String ID: 2907320926-4222207086
                                                                            • Opcode ID: 4b0f6f42aaa3fc9fa96727d617cfd08c005b48de66a3034ae51fbd88709740d3
                                                                            • Instruction ID: ea87c298829f93ac96d787083bf06c419d5f38a3c9f62e45756c7ac290224986
                                                                            • Opcode Fuzzy Hash: 4b0f6f42aaa3fc9fa96727d617cfd08c005b48de66a3034ae51fbd88709740d3
                                                                            • Instruction Fuzzy Hash: 3C61C330702E169BCB15DF28DA869A97BA3EF44304B258416F80AAB791DF31ED42DF41
                                                                            APIs
                                                                            • GetSysColor.USER32(00000012), ref: 00647421
                                                                            • SetTextColor.GDI32(?,?), ref: 00647425
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 0064743B
                                                                            • GetSysColor.USER32(0000000F), ref: 00647446
                                                                            • CreateSolidBrush.GDI32(?), ref: 0064744B
                                                                            • GetSysColor.USER32(00000011), ref: 00647463
                                                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00647471
                                                                            • SelectObject.GDI32(?,00000000), ref: 00647482
                                                                            • SetBkColor.GDI32(?,00000000), ref: 0064748B
                                                                            • SelectObject.GDI32(?,?), ref: 00647498
                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 006474B7
                                                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006474CE
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 006474DB
                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0064752A
                                                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00647554
                                                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 00647572
                                                                            • DrawFocusRect.USER32(?,?), ref: 0064757D
                                                                            • GetSysColor.USER32(00000011), ref: 0064758E
                                                                            • SetTextColor.GDI32(?,00000000), ref: 00647596
                                                                            • DrawTextW.USER32(?,006470F5,000000FF,?,00000000), ref: 006475A8
                                                                            • SelectObject.GDI32(?,?), ref: 006475BF
                                                                            • DeleteObject.GDI32(?), ref: 006475CA
                                                                            • SelectObject.GDI32(?,?), ref: 006475D0
                                                                            • DeleteObject.GDI32(?), ref: 006475D5
                                                                            • SetTextColor.GDI32(?,?), ref: 006475DB
                                                                            • SetBkColor.GDI32(?,?), ref: 006475E5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                            • String ID:
                                                                            • API String ID: 1996641542-0
                                                                            • Opcode ID: 2b29494d9352b9417be25c4660aa09f1847f5e6822173328a888258bf9065a26
                                                                            • Instruction ID: b57acf6959ebdf7f9b288cde1abac7b6b35b254eb5c414d524715a3eba5474dd
                                                                            • Opcode Fuzzy Hash: 2b29494d9352b9417be25c4660aa09f1847f5e6822173328a888258bf9065a26
                                                                            • Instruction Fuzzy Hash: 1C617C76901218AFDF049FA8DC48EEEBFBAEB0A320F115115F915BB2A1D7709940CF90
                                                                            APIs
                                                                            • GetCursorPos.USER32(?), ref: 00641128
                                                                            • GetDesktopWindow.USER32 ref: 0064113D
                                                                            • GetWindowRect.USER32(00000000), ref: 00641144
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00641199
                                                                            • DestroyWindow.USER32(?), ref: 006411B9
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 006411ED
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0064120B
                                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0064121D
                                                                            • SendMessageW.USER32(00000000,00000421,?,?), ref: 00641232
                                                                            • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00641245
                                                                            • IsWindowVisible.USER32(00000000), ref: 006412A1
                                                                            • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 006412BC
                                                                            • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 006412D0
                                                                            • GetWindowRect.USER32(00000000,?), ref: 006412E8
                                                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 0064130E
                                                                            • GetMonitorInfoW.USER32(00000000,?), ref: 00641328
                                                                            • CopyRect.USER32(?,?), ref: 0064133F
                                                                            • SendMessageW.USER32(00000000,00000412,00000000), ref: 006413AA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                            • String ID: ($0$tooltips_class32
                                                                            • API String ID: 698492251-4156429822
                                                                            • Opcode ID: f740de450d306eb5ae5f1d3db8d34ced4496e4a609c8d1cbee7391d8d6e8f2ab
                                                                            • Instruction ID: 72b0ed77135339fb4a58bf929777190f356434c3df9f3596b46f35b45375e20d
                                                                            • Opcode Fuzzy Hash: f740de450d306eb5ae5f1d3db8d34ced4496e4a609c8d1cbee7391d8d6e8f2ab
                                                                            • Instruction Fuzzy Hash: A5B19F71604341AFD714DF64C888BABBBE5FF85350F00891CF9999B2A1DB71E884CB92
                                                                            APIs
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005C8968
                                                                            • GetSystemMetrics.USER32(00000007), ref: 005C8970
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005C899B
                                                                            • GetSystemMetrics.USER32(00000008), ref: 005C89A3
                                                                            • GetSystemMetrics.USER32(00000004), ref: 005C89C8
                                                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 005C89E5
                                                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 005C89F5
                                                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 005C8A28
                                                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 005C8A3C
                                                                            • GetClientRect.USER32(00000000,000000FF), ref: 005C8A5A
                                                                            • GetStockObject.GDI32(00000011), ref: 005C8A76
                                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 005C8A81
                                                                              • Part of subcall function 005C912D: GetCursorPos.USER32(?), ref: 005C9141
                                                                              • Part of subcall function 005C912D: ScreenToClient.USER32(00000000,?), ref: 005C915E
                                                                              • Part of subcall function 005C912D: GetAsyncKeyState.USER32(00000001), ref: 005C9183
                                                                              • Part of subcall function 005C912D: GetAsyncKeyState.USER32(00000002), ref: 005C919D
                                                                            • SetTimer.USER32(00000000,00000000,00000028,005C90FC), ref: 005C8AA8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                            • String ID: AutoIt v3 GUI
                                                                            • API String ID: 1458621304-248962490
                                                                            • Opcode ID: e6503d2300ac26740a0f5442f562bfbebd89cce562e00facfa330566d732e9a3
                                                                            • Instruction ID: ed60bf9c91af46391a3f9d34dfbd659f9d54148fb6272828cfb2bfebc0cbea2f
                                                                            • Opcode Fuzzy Hash: e6503d2300ac26740a0f5442f562bfbebd89cce562e00facfa330566d732e9a3
                                                                            • Instruction Fuzzy Hash: ADB16E75A4020AAFDF14DFA8CC49FEE3BB6FB49314F104219FA15AB290DB34A851CB55
                                                                            APIs
                                                                              • Part of subcall function 006110F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00611114
                                                                              • Part of subcall function 006110F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00610B9B,?,?,?), ref: 00611120
                                                                              • Part of subcall function 006110F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00610B9B,?,?,?), ref: 0061112F
                                                                              • Part of subcall function 006110F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00610B9B,?,?,?), ref: 00611136
                                                                              • Part of subcall function 006110F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0061114D
                                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00610DF5
                                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00610E29
                                                                            • GetLengthSid.ADVAPI32(?), ref: 00610E40
                                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 00610E7A
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00610E96
                                                                            • GetLengthSid.ADVAPI32(?), ref: 00610EAD
                                                                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00610EB5
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 00610EBC
                                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00610EDD
                                                                            • CopySid.ADVAPI32(00000000), ref: 00610EE4
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00610F13
                                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00610F35
                                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00610F47
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00610F6E
                                                                            • HeapFree.KERNEL32(00000000), ref: 00610F75
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00610F7E
                                                                            • HeapFree.KERNEL32(00000000), ref: 00610F85
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00610F8E
                                                                            • HeapFree.KERNEL32(00000000), ref: 00610F95
                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00610FA1
                                                                            • HeapFree.KERNEL32(00000000), ref: 00610FA8
                                                                              • Part of subcall function 00611193: GetProcessHeap.KERNEL32(00000008,00610BB1,?,00000000,?,00610BB1,?), ref: 006111A1
                                                                              • Part of subcall function 00611193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00610BB1,?), ref: 006111A8
                                                                              • Part of subcall function 00611193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00610BB1,?), ref: 006111B7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                            • String ID:
                                                                            • API String ID: 4175595110-0
                                                                            • Opcode ID: 43ea863fe547b5a5aec1121c00c76fc312c39debdcb0f9f801f2dd12b4c389e9
                                                                            • Instruction ID: 1971dc8c70a553e37d87fd6cb0cbf8574c4761cf671dd89f8e34aea8e2de9c3d
                                                                            • Opcode Fuzzy Hash: 43ea863fe547b5a5aec1121c00c76fc312c39debdcb0f9f801f2dd12b4c389e9
                                                                            • Instruction Fuzzy Hash: EC71AE7590120AEFEF209FA4DC45FEEBBBABF05710F088115F918A7291D7719986CB60
                                                                            APIs
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0063C4BD
                                                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,0064CC08,00000000,?,00000000,?,?), ref: 0063C544
                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0063C5A4
                                                                            • _wcslen.LIBCMT ref: 0063C5F4
                                                                            • _wcslen.LIBCMT ref: 0063C66F
                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0063C6B2
                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0063C7C1
                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0063C84D
                                                                            • RegCloseKey.ADVAPI32(?), ref: 0063C881
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0063C88E
                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0063C960
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                            • API String ID: 9721498-966354055
                                                                            • Opcode ID: 4a1fdd8cf1b2a16a74f954c97b58f22dd5e1705204bef32d75599bf3393293c0
                                                                            • Instruction ID: 00c2b1a3b6551c1c7ee3abc4b653d69cbbd2646f70dfdb3de4c151a6f6f7590e
                                                                            • Opcode Fuzzy Hash: 4a1fdd8cf1b2a16a74f954c97b58f22dd5e1705204bef32d75599bf3393293c0
                                                                            • Instruction Fuzzy Hash: 40126C356042019FD714DF14C895A6ABBE6FF88724F14885DF88AAB3A2DB31FD41CB91
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?), ref: 006409C6
                                                                            • _wcslen.LIBCMT ref: 00640A01
                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00640A54
                                                                            • _wcslen.LIBCMT ref: 00640A8A
                                                                            • _wcslen.LIBCMT ref: 00640B06
                                                                            • _wcslen.LIBCMT ref: 00640B81
                                                                              • Part of subcall function 005CF9F2: _wcslen.LIBCMT ref: 005CF9FD
                                                                              • Part of subcall function 00612BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00612BFA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                            • API String ID: 1103490817-4258414348
                                                                            • Opcode ID: e68fa3594e5fc6322a922b200ec21cc52cc4c174cfe8647d5c319794739ee00c
                                                                            • Instruction ID: c32e7ee600aa01b29f23f7d73ac872ff4d2b6c9f300f93f10ceba11ca66b3af6
                                                                            • Opcode Fuzzy Hash: e68fa3594e5fc6322a922b200ec21cc52cc4c174cfe8647d5c319794739ee00c
                                                                            • Instruction Fuzzy Hash: 7FE19A352083129FC714EF24C4509AABBE2BFD8314F14895DF99A9B3A2D731ED46CB81
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$BuffCharUpper
                                                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                            • API String ID: 1256254125-909552448
                                                                            • Opcode ID: 8d2ce4bc9bc711829eb853c9cb132139765458e642f98327ab687c05510be15a
                                                                            • Instruction ID: 9232516e167eb0e037b5e7da0418f39cf09be238044fdbdaf19f7356eef17292
                                                                            • Opcode Fuzzy Hash: 8d2ce4bc9bc711829eb853c9cb132139765458e642f98327ab687c05510be15a
                                                                            • Instruction Fuzzy Hash: 9471D03260012A8BCB20DF7CCD51AFA3797ABA1774F254529F856BB384EA31DD4587E0
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 0064835A
                                                                            • _wcslen.LIBCMT ref: 0064836E
                                                                            • _wcslen.LIBCMT ref: 00648391
                                                                            • _wcslen.LIBCMT ref: 006483B4
                                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 006483F2
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,0064361A,?), ref: 0064844E
                                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00648487
                                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 006484CA
                                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00648501
                                                                            • FreeLibrary.KERNEL32(?), ref: 0064850D
                                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0064851D
                                                                            • DestroyIcon.USER32(?), ref: 0064852C
                                                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00648549
                                                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00648555
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                            • String ID: .dll$.exe$.icl
                                                                            • API String ID: 799131459-1154884017
                                                                            • Opcode ID: b0aae85d7b711adddfc8543c6e1afd1b651b6ba340b87fc4549f3e1a7560c128
                                                                            • Instruction ID: 7e9bc7153adb80cb046f4f30e767dac3b5d00fa9db0703cb9471f0f15f6554d1
                                                                            • Opcode Fuzzy Hash: b0aae85d7b711adddfc8543c6e1afd1b651b6ba340b87fc4549f3e1a7560c128
                                                                            • Instruction Fuzzy Hash: C661E271500216BFEB24DF64CC85BFE7BAABB44721F10450AF915D72D1DB74AA90CBA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                            • API String ID: 0-1645009161
                                                                            • Opcode ID: 6d446b67e6e57b683aef29ca5806c16522b0fff92cbdcf13eae027edb1d71792
                                                                            • Instruction ID: 54bd761bac6a67c18585cdcabb6b23654f25b0fb931731fdadb226ea2a35cb49
                                                                            • Opcode Fuzzy Hash: 6d446b67e6e57b683aef29ca5806c16522b0fff92cbdcf13eae027edb1d71792
                                                                            • Instruction Fuzzy Hash: 2E81087160060ABBDB20AF64CC46FFE3FA9FF99300F054425FA05AA192EB74E941D791
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(?,?), ref: 00623EF8
                                                                            • _wcslen.LIBCMT ref: 00623F03
                                                                            • _wcslen.LIBCMT ref: 00623F5A
                                                                            • _wcslen.LIBCMT ref: 00623F98
                                                                            • GetDriveTypeW.KERNEL32(?), ref: 00623FD6
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0062401E
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00624059
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00624087
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                            • API String ID: 1839972693-4113822522
                                                                            • Opcode ID: d85e55749d7e07e61e2ec40e0ba9da40e01125a611e2533b784375772544e72c
                                                                            • Instruction ID: 39234097600722a0c4012350b250a5c58a425a0995c5157ddb00006299dcf100
                                                                            • Opcode Fuzzy Hash: d85e55749d7e07e61e2ec40e0ba9da40e01125a611e2533b784375772544e72c
                                                                            • Instruction Fuzzy Hash: 8971F271604A229FC310DF24D8808AABBF6FF94754F10892DF99597351EB34ED49CB51
                                                                            APIs
                                                                            • LoadIconW.USER32(00000063), ref: 00615A2E
                                                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00615A40
                                                                            • SetWindowTextW.USER32(?,?), ref: 00615A57
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00615A6C
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 00615A72
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00615A82
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 00615A88
                                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00615AA9
                                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00615AC3
                                                                            • GetWindowRect.USER32(?,?), ref: 00615ACC
                                                                            • _wcslen.LIBCMT ref: 00615B33
                                                                            • SetWindowTextW.USER32(?,?), ref: 00615B6F
                                                                            • GetDesktopWindow.USER32 ref: 00615B75
                                                                            • GetWindowRect.USER32(00000000), ref: 00615B7C
                                                                            • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00615BD3
                                                                            • GetClientRect.USER32(?,?), ref: 00615BE0
                                                                            • PostMessageW.USER32(?,00000005,00000000,?), ref: 00615C05
                                                                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00615C2F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                            • String ID:
                                                                            • API String ID: 895679908-0
                                                                            • Opcode ID: 5f55a654d87eefc62a9dc4c8e20f94f481708416a2739c8fb669895f153ce130
                                                                            • Instruction ID: 0ffd308a36c1428107e86060c5e7ee31eeb4ba287dcc7d295f636492ea89035a
                                                                            • Opcode Fuzzy Hash: 5f55a654d87eefc62a9dc4c8e20f94f481708416a2739c8fb669895f153ce130
                                                                            • Instruction Fuzzy Hash: 1E716E31900B05EFDB20DFA8CE95AEEBBF6FF88714F144519E543A26A0D775A940CB50
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen
                                                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[g
                                                                            • API String ID: 176396367-870884229
                                                                            • Opcode ID: 9ac0a4f5974fa30c61f10fd85f47ba9eaea8572ee52bef039b0bc64bf30adb06
                                                                            • Instruction ID: 9f00549f6063bd43875a84053f6cf612c9f9022447a9813daefc7cace83d1dcf
                                                                            • Opcode Fuzzy Hash: 9ac0a4f5974fa30c61f10fd85f47ba9eaea8572ee52bef039b0bc64bf30adb06
                                                                            • Instruction Fuzzy Hash: CBE1D532A00526ABCB24DFB8C4556EDBBB6BF54710F58816AE457E7340DB30AFC58B90
                                                                            APIs
                                                                            • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 005D00C6
                                                                              • Part of subcall function 005D00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0068070C,00000FA0,15FE687B,?,?,?,?,005F23B3,000000FF), ref: 005D011C
                                                                              • Part of subcall function 005D00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,005F23B3,000000FF), ref: 005D0127
                                                                              • Part of subcall function 005D00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,005F23B3,000000FF), ref: 005D0138
                                                                              • Part of subcall function 005D00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 005D014E
                                                                              • Part of subcall function 005D00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 005D015C
                                                                              • Part of subcall function 005D00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 005D016A
                                                                              • Part of subcall function 005D00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005D0195
                                                                              • Part of subcall function 005D00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005D01A0
                                                                            • ___scrt_fastfail.LIBCMT ref: 005D00E7
                                                                              • Part of subcall function 005D00A3: __onexit.LIBCMT ref: 005D00A9
                                                                            Strings
                                                                            • api-ms-win-core-synch-l1-2-0.dll, xrefs: 005D0122
                                                                            • InitializeConditionVariable, xrefs: 005D0148
                                                                            • kernel32.dll, xrefs: 005D0133
                                                                            • WakeAllConditionVariable, xrefs: 005D0162
                                                                            • SleepConditionVariableCS, xrefs: 005D0154
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                            • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                            • API String ID: 66158676-1714406822
                                                                            • Opcode ID: d2cbbeb47999a0a27d3dc07b870e32a715ef1b833fb1d4694caf4b4255e240cb
                                                                            • Instruction ID: 2a8a543af7c44c3c5d1aad25554d365d652d85bcb3fcd7816bdcf4eecbdf3e00
                                                                            • Opcode Fuzzy Hash: d2cbbeb47999a0a27d3dc07b870e32a715ef1b833fb1d4694caf4b4255e240cb
                                                                            • Instruction Fuzzy Hash: 3221F932A457116FE7606BE8AC09B6A3B9AFF45B61F01153BF801D73D1DB7498008B90
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(00000000,00000000,0064CC08), ref: 00624527
                                                                            • _wcslen.LIBCMT ref: 0062453B
                                                                            • _wcslen.LIBCMT ref: 00624599
                                                                            • _wcslen.LIBCMT ref: 006245F4
                                                                            • _wcslen.LIBCMT ref: 0062463F
                                                                            • _wcslen.LIBCMT ref: 006246A7
                                                                              • Part of subcall function 005CF9F2: _wcslen.LIBCMT ref: 005CF9FD
                                                                            • GetDriveTypeW.KERNEL32(?,00676BF0,00000061), ref: 00624743
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$BuffCharDriveLowerType
                                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                            • API String ID: 2055661098-1000479233
                                                                            • Opcode ID: ff6ba2880a602bb572d2b75606f61e6098c163cd21379bc886ddd26ddd6bfb84
                                                                            • Instruction ID: aad7a850632bfa67e3ac73c27acdd154ea2b1782aad47f83f07536393ef660a0
                                                                            • Opcode Fuzzy Hash: ff6ba2880a602bb572d2b75606f61e6098c163cd21379bc886ddd26ddd6bfb84
                                                                            • Instruction Fuzzy Hash: F8B1D0316087229FC710DF28E890AAABBE6BFE5760F50491DF496D7391DB30D845CE52
                                                                            APIs
                                                                              • Part of subcall function 005C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005C9BB2
                                                                            • DragQueryPoint.SHELL32(?,?), ref: 00649147
                                                                              • Part of subcall function 00647674: ClientToScreen.USER32(?,?), ref: 0064769A
                                                                              • Part of subcall function 00647674: GetWindowRect.USER32(?,?), ref: 00647710
                                                                              • Part of subcall function 00647674: PtInRect.USER32(?,?,00648B89), ref: 00647720
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 006491B0
                                                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 006491BB
                                                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 006491DE
                                                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00649225
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0064923E
                                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00649255
                                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00649277
                                                                            • DragFinish.SHELL32(?), ref: 0064927E
                                                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00649371
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#h
                                                                            • API String ID: 221274066-857785655
                                                                            • Opcode ID: 7e7d35c35fffea3ef5b3954ced33392b3207a7238235a706295dac96d9b5ea1e
                                                                            • Instruction ID: e413c17309b2d8464f8e296b6b94c6da2abbec645911d12bae67190e8cefa6cc
                                                                            • Opcode Fuzzy Hash: 7e7d35c35fffea3ef5b3954ced33392b3207a7238235a706295dac96d9b5ea1e
                                                                            • Instruction Fuzzy Hash: 8B614B71108301AFD701EF54DC89DABBFEAFBC9750F00492DF595922A1DB70AA49CB62
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 0063B198
                                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0063B1B0
                                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0063B1D4
                                                                            • _wcslen.LIBCMT ref: 0063B200
                                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0063B214
                                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0063B236
                                                                            • _wcslen.LIBCMT ref: 0063B332
                                                                              • Part of subcall function 006205A7: GetStdHandle.KERNEL32(000000F6), ref: 006205C6
                                                                            • _wcslen.LIBCMT ref: 0063B34B
                                                                            • _wcslen.LIBCMT ref: 0063B366
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0063B3B6
                                                                            • GetLastError.KERNEL32(00000000), ref: 0063B407
                                                                            • CloseHandle.KERNEL32(?), ref: 0063B439
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0063B44A
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0063B45C
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0063B46E
                                                                            • CloseHandle.KERNEL32(?), ref: 0063B4E3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 2178637699-0
                                                                            • Opcode ID: f0d4253c6a502f126be3da573e3b39b7811d31a948a945a6cde2a1e9c0339ae9
                                                                            • Instruction ID: d74593701222ad24e4bdeb4d59c7454f3539aec4c5cba3b3fb5ab77c46b6a9c7
                                                                            • Opcode Fuzzy Hash: f0d4253c6a502f126be3da573e3b39b7811d31a948a945a6cde2a1e9c0339ae9
                                                                            • Instruction Fuzzy Hash: E3F19A316042019FD724EF24C895BAEBBE6BF85310F14955DF9998B3A2DB31EC44CB92
                                                                            APIs
                                                                            • GetMenuItemCount.USER32(00681990), ref: 005F2F8D
                                                                            • GetMenuItemCount.USER32(00681990), ref: 005F303D
                                                                            • GetCursorPos.USER32(?), ref: 005F3081
                                                                            • SetForegroundWindow.USER32(00000000), ref: 005F308A
                                                                            • TrackPopupMenuEx.USER32(00681990,00000000,?,00000000,00000000,00000000), ref: 005F309D
                                                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 005F30A9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                            • String ID: 0
                                                                            • API String ID: 36266755-4108050209
                                                                            • Opcode ID: f77c9039514ee5a7d6876591679fddf1bdf7a8ad7aa3f8e38769969b52dd0359
                                                                            • Instruction ID: 73f216f17f438110af57cb4c48b1c4ddb7f136052e6f4708f2741e8677e4f66d
                                                                            • Opcode Fuzzy Hash: f77c9039514ee5a7d6876591679fddf1bdf7a8ad7aa3f8e38769969b52dd0359
                                                                            • Instruction Fuzzy Hash: 1F71F974640209BEEB258F64CC49FEAFF69FF05364F204216F6146A2E0C7B5A950DB90
                                                                            APIs
                                                                            • DestroyWindow.USER32(?,?), ref: 00646DEB
                                                                              • Part of subcall function 005B6B57: _wcslen.LIBCMT ref: 005B6B6A
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00646E5F
                                                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00646E81
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00646E94
                                                                            • DestroyWindow.USER32(?), ref: 00646EB5
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,005B0000,00000000), ref: 00646EE4
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00646EFD
                                                                            • GetDesktopWindow.USER32 ref: 00646F16
                                                                            • GetWindowRect.USER32(00000000), ref: 00646F1D
                                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00646F35
                                                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00646F4D
                                                                              • Part of subcall function 005C9944: GetWindowLongW.USER32(?,000000EB), ref: 005C9952
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                            • String ID: 0$tooltips_class32
                                                                            • API String ID: 2429346358-3619404913
                                                                            • Opcode ID: e00a8348457a0f6e6394ead501cbbda6f12bd3221d4cd65fff55e8a65e9b8949
                                                                            • Instruction ID: d65258b68753aa66e69a755eb563ec6f831a48384331fb4801481e44803440fa
                                                                            • Opcode Fuzzy Hash: e00a8348457a0f6e6394ead501cbbda6f12bd3221d4cd65fff55e8a65e9b8949
                                                                            • Instruction Fuzzy Hash: F3714674104345AFDB61CF18D858EAABBFAFB8A314F04851DF99987361C770A90ACB12
                                                                            APIs
                                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0062C4B0
                                                                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0062C4C3
                                                                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0062C4D7
                                                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0062C4F0
                                                                            • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0062C533
                                                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0062C549
                                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0062C554
                                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0062C584
                                                                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0062C5DC
                                                                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0062C5F0
                                                                            • InternetCloseHandle.WININET(00000000), ref: 0062C5FB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                            • String ID:
                                                                            • API String ID: 3800310941-3916222277
                                                                            • Opcode ID: ee0f80c67b343db41d9b2d841efa2335ba5e6aea592356af19b6235fa27b9853
                                                                            • Instruction ID: fe57a607eff3682869c8972526198488b747b132eb4e49d2a37fe3270c4e531b
                                                                            • Opcode Fuzzy Hash: ee0f80c67b343db41d9b2d841efa2335ba5e6aea592356af19b6235fa27b9853
                                                                            • Instruction Fuzzy Hash: 25517CB4500A18BFDB219F64D988AAF7BFEFF09364F00441AF945A6210DB74EA14DF60
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00648592
                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 006485A2
                                                                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 006485AD
                                                                            • CloseHandle.KERNEL32(00000000), ref: 006485BA
                                                                            • GlobalLock.KERNEL32(00000000), ref: 006485C8
                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 006485D7
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 006485E0
                                                                            • CloseHandle.KERNEL32(00000000), ref: 006485E7
                                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 006485F8
                                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,0064FC38,?), ref: 00648611
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00648621
                                                                            • GetObjectW.GDI32(?,00000018,000000FF), ref: 00648641
                                                                            • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00648671
                                                                            • DeleteObject.GDI32(00000000), ref: 00648699
                                                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 006486AF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                            • String ID:
                                                                            • API String ID: 3840717409-0
                                                                            • Opcode ID: 520d438ff704f38a0d895df45f13c7858ebea4f275c815d562d5e423d58e6eef
                                                                            • Instruction ID: 46fe80c2b2c0b31a8ba293912d4092d617bdda6c9f2601200bab6d220f4e8655
                                                                            • Opcode Fuzzy Hash: 520d438ff704f38a0d895df45f13c7858ebea4f275c815d562d5e423d58e6eef
                                                                            • Instruction Fuzzy Hash: 2E411B75601204AFDB519FA5CC48EAF7BBAEF8A721F115058F905E7360DB709901DB60
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(00000000), ref: 00621502
                                                                            • VariantCopy.OLEAUT32(?,?), ref: 0062150B
                                                                            • VariantClear.OLEAUT32(?), ref: 00621517
                                                                            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 006215FB
                                                                            • VarR8FromDec.OLEAUT32(?,?), ref: 00621657
                                                                            • VariantInit.OLEAUT32(?), ref: 00621708
                                                                            • SysFreeString.OLEAUT32(?), ref: 0062178C
                                                                            • VariantClear.OLEAUT32(?), ref: 006217D8
                                                                            • VariantClear.OLEAUT32(?), ref: 006217E7
                                                                            • VariantInit.OLEAUT32(00000000), ref: 00621823
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                            • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                            • API String ID: 1234038744-3931177956
                                                                            • Opcode ID: 323a1b6b7a5f4552325242061534a36bb1d8dc0201b9c1b001a3937feeb0d67c
                                                                            • Instruction ID: 9faceb9c1a9fc2694d2671f9696947b0efc303c94916642988c497604e67d01f
                                                                            • Opcode Fuzzy Hash: 323a1b6b7a5f4552325242061534a36bb1d8dc0201b9c1b001a3937feeb0d67c
                                                                            • Instruction Fuzzy Hash: 25D1D6B1604925DBDB109F65E449BBDBBB6BF96700F108099F406AF280DB34ED42DF51
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                              • Part of subcall function 0063C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0063B6AE,?,?), ref: 0063C9B5
                                                                              • Part of subcall function 0063C998: _wcslen.LIBCMT ref: 0063C9F1
                                                                              • Part of subcall function 0063C998: _wcslen.LIBCMT ref: 0063CA68
                                                                              • Part of subcall function 0063C998: _wcslen.LIBCMT ref: 0063CA9E
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0063B6F4
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0063B772
                                                                            • RegDeleteValueW.ADVAPI32(?,?), ref: 0063B80A
                                                                            • RegCloseKey.ADVAPI32(?), ref: 0063B87E
                                                                            • RegCloseKey.ADVAPI32(?), ref: 0063B89C
                                                                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0063B8F2
                                                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0063B904
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 0063B922
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 0063B983
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0063B994
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                                            • API String ID: 146587525-4033151799
                                                                            • Opcode ID: 793ac58572861e3ebc0b8d7e4de08716db00832c086604537a975f8f4384d995
                                                                            • Instruction ID: c93022a75d882d70069b170ecbdf6909fcfdca9ebd89264aa8e1f141389a459e
                                                                            • Opcode Fuzzy Hash: 793ac58572861e3ebc0b8d7e4de08716db00832c086604537a975f8f4384d995
                                                                            • Instruction Fuzzy Hash: 1AC17B34204202AFD710DF14C499B6ABBE6FF85318F14949CF59A8B3A2CB71E945CBD1
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 006325D8
                                                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 006325E8
                                                                            • CreateCompatibleDC.GDI32(?), ref: 006325F4
                                                                            • SelectObject.GDI32(00000000,?), ref: 00632601
                                                                            • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0063266D
                                                                            • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 006326AC
                                                                            • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 006326D0
                                                                            • SelectObject.GDI32(?,?), ref: 006326D8
                                                                            • DeleteObject.GDI32(?), ref: 006326E1
                                                                            • DeleteDC.GDI32(?), ref: 006326E8
                                                                            • ReleaseDC.USER32(00000000,?), ref: 006326F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                            • String ID: (
                                                                            • API String ID: 2598888154-3887548279
                                                                            • Opcode ID: d38857535e0d30374f9f87e5e54202c9ebc3519c6c502b47e599fe808143bf81
                                                                            • Instruction ID: 9412092ec306f4fbb67a2df7023c26c545f693a00c5cf8471dc502af1b179474
                                                                            • Opcode Fuzzy Hash: d38857535e0d30374f9f87e5e54202c9ebc3519c6c502b47e599fe808143bf81
                                                                            • Instruction Fuzzy Hash: 02610275D0021AEFCF44CFA4D885AAEBBB6FF48310F208529E955A7350D771A941CFA4
                                                                            APIs
                                                                            • ___free_lconv_mon.LIBCMT ref: 005EDAA1
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED659
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED66B
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED67D
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED68F
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED6A1
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED6B3
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED6C5
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED6D7
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED6E9
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED6FB
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED70D
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED71F
                                                                              • Part of subcall function 005ED63C: _free.LIBCMT ref: 005ED731
                                                                            • _free.LIBCMT ref: 005EDA96
                                                                              • Part of subcall function 005E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000), ref: 005E29DE
                                                                              • Part of subcall function 005E29C8: GetLastError.KERNEL32(00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000,00000000), ref: 005E29F0
                                                                            • _free.LIBCMT ref: 005EDAB8
                                                                            • _free.LIBCMT ref: 005EDACD
                                                                            • _free.LIBCMT ref: 005EDAD8
                                                                            • _free.LIBCMT ref: 005EDAFA
                                                                            • _free.LIBCMT ref: 005EDB0D
                                                                            • _free.LIBCMT ref: 005EDB1B
                                                                            • _free.LIBCMT ref: 005EDB26
                                                                            • _free.LIBCMT ref: 005EDB5E
                                                                            • _free.LIBCMT ref: 005EDB65
                                                                            • _free.LIBCMT ref: 005EDB82
                                                                            • _free.LIBCMT ref: 005EDB9A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                            • String ID:
                                                                            • API String ID: 161543041-0
                                                                            • Opcode ID: 339b148553b0c86e2cdc93478ace90769c6491a5fde8ff12924c798b49809804
                                                                            • Instruction ID: 63d911c611341a438e162c4edd4c58c12f59ed076f76939446c5355245d09392
                                                                            • Opcode Fuzzy Hash: 339b148553b0c86e2cdc93478ace90769c6491a5fde8ff12924c798b49809804
                                                                            • Instruction Fuzzy Hash: 8B315F715042899FDB29AB36D84AB567FFDFF40310F155429E4D8D7192DA35AD808B30
                                                                            APIs
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 0061369C
                                                                            • _wcslen.LIBCMT ref: 006136A7
                                                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00613797
                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 0061380C
                                                                            • GetDlgCtrlID.USER32(?), ref: 0061385D
                                                                            • GetWindowRect.USER32(?,?), ref: 00613882
                                                                            • GetParent.USER32(?), ref: 006138A0
                                                                            • ScreenToClient.USER32(00000000), ref: 006138A7
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00613921
                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 0061395D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                            • String ID: %s%u
                                                                            • API String ID: 4010501982-679674701
                                                                            • Opcode ID: cde67419d6d206a7cea0ed34a300758f46d73d56af4f45319f58575d5890d8a2
                                                                            • Instruction ID: 812cbd5eff8c91150c0ad838ed5c75665687c2d7b5b51b3a1c5a3a080c360340
                                                                            • Opcode Fuzzy Hash: cde67419d6d206a7cea0ed34a300758f46d73d56af4f45319f58575d5890d8a2
                                                                            • Instruction Fuzzy Hash: 5B91B671204616AFD715DF24C885FEAF7AAFF44350F048919F99AD2390EB30EA85CB91
                                                                            APIs
                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00614994
                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 006149DA
                                                                            • _wcslen.LIBCMT ref: 006149EB
                                                                            • CharUpperBuffW.USER32(?,00000000), ref: 006149F7
                                                                            • _wcsstr.LIBVCRUNTIME ref: 00614A2C
                                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00614A64
                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00614A9D
                                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00614AE6
                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00614B20
                                                                            • GetWindowRect.USER32(?,?), ref: 00614B8B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                            • String ID: ThumbnailClass
                                                                            • API String ID: 1311036022-1241985126
                                                                            • Opcode ID: cd91fd7e51093ee6608cc801289e6589fa5a19f06ce67829f81d74f55646990f
                                                                            • Instruction ID: 02f8d5808c785b40a4de72f365354c4933e2e5dbaccb016f08ed5b2eb6f6313f
                                                                            • Opcode Fuzzy Hash: cd91fd7e51093ee6608cc801289e6589fa5a19f06ce67829f81d74f55646990f
                                                                            • Instruction Fuzzy Hash: A691AE710082069BDB14DF14C985BEA7BEAFF84354F08846AFD859B295DF30ED85CBA1
                                                                            APIs
                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0063CC64
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0063CC8D
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0063CD48
                                                                              • Part of subcall function 0063CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0063CCAA
                                                                              • Part of subcall function 0063CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0063CCBD
                                                                              • Part of subcall function 0063CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0063CCCF
                                                                              • Part of subcall function 0063CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0063CD05
                                                                              • Part of subcall function 0063CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0063CD28
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 0063CCF3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                                            • API String ID: 2734957052-4033151799
                                                                            • Opcode ID: b85c8179dde529a36e35bdbb46f85372f80ab481b39c52ab3458b15564d5b765
                                                                            • Instruction ID: 519cd712013138dbb32c5fae0f5d4e3e90c89b8b56b037778180258a4fa46537
                                                                            • Opcode Fuzzy Hash: b85c8179dde529a36e35bdbb46f85372f80ab481b39c52ab3458b15564d5b765
                                                                            • Instruction Fuzzy Hash: 44316C75902129BBDB208B65DC88EFFBB7EEF46764F001165B906E3240DA349A45DBE0
                                                                            APIs
                                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00623D40
                                                                            • _wcslen.LIBCMT ref: 00623D6D
                                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00623D9D
                                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00623DBE
                                                                            • RemoveDirectoryW.KERNEL32(?), ref: 00623DCE
                                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00623E55
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00623E60
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00623E6B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                            • String ID: :$\$\??\%s
                                                                            • API String ID: 1149970189-3457252023
                                                                            • Opcode ID: 9660a6e9b83b5aa47d9028c686253f55a7beacf002c6e653d7317d2453c64cb2
                                                                            • Instruction ID: 57e81a0226d9bce34d6a530c49dd94cbb3ab3134731852246d7e42bf880707ec
                                                                            • Opcode Fuzzy Hash: 9660a6e9b83b5aa47d9028c686253f55a7beacf002c6e653d7317d2453c64cb2
                                                                            • Instruction Fuzzy Hash: 5D31A376A0012AABDB219FA0DC49FEF37BEEF89710F1045A6F509D6260E77497448F24
                                                                            APIs
                                                                            • timeGetTime.WINMM ref: 0061E6B4
                                                                              • Part of subcall function 005CE551: timeGetTime.WINMM(?,?,0061E6D4), ref: 005CE555
                                                                            • Sleep.KERNEL32(0000000A), ref: 0061E6E1
                                                                            • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0061E705
                                                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0061E727
                                                                            • SetActiveWindow.USER32 ref: 0061E746
                                                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0061E754
                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 0061E773
                                                                            • Sleep.KERNEL32(000000FA), ref: 0061E77E
                                                                            • IsWindow.USER32 ref: 0061E78A
                                                                            • EndDialog.USER32(00000000), ref: 0061E79B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                            • String ID: BUTTON
                                                                            • API String ID: 1194449130-3405671355
                                                                            • Opcode ID: 21b63ae2f5f4e2e69231f9d721fc416e3165971d6d6907887b2dadffcda300d7
                                                                            • Instruction ID: fb868b64f9ff8e56e0eb9f185e08fddde99149291e975c115ff19481e2f3ccc3
                                                                            • Opcode Fuzzy Hash: 21b63ae2f5f4e2e69231f9d721fc416e3165971d6d6907887b2dadffcda300d7
                                                                            • Instruction Fuzzy Hash: 7721A474201241BFFB005F20EC99EA53BABF756358B186524F801823B1EB72DCC0CB64
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0061EA5D
                                                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0061EA73
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0061EA84
                                                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0061EA96
                                                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0061EAA7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: SendString$_wcslen
                                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                            • API String ID: 2420728520-1007645807
                                                                            • Opcode ID: 001c8992cb57e0a220fef7cd68dccb5b8f7ed00dd24b94ef79183dbe20a46b61
                                                                            • Instruction ID: f19cce03347470741e21f86e5bb65d25dd6f17e68208c8589b1705fcebf2f1b9
                                                                            • Opcode Fuzzy Hash: 001c8992cb57e0a220fef7cd68dccb5b8f7ed00dd24b94ef79183dbe20a46b61
                                                                            • Instruction Fuzzy Hash: 2E11A031A9022A79D720A7A1DC4ADFF6EBDFFD1F00F444429B915A20E1EEB05D45C9B0
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,00000001), ref: 00615CE2
                                                                            • GetWindowRect.USER32(00000000,?), ref: 00615CFB
                                                                            • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00615D59
                                                                            • GetDlgItem.USER32(?,00000002), ref: 00615D69
                                                                            • GetWindowRect.USER32(00000000,?), ref: 00615D7B
                                                                            • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00615DCF
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00615DDD
                                                                            • GetWindowRect.USER32(00000000,?), ref: 00615DEF
                                                                            • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00615E31
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00615E44
                                                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00615E5A
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00615E67
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                                            • String ID:
                                                                            • API String ID: 3096461208-0
                                                                            • Opcode ID: 803acb2be20c705209a23f8904041eed28eb3cdbb6233b1fd84bf56f8a74d044
                                                                            • Instruction ID: c62d58bc2832db94d5c1baf1844901d36c8e06ffe34c52210ed3f2e73dbae0aa
                                                                            • Opcode Fuzzy Hash: 803acb2be20c705209a23f8904041eed28eb3cdbb6233b1fd84bf56f8a74d044
                                                                            • Instruction Fuzzy Hash: 0D511C74A00615AFDB18CF68DD99AEEBBB6AF89310F148129F916E6390D7709E40CB50
                                                                            APIs
                                                                              • Part of subcall function 005C8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005C8BE8,?,00000000,?,?,?,?,005C8BBA,00000000,?), ref: 005C8FC5
                                                                            • DestroyWindow.USER32(?), ref: 005C8C81
                                                                            • KillTimer.USER32(00000000,?,?,?,?,005C8BBA,00000000,?), ref: 005C8D1B
                                                                            • DestroyAcceleratorTable.USER32(00000000), ref: 00606973
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,005C8BBA,00000000,?), ref: 006069A1
                                                                            • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,005C8BBA,00000000,?), ref: 006069B8
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,005C8BBA,00000000), ref: 006069D4
                                                                            • DeleteObject.GDI32(00000000), ref: 006069E6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                            • String ID:
                                                                            • API String ID: 641708696-0
                                                                            • Opcode ID: 764fa7a07b91bf744378dc960e2096754c5739c5b5b0c97d80efa4118201bf3e
                                                                            • Instruction ID: 3a83ac06cf16d3465c63773ba671b57d051cd7764be90776988140bffc557856
                                                                            • Opcode Fuzzy Hash: 764fa7a07b91bf744378dc960e2096754c5739c5b5b0c97d80efa4118201bf3e
                                                                            • Instruction Fuzzy Hash: CF61BE30102601EFCB259F54D958B767BF6FB42322F146A1DE0429FAA0CB75AC91DF94
                                                                            APIs
                                                                              • Part of subcall function 005C9944: GetWindowLongW.USER32(?,000000EB), ref: 005C9952
                                                                            • GetSysColor.USER32(0000000F), ref: 005C9862
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ColorLongWindow
                                                                            • String ID:
                                                                            • API String ID: 259745315-0
                                                                            • Opcode ID: 3e9b471f261ca6dcfd157025e9bf8d7fc05556fa633d2a7efeb9c08ff806c6ea
                                                                            • Instruction ID: 87cbb6a1a597fefe9c1e547f1eac865c128e7cad7f388d287248131fe2f027d7
                                                                            • Opcode Fuzzy Hash: 3e9b471f261ca6dcfd157025e9bf8d7fc05556fa633d2a7efeb9c08ff806c6ea
                                                                            • Instruction Fuzzy Hash: AE41BE35545640AFDB245F789C88FBA3BA6FB07330F145609F9A28B2E2C7309D42DB50
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,005FF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00619717
                                                                            • LoadStringW.USER32(00000000,?,005FF7F8,00000001), ref: 00619720
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,005FF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00619742
                                                                            • LoadStringW.USER32(00000000,?,005FF7F8,00000001), ref: 00619745
                                                                            • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00619866
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString$Message_wcslen
                                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                            • API String ID: 747408836-2268648507
                                                                            • Opcode ID: b21e54b8b1d79b01c49ef0a69fc725b1cf1c4cc1a83b7e4ff8cdc2e849017497
                                                                            • Instruction ID: e052fab83789d8751a5dc094001b9ec725ac4a1554420a7f59ada00c0e8df3a1
                                                                            • Opcode Fuzzy Hash: b21e54b8b1d79b01c49ef0a69fc725b1cf1c4cc1a83b7e4ff8cdc2e849017497
                                                                            • Instruction Fuzzy Hash: B441317280021AABCB04EBE0CD9ADEE7B79BF95340F644465F60572192EB356F48CB71
                                                                            APIs
                                                                              • Part of subcall function 005B6B57: _wcslen.LIBCMT ref: 005B6B6A
                                                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 006107A2
                                                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 006107BE
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 006107DA
                                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00610804
                                                                            • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0061082C
                                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00610837
                                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0061083C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                            • API String ID: 323675364-22481851
                                                                            • Opcode ID: 6c8328d7dd0e659ca2c9ff906d43257805cea7db5076f1aa19e3070eb16112af
                                                                            • Instruction ID: 5c69d195a04add976e56be9eb15b127804da88b4ce9bb6767f7229d78de58414
                                                                            • Opcode Fuzzy Hash: 6c8328d7dd0e659ca2c9ff906d43257805cea7db5076f1aa19e3070eb16112af
                                                                            • Instruction Fuzzy Hash: 09412972C00229ABDF11EBA4DC998EDBB79BF44350F144129E901A32A0EB70AE44CB90
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 00633C5C
                                                                            • CoInitialize.OLE32(00000000), ref: 00633C8A
                                                                            • CoUninitialize.OLE32 ref: 00633C94
                                                                            • _wcslen.LIBCMT ref: 00633D2D
                                                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00633DB1
                                                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00633ED5
                                                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00633F0E
                                                                            • CoGetObject.OLE32(?,00000000,0064FB98,?), ref: 00633F2D
                                                                            • SetErrorMode.KERNEL32(00000000), ref: 00633F40
                                                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00633FC4
                                                                            • VariantClear.OLEAUT32(?), ref: 00633FD8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                            • String ID:
                                                                            • API String ID: 429561992-0
                                                                            • Opcode ID: ea8a252fb366573bdf7647caff798d8f45de634a5a00aecfc11293101ae3fc13
                                                                            • Instruction ID: 2e7186e59ce8624bc49d0a3986e3a34c1e1a2eef91703ee7ad42f5254deee058
                                                                            • Opcode Fuzzy Hash: ea8a252fb366573bdf7647caff798d8f45de634a5a00aecfc11293101ae3fc13
                                                                            • Instruction Fuzzy Hash: 2EC122716082159FD700DF68C88496BBBEAFF89744F10491DF98A9B350DB31EE46CB92
                                                                            APIs
                                                                            • CoInitialize.OLE32(00000000), ref: 00627AF3
                                                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00627B8F
                                                                            • SHGetDesktopFolder.SHELL32(?), ref: 00627BA3
                                                                            • CoCreateInstance.OLE32(0064FD08,00000000,00000001,00676E6C,?), ref: 00627BEF
                                                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00627C74
                                                                            • CoTaskMemFree.OLE32(?,?), ref: 00627CCC
                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 00627D57
                                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00627D7A
                                                                            • CoTaskMemFree.OLE32(00000000), ref: 00627D81
                                                                            • CoTaskMemFree.OLE32(00000000), ref: 00627DD6
                                                                            • CoUninitialize.OLE32 ref: 00627DDC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                            • String ID:
                                                                            • API String ID: 2762341140-0
                                                                            • Opcode ID: c10c883f693569cb48b57370fb65ed168dcbe07d38b01ecb2708af562f1949fd
                                                                            • Instruction ID: a44d88f9869a6506f5c9efbaa978025c431306bb3d492dd0694c15acb2988b8d
                                                                            • Opcode Fuzzy Hash: c10c883f693569cb48b57370fb65ed168dcbe07d38b01ecb2708af562f1949fd
                                                                            • Instruction Fuzzy Hash: E1C12C75A04519AFCB14DFA4D888DAEBBFAFF48314B148499E8169B361D730ED41CF90
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00645504
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00645515
                                                                            • CharNextW.USER32(00000158), ref: 00645544
                                                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00645585
                                                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0064559B
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006455AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CharNext
                                                                            • String ID:
                                                                            • API String ID: 1350042424-0
                                                                            • Opcode ID: e8950498f2189e9bd814f66ee5cdfbaa1e721301afb5845350a608ba4ca6f90b
                                                                            • Instruction ID: c0082f771d83806d5daeff12109358f86a678cf823c631e174b508eef02715ba
                                                                            • Opcode Fuzzy Hash: e8950498f2189e9bd814f66ee5cdfbaa1e721301afb5845350a608ba4ca6f90b
                                                                            • Instruction Fuzzy Hash: 27619E74905608EFDF109F64CC859FE7BBAEB0A720F108145F926AA292D7748A81DB60
                                                                            APIs
                                                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0060FAAF
                                                                            • SafeArrayAllocData.OLEAUT32(?), ref: 0060FB08
                                                                            • VariantInit.OLEAUT32(?), ref: 0060FB1A
                                                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 0060FB3A
                                                                            • VariantCopy.OLEAUT32(?,?), ref: 0060FB8D
                                                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 0060FBA1
                                                                            • VariantClear.OLEAUT32(?), ref: 0060FBB6
                                                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 0060FBC3
                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0060FBCC
                                                                            • VariantClear.OLEAUT32(?), ref: 0060FBDE
                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0060FBE9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                            • String ID:
                                                                            • API String ID: 2706829360-0
                                                                            • Opcode ID: 6731f78f3df4a2ecff8dc5c1f925fbb92e6e3aa4d027031e8b27a82860484688
                                                                            • Instruction ID: 4fb71e7710f8d4684366459e8bf75b41fea4c95252cf2c4df2ba92c1ad68d3d3
                                                                            • Opcode Fuzzy Hash: 6731f78f3df4a2ecff8dc5c1f925fbb92e6e3aa4d027031e8b27a82860484688
                                                                            • Instruction Fuzzy Hash: 97413E35A01219DFCB14DFA4D858DEEBBBAFF48354F008469E945A7361DB30A945CFA0
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?), ref: 00619CA1
                                                                            • GetAsyncKeyState.USER32(000000A0), ref: 00619D22
                                                                            • GetKeyState.USER32(000000A0), ref: 00619D3D
                                                                            • GetAsyncKeyState.USER32(000000A1), ref: 00619D57
                                                                            • GetKeyState.USER32(000000A1), ref: 00619D6C
                                                                            • GetAsyncKeyState.USER32(00000011), ref: 00619D84
                                                                            • GetKeyState.USER32(00000011), ref: 00619D96
                                                                            • GetAsyncKeyState.USER32(00000012), ref: 00619DAE
                                                                            • GetKeyState.USER32(00000012), ref: 00619DC0
                                                                            • GetAsyncKeyState.USER32(0000005B), ref: 00619DD8
                                                                            • GetKeyState.USER32(0000005B), ref: 00619DEA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$Keyboard
                                                                            • String ID:
                                                                            • API String ID: 541375521-0
                                                                            • Opcode ID: 1a6612e54edd8a1a0730165e6fd4fc8f165cd29ab7ee1509dc7b7a07ba843cf6
                                                                            • Instruction ID: 082a913e4d38bc1ad81a3786956c8d31f2cf338ae7ee215b0b5f6e6d031cba58
                                                                            • Opcode Fuzzy Hash: 1a6612e54edd8a1a0730165e6fd4fc8f165cd29ab7ee1509dc7b7a07ba843cf6
                                                                            • Instruction Fuzzy Hash: 5341C534A04BC96DFF748664D8243E5BEA36F12344F0C805ADAC6567C2DBA499C8C7B2
                                                                            APIs
                                                                            • WSAStartup.WSOCK32(00000101,?), ref: 006305BC
                                                                            • inet_addr.WSOCK32(?), ref: 0063061C
                                                                            • gethostbyname.WSOCK32(?), ref: 00630628
                                                                            • IcmpCreateFile.IPHLPAPI ref: 00630636
                                                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 006306C6
                                                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 006306E5
                                                                            • IcmpCloseHandle.IPHLPAPI(?), ref: 006307B9
                                                                            • WSACleanup.WSOCK32 ref: 006307BF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                            • String ID: Ping
                                                                            • API String ID: 1028309954-2246546115
                                                                            • Opcode ID: 5403afca2024ef63dd7b751567a4df141c23fa15f3011c1b96d5fa0eb2a1bb83
                                                                            • Instruction ID: effd6e82350b7d806d9a808eabdd10d6a3177e39359cea72d428c5cd6e80714e
                                                                            • Opcode Fuzzy Hash: 5403afca2024ef63dd7b751567a4df141c23fa15f3011c1b96d5fa0eb2a1bb83
                                                                            • Instruction Fuzzy Hash: 9F917C356042019FE320DF15C499F5ABBE6AF85328F1485A9F46A8B7A2C770EC49CFD1
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$BuffCharLower
                                                                            • String ID: cdecl$none$stdcall$winapi
                                                                            • API String ID: 707087890-567219261
                                                                            • Opcode ID: 82df3fca05588c28d2a971fc68e836c81b14a8027a2a10a3e7557d6e3bbd0499
                                                                            • Instruction ID: 1575a3c11180aa885315518b3838c30e139d27a69123c667334c6632a30a803c
                                                                            • Opcode Fuzzy Hash: 82df3fca05588c28d2a971fc68e836c81b14a8027a2a10a3e7557d6e3bbd0499
                                                                            • Instruction Fuzzy Hash: F4517D31A002169FCB24DF68C9508FEB7A6BFA5720B214229F826A7384DB35DE4187D0
                                                                            APIs
                                                                            • CoInitialize.OLE32 ref: 00633774
                                                                            • CoUninitialize.OLE32 ref: 0063377F
                                                                            • CoCreateInstance.OLE32(?,00000000,00000017,0064FB78,?), ref: 006337D9
                                                                            • IIDFromString.OLE32(?,?), ref: 0063384C
                                                                            • VariantInit.OLEAUT32(?), ref: 006338E4
                                                                            • VariantClear.OLEAUT32(?), ref: 00633936
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                            • API String ID: 636576611-1287834457
                                                                            • Opcode ID: bff50d89c4d123207765f2a93fca9f8344e0fc98ac2f341bf4478069ef05a269
                                                                            • Instruction ID: 866c195ea1c461ec470fdb4584a2a065d9d2908ecfdba83b7493a9265a947092
                                                                            • Opcode Fuzzy Hash: bff50d89c4d123207765f2a93fca9f8344e0fc98ac2f341bf4478069ef05a269
                                                                            • Instruction Fuzzy Hash: C0618C70608321AFD310DF54C889B9ABBE6EF89710F104819F9859B391D770EE49CBD6
                                                                            APIs
                                                                            • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 006233CF
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 006233F0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: LoadString$_wcslen
                                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                            • API String ID: 4099089115-3080491070
                                                                            • Opcode ID: 71fcbfb0d33b2acbc3d6dfcc9e0fd691cca16e27e63996071fe20db5f60b4354
                                                                            • Instruction ID: f94c4b2d3cf6d61469fb92a324f6a5f71ecaf1b1104484a095fd5f9d8c593926
                                                                            • Opcode Fuzzy Hash: 71fcbfb0d33b2acbc3d6dfcc9e0fd691cca16e27e63996071fe20db5f60b4354
                                                                            • Instruction Fuzzy Hash: 1451913180061ABBDF14EBA0DD4AEEEBBBABF44300F244165F50972161EB252F58DF60
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$BuffCharUpper
                                                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                            • API String ID: 1256254125-769500911
                                                                            • Opcode ID: 9587c6004e8e7a3a1764d74bab4b3f133a9659833b1b98fd5dace95c35a4df24
                                                                            • Instruction ID: 8f6b054d2b6f9439daa8fb19415072161f12f502858e140e77c1fa47fe950dee
                                                                            • Opcode Fuzzy Hash: 9587c6004e8e7a3a1764d74bab4b3f133a9659833b1b98fd5dace95c35a4df24
                                                                            • Instruction Fuzzy Hash: ED41A432A001279ACB209F7DC9A05FE7BA6ABB1794B28512AE465D7384E731CDC1C7D0
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 006253A0
                                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00625416
                                                                            • GetLastError.KERNEL32 ref: 00625420
                                                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 006254A7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Error$Mode$DiskFreeLastSpace
                                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                            • API String ID: 4194297153-14809454
                                                                            • Opcode ID: a2c62b9ee23c32b1bd8a0b37b194ca3cc7e5129385f6d1208fa051b965c25f66
                                                                            • Instruction ID: ec3fa6596c97c3a63a4b96b2677b941ec0bdc85f96d49dd557fe87002b84a2f5
                                                                            • Opcode Fuzzy Hash: a2c62b9ee23c32b1bd8a0b37b194ca3cc7e5129385f6d1208fa051b965c25f66
                                                                            • Instruction Fuzzy Hash: D8319E35A00A159FD720EF68D488AEABBF6EF45305F148066E506CB392D771ED86CF90
                                                                            APIs
                                                                            • CreateMenu.USER32 ref: 00643C79
                                                                            • SetMenu.USER32(?,00000000), ref: 00643C88
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00643D10
                                                                            • IsMenu.USER32(?), ref: 00643D24
                                                                            • CreatePopupMenu.USER32 ref: 00643D2E
                                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00643D5B
                                                                            • DrawMenuBar.USER32 ref: 00643D63
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                            • String ID: 0$F
                                                                            • API String ID: 161812096-3044882817
                                                                            • Opcode ID: 5b663b7180e60c5212ba26cac1fc67876cf527a82c39659219672dd2b5782d85
                                                                            • Instruction ID: 652909e6e21efa4edc0c1f1534c4e879d1404b63a20426bc396063596debcd55
                                                                            • Opcode Fuzzy Hash: 5b663b7180e60c5212ba26cac1fc67876cf527a82c39659219672dd2b5782d85
                                                                            • Instruction Fuzzy Hash: EA414A79A01219AFDF14DF64D884AEE7BB6FF4A350F140029E95697360D730AA10CF94
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00643A9D
                                                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00643AA0
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00643AC7
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00643AEA
                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00643B62
                                                                            • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00643BAC
                                                                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00643BC7
                                                                            • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00643BE2
                                                                            • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00643BF6
                                                                            • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00643C13
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$LongWindow
                                                                            • String ID:
                                                                            • API String ID: 312131281-0
                                                                            • Opcode ID: 25d98115684001e8f17fdf7f3cde7c9ca41b1c17ac670292cc6383da57828e61
                                                                            • Instruction ID: ff4924eda94c9e7ed6921cd62fb74d2c2bcdfbf2898b4cdc9ec2eadcc1a7c863
                                                                            • Opcode Fuzzy Hash: 25d98115684001e8f17fdf7f3cde7c9ca41b1c17ac670292cc6383da57828e61
                                                                            • Instruction Fuzzy Hash: 87616A75900258AFDB10DFA8CC81EEE77B9EB09710F104199FA15AB3A1C774AA46DF50
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 0061B151
                                                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0061A1E1,?,00000001), ref: 0061B165
                                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0061B16C
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0061A1E1,?,00000001), ref: 0061B17B
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0061B18D
                                                                            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0061A1E1,?,00000001), ref: 0061B1A6
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0061A1E1,?,00000001), ref: 0061B1B8
                                                                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0061A1E1,?,00000001), ref: 0061B1FD
                                                                            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0061A1E1,?,00000001), ref: 0061B212
                                                                            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0061A1E1,?,00000001), ref: 0061B21D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                            • String ID:
                                                                            • API String ID: 2156557900-0
                                                                            • Opcode ID: d990d416b69946cda3ec3db34ec49c6762956f5c51cfb838d025f4db7e82f8b1
                                                                            • Instruction ID: 285ea66e47ae06a054007c244e322671d4b94c4e12ddfa918bb9d0d6f408621b
                                                                            • Opcode Fuzzy Hash: d990d416b69946cda3ec3db34ec49c6762956f5c51cfb838d025f4db7e82f8b1
                                                                            • Instruction Fuzzy Hash: AE31AC75601204BFDB10AF64DC59FFD7BBBAB62721F29A114FA00D6390D7B49A848F60
                                                                            APIs
                                                                            • _free.LIBCMT ref: 005E2C94
                                                                              • Part of subcall function 005E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000), ref: 005E29DE
                                                                              • Part of subcall function 005E29C8: GetLastError.KERNEL32(00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000,00000000), ref: 005E29F0
                                                                            • _free.LIBCMT ref: 005E2CA0
                                                                            • _free.LIBCMT ref: 005E2CAB
                                                                            • _free.LIBCMT ref: 005E2CB6
                                                                            • _free.LIBCMT ref: 005E2CC1
                                                                            • _free.LIBCMT ref: 005E2CCC
                                                                            • _free.LIBCMT ref: 005E2CD7
                                                                            • _free.LIBCMT ref: 005E2CE2
                                                                            • _free.LIBCMT ref: 005E2CED
                                                                            • _free.LIBCMT ref: 005E2CFB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 1862e4ff828f5f4daca6d7a91635f12f9f893976d6f777993050ee2eb75fe0e5
                                                                            • Instruction ID: 404bc4bf54a34e7b1c85ca2b473bc335b392edebd3eeacce696f8e5ebce8f3ad
                                                                            • Opcode Fuzzy Hash: 1862e4ff828f5f4daca6d7a91635f12f9f893976d6f777993050ee2eb75fe0e5
                                                                            • Instruction Fuzzy Hash: FB11C676100149AFCB0AEF56D846CDD3FA9FF45350F4254A0F9889F226D635EE909B90
                                                                            APIs
                                                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 005B1459
                                                                            • OleUninitialize.OLE32(?,00000000), ref: 005B14F8
                                                                            • UnregisterHotKey.USER32(?), ref: 005B16DD
                                                                            • DestroyWindow.USER32(?), ref: 005F24B9
                                                                            • FreeLibrary.KERNEL32(?), ref: 005F251E
                                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 005F254B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                            • String ID: close all
                                                                            • API String ID: 469580280-3243417748
                                                                            • Opcode ID: dd7f8bf6a0ee3f96553179c60f2fee282b8de816894558eb8bcfa85799886e81
                                                                            • Instruction ID: c25b99447586bb2b1116379ff2cf1310fb9fa7efaa364f0f68c98cc616941e5d
                                                                            • Opcode Fuzzy Hash: dd7f8bf6a0ee3f96553179c60f2fee282b8de816894558eb8bcfa85799886e81
                                                                            • Instruction Fuzzy Hash: 79D1AC70702622CFCB69EF14C4A9AA9FFA5BF45310F5441ADE54AAB252CB30AD12CF54
                                                                            APIs
                                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00627FAD
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00627FC1
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 00627FEB
                                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00628005
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00628017
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00628060
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 006280B0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectory$AttributesFile
                                                                            • String ID: *.*
                                                                            • API String ID: 769691225-438819550
                                                                            • Opcode ID: 647b01037dffeee29ae2e75d7c37ad6798f4c82b85773cf83887df06e8ab3f32
                                                                            • Instruction ID: ab33908e6cd672557e074f29ed84015b4637384351f877c91b2511139ca69a0d
                                                                            • Opcode Fuzzy Hash: 647b01037dffeee29ae2e75d7c37ad6798f4c82b85773cf83887df06e8ab3f32
                                                                            • Instruction Fuzzy Hash: 5681AD725086159FCB20EF14D8549AAB7EABB89320F15485EF8C5C7350EB34ED498FA2
                                                                            APIs
                                                                            • SetWindowLongW.USER32(?,000000EB), ref: 005B5C7A
                                                                              • Part of subcall function 005B5D0A: GetClientRect.USER32(?,?), ref: 005B5D30
                                                                              • Part of subcall function 005B5D0A: GetWindowRect.USER32(?,?), ref: 005B5D71
                                                                              • Part of subcall function 005B5D0A: ScreenToClient.USER32(?,?), ref: 005B5D99
                                                                            • GetDC.USER32 ref: 005F46F5
                                                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 005F4708
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 005F4716
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 005F472B
                                                                            • ReleaseDC.USER32(?,00000000), ref: 005F4733
                                                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 005F47C4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                            • String ID: U
                                                                            • API String ID: 4009187628-3372436214
                                                                            • Opcode ID: 8be51a3b666d7102518d36e8e9f93efaae858aaadcd4b26b4bf9cf37c7ea91dc
                                                                            • Instruction ID: 490ee07c4193a7e033e9d873df45db805b780b7d24408dd99902a166b506e46e
                                                                            • Opcode Fuzzy Hash: 8be51a3b666d7102518d36e8e9f93efaae858aaadcd4b26b4bf9cf37c7ea91dc
                                                                            • Instruction Fuzzy Hash: 6F71FD34401209DFCF259F64C984AFB3FB6FF4A360F144669EA519A2A6D3389C82DF50
                                                                            APIs
                                                                            • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 006235E4
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            • LoadStringW.USER32(00682390,?,00000FFF,?), ref: 0062360A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: LoadString$_wcslen
                                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                            • API String ID: 4099089115-2391861430
                                                                            • Opcode ID: a8124ca0d1431d50cde1d6d9548ddb07d60f5efa00019d1bae1348e5681d89f4
                                                                            • Instruction ID: 64b1ec048b766ee54320dfafa437b7d10e4e5af17fbe3621986ddb15e532595e
                                                                            • Opcode Fuzzy Hash: a8124ca0d1431d50cde1d6d9548ddb07d60f5efa00019d1bae1348e5681d89f4
                                                                            • Instruction Fuzzy Hash: 7651607180061ABBCF14EBA0DC86EEEBF7ABF44300F144125F505722A1EB356A99DF65
                                                                            APIs
                                                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0062C272
                                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0062C29A
                                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0062C2CA
                                                                            • GetLastError.KERNEL32 ref: 0062C322
                                                                            • SetEvent.KERNEL32(?), ref: 0062C336
                                                                            • InternetCloseHandle.WININET(00000000), ref: 0062C341
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                            • String ID:
                                                                            • API String ID: 3113390036-3916222277
                                                                            • Opcode ID: cd1ae88973c3c7e0c40578c5e5467ef1391a53351aaa98f174e8ce570d3a4d96
                                                                            • Instruction ID: fde8fb8a76fb5952b0286f54944c9d5c1883c693847ba73367c3ce107674be9a
                                                                            • Opcode Fuzzy Hash: cd1ae88973c3c7e0c40578c5e5467ef1391a53351aaa98f174e8ce570d3a4d96
                                                                            • Instruction Fuzzy Hash: E031ADB1501A14AFD761DF64AC88AAF7AFEEB49760B10891EF44693300DB70DD058F60
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,005F3AAF,?,?,Bad directive syntax error,0064CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 006198BC
                                                                            • LoadStringW.USER32(00000000,?,005F3AAF,?), ref: 006198C3
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00619987
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadMessageModuleString_wcslen
                                                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                            • API String ID: 858772685-4153970271
                                                                            • Opcode ID: 0e837265b6032efa9f753cfe6991569e9ebc6ac7cbb0d7e74d9cdc28b0406221
                                                                            • Instruction ID: f63463f38e8dacb62bfbe2f2517155b3c0ef749b5155d37dd0f593131eb0f8ce
                                                                            • Opcode Fuzzy Hash: 0e837265b6032efa9f753cfe6991569e9ebc6ac7cbb0d7e74d9cdc28b0406221
                                                                            • Instruction Fuzzy Hash: E421763180021EBBCF15AF90CC5AEEE7B76FF54304F084459F519751A2DB71AA58DB60
                                                                            APIs
                                                                            • GetParent.USER32 ref: 006120AB
                                                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 006120C0
                                                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0061214D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameParentSend
                                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                            • API String ID: 1290815626-3381328864
                                                                            • Opcode ID: 51b36cb8f122217d95aed83be97495ac29992da88511d17aebcfb1e2aa388c3e
                                                                            • Instruction ID: f2beff58ce2c37d08d9b5c5b91b2a8bccb8b19d99e173e8b56357c181d8d8bf5
                                                                            • Opcode Fuzzy Hash: 51b36cb8f122217d95aed83be97495ac29992da88511d17aebcfb1e2aa388c3e
                                                                            • Instruction Fuzzy Hash: 60117A7A684303BBF610A224DC2BCFA379EDB06724B215017FB09A42D1FAA158D21914
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                            • String ID:
                                                                            • API String ID: 1282221369-0
                                                                            • Opcode ID: 7aa21df6961391b161483c3d6f75078cf9db4c627dae85e4738cbc7f85b8bc40
                                                                            • Instruction ID: 036423cddcd4d7ac5e41309d83bbd86f2ed241e6a5a4d1a8869c5f4f1338996b
                                                                            • Opcode Fuzzy Hash: 7aa21df6961391b161483c3d6f75078cf9db4c627dae85e4738cbc7f85b8bc40
                                                                            • Instruction Fuzzy Hash: 69618972904381AFDB2DAFB69C49A697FAAFF41320F04456DF8D597242E631DD02C760
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00645186
                                                                            • ShowWindow.USER32(?,00000000), ref: 006451C7
                                                                            • ShowWindow.USER32(?,00000005,?,00000000), ref: 006451CD
                                                                            • SetFocus.USER32(?,?,00000005,?,00000000), ref: 006451D1
                                                                              • Part of subcall function 00646FBA: DeleteObject.GDI32(00000000), ref: 00646FE6
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0064520D
                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0064521A
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0064524D
                                                                            • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00645287
                                                                            • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00645296
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                            • String ID:
                                                                            • API String ID: 3210457359-0
                                                                            • Opcode ID: de3a09e026b7e73950aa0e4b03d1aaffb2e2d20ad6da3e665688b6eb94c246e7
                                                                            • Instruction ID: b065f34582daa9a4317eb4c9a02745bcc982278781dc46890bcb85cf408a7e13
                                                                            • Opcode Fuzzy Hash: de3a09e026b7e73950aa0e4b03d1aaffb2e2d20ad6da3e665688b6eb94c246e7
                                                                            • Instruction Fuzzy Hash: 29518030A51A09BFEF209F64CC49BDA3B67FB06321F144116F516963E2C7B5AA80DB41
                                                                            APIs
                                                                            • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00606890
                                                                            • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 006068A9
                                                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 006068B9
                                                                            • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 006068D1
                                                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 006068F2
                                                                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,005C8874,00000000,00000000,00000000,000000FF,00000000), ref: 00606901
                                                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0060691E
                                                                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,005C8874,00000000,00000000,00000000,000000FF,00000000), ref: 0060692D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                            • String ID:
                                                                            • API String ID: 1268354404-0
                                                                            • Opcode ID: e3fc6cc28b72f69811ee9155aee7b5f7410a9a864a36bcba51a7416b7183f547
                                                                            • Instruction ID: 7346b9e91084c5fe2ed2e111e4ad7690c6809b330f267f811b84b74765913462
                                                                            • Opcode Fuzzy Hash: e3fc6cc28b72f69811ee9155aee7b5f7410a9a864a36bcba51a7416b7183f547
                                                                            • Instruction Fuzzy Hash: F851667060020AEFDB248F64CC55FAA7BBAFB89764F10451CF956962E0DB70ED90DB50
                                                                            APIs
                                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0062C182
                                                                            • GetLastError.KERNEL32 ref: 0062C195
                                                                            • SetEvent.KERNEL32(?), ref: 0062C1A9
                                                                              • Part of subcall function 0062C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0062C272
                                                                              • Part of subcall function 0062C253: GetLastError.KERNEL32 ref: 0062C322
                                                                              • Part of subcall function 0062C253: SetEvent.KERNEL32(?), ref: 0062C336
                                                                              • Part of subcall function 0062C253: InternetCloseHandle.WININET(00000000), ref: 0062C341
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                            • String ID:
                                                                            • API String ID: 337547030-0
                                                                            • Opcode ID: b960a133a3a2a069fae9711f8d1e25c939b0af07a74a56713d1ebb70347341f5
                                                                            • Instruction ID: 3ff593e1a03e1559cbae2d2b844adc9b213a35e01c4b01cb0383c283d4257da8
                                                                            • Opcode Fuzzy Hash: b960a133a3a2a069fae9711f8d1e25c939b0af07a74a56713d1ebb70347341f5
                                                                            • Instruction Fuzzy Hash: 64317E75102A11EFDB219FA5ED44AABBBEAFF59320B00441DF95683710DB31E9149FA0
                                                                            APIs
                                                                              • Part of subcall function 00613A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00613A57
                                                                              • Part of subcall function 00613A3D: GetCurrentThreadId.KERNEL32 ref: 00613A5E
                                                                              • Part of subcall function 00613A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006125B3), ref: 00613A65
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 006125BD
                                                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 006125DB
                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 006125DF
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 006125E9
                                                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00612601
                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00612605
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 0061260F
                                                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00612623
                                                                            • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00612627
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                            • String ID:
                                                                            • API String ID: 2014098862-0
                                                                            • Opcode ID: e3429e15240507c830738cff8042cc26f907bea6392ebc23c3602962b7f0e983
                                                                            • Instruction ID: 3e0e7eea465d0313401f6eccc65f513a77de518dce46749b5255039c32341b36
                                                                            • Opcode Fuzzy Hash: e3429e15240507c830738cff8042cc26f907bea6392ebc23c3602962b7f0e983
                                                                            • Instruction Fuzzy Hash: 1801D830391220BBFB506768DC8AF993F5ADF4EB21F101005F318AF2D1C9E114849AA9
                                                                            APIs
                                                                            • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00611449,?,?,00000000), ref: 0061180C
                                                                            • HeapAlloc.KERNEL32(00000000,?,00611449,?,?,00000000), ref: 00611813
                                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00611449,?,?,00000000), ref: 00611828
                                                                            • GetCurrentProcess.KERNEL32(?,00000000,?,00611449,?,?,00000000), ref: 00611830
                                                                            • DuplicateHandle.KERNEL32(00000000,?,00611449,?,?,00000000), ref: 00611833
                                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00611449,?,?,00000000), ref: 00611843
                                                                            • GetCurrentProcess.KERNEL32(00611449,00000000,?,00611449,?,?,00000000), ref: 0061184B
                                                                            • DuplicateHandle.KERNEL32(00000000,?,00611449,?,?,00000000), ref: 0061184E
                                                                            • CreateThread.KERNEL32(00000000,00000000,00611874,00000000,00000000,00000000), ref: 00611868
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                            • String ID:
                                                                            • API String ID: 1957940570-0
                                                                            • Opcode ID: 2dbc61c4c70b118e3ea993e1b099666c278f8a64683643a8ad272cbe12b660a3
                                                                            • Instruction ID: 35074de8621666adf128d03b1c9fb2d03e360c14dc8626db6ea27104abd3f6bb
                                                                            • Opcode Fuzzy Hash: 2dbc61c4c70b118e3ea993e1b099666c278f8a64683643a8ad272cbe12b660a3
                                                                            • Instruction Fuzzy Hash: 8001BF75341304BFE750AFA5DC4DF573B6DEB8AB11F015411FA05DB291C6709800CB20
                                                                            APIs
                                                                              • Part of subcall function 0061D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0061D501
                                                                              • Part of subcall function 0061D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0061D50F
                                                                              • Part of subcall function 0061D4DC: CloseHandle.KERNEL32(00000000), ref: 0061D5DC
                                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0063A16D
                                                                            • GetLastError.KERNEL32 ref: 0063A180
                                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0063A1B3
                                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0063A268
                                                                            • GetLastError.KERNEL32(00000000), ref: 0063A273
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0063A2C4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                            • String ID: SeDebugPrivilege
                                                                            • API String ID: 2533919879-2896544425
                                                                            • Opcode ID: 3837c0e74b73b256984332b2ef376e556fc9867dbd9513e225bea5d8c33b5e66
                                                                            • Instruction ID: c0f30e25b1c1a2001550c011f9a80b78c702b026dece76fa72c08938433d461d
                                                                            • Opcode Fuzzy Hash: 3837c0e74b73b256984332b2ef376e556fc9867dbd9513e225bea5d8c33b5e66
                                                                            • Instruction Fuzzy Hash: 4F6190342042429FD720DF54C498F66BBE2AF45318F18849CE4A68BBA3C776ED45DBD2
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00643925
                                                                            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0064393A
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00643954
                                                                            • _wcslen.LIBCMT ref: 00643999
                                                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 006439C6
                                                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 006439F4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window_wcslen
                                                                            • String ID: SysListView32
                                                                            • API String ID: 2147712094-78025650
                                                                            • Opcode ID: 3c05218eba4a1b001b665c9462335a9b99f992c6d7f3f3a095061932adac296f
                                                                            • Instruction ID: 2ccee8d030aa87bb433e227118afbb7ded81d615dfb3f550cade053d1082dfd8
                                                                            • Opcode Fuzzy Hash: 3c05218eba4a1b001b665c9462335a9b99f992c6d7f3f3a095061932adac296f
                                                                            • Instruction Fuzzy Hash: 5E418471A00219ABEF219F64CC49FEA7BAAFF48350F110526F958E7381D7759E84CB90
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0061BCFD
                                                                            • IsMenu.USER32(00000000), ref: 0061BD1D
                                                                            • CreatePopupMenu.USER32 ref: 0061BD53
                                                                            • GetMenuItemCount.USER32(00F65750), ref: 0061BDA4
                                                                            • InsertMenuItemW.USER32(00F65750,?,00000001,00000030), ref: 0061BDCC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                            • String ID: 0$2
                                                                            • API String ID: 93392585-3793063076
                                                                            • Opcode ID: 9728daff9a3fcc440c45f3f1ade5438339177b0f76eae7d87dee58d7b8db3f89
                                                                            • Instruction ID: ccf2b4e548c4c7de49e6f1b71e976f49c222754a8eedd96ffc13e699aa0891b3
                                                                            • Opcode Fuzzy Hash: 9728daff9a3fcc440c45f3f1ade5438339177b0f76eae7d87dee58d7b8db3f89
                                                                            • Instruction Fuzzy Hash: 98519D70A002059BDB28CFA9E884BEEBBF6BF59324F18A15DE411D7391D7709981CB61
                                                                            APIs
                                                                            • _ValidateLocalCookies.LIBCMT ref: 005D2D4B
                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 005D2D53
                                                                            • _ValidateLocalCookies.LIBCMT ref: 005D2DE1
                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 005D2E0C
                                                                            • _ValidateLocalCookies.LIBCMT ref: 005D2E61
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                            • String ID: &H]$csm
                                                                            • API String ID: 1170836740-3158270856
                                                                            • Opcode ID: e896449744094af590505ee06858c9cf484a894fe0b54d6690851964c5474b51
                                                                            • Instruction ID: 71b5b375afa4ce9ceec50ce72bac3ca5522e68100a7b280fe19ec8a9a0f08d78
                                                                            • Opcode Fuzzy Hash: e896449744094af590505ee06858c9cf484a894fe0b54d6690851964c5474b51
                                                                            • Instruction Fuzzy Hash: 67417434A01209ABCF20EF6CC845A9EBFB6BF55325F148157E814AB352D7319E06CBD1
                                                                            APIs
                                                                            • LoadIconW.USER32(00000000,00007F03), ref: 0061C913
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: IconLoad
                                                                            • String ID: blank$info$question$stop$warning
                                                                            • API String ID: 2457776203-404129466
                                                                            • Opcode ID: 85e9ce7ada5fd1f96e83f8e48413de81627c30f620ab94381f4c533791e509ca
                                                                            • Instruction ID: 6200d820f25507d25aee4e124c4050c522430766ecdf155c3493a596006ce0cb
                                                                            • Opcode Fuzzy Hash: 85e9ce7ada5fd1f96e83f8e48413de81627c30f620ab94381f4c533791e509ca
                                                                            • Instruction Fuzzy Hash: C6113D316C9707BBE7049B58DCC3CEE2BAEDF15374B14542BF504AA382D7705D805664
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$LocalTime
                                                                            • String ID:
                                                                            • API String ID: 952045576-0
                                                                            • Opcode ID: d8cd37e528adc3c38fd14dc528e786895761205e52e2620cd869309b61509cf9
                                                                            • Instruction ID: f092c8f1b84438588878a750d83d82c98fdf96de305ce216d1a681f780f4ab13
                                                                            • Opcode Fuzzy Hash: d8cd37e528adc3c38fd14dc528e786895761205e52e2620cd869309b61509cf9
                                                                            • Instruction Fuzzy Hash: 18419269C1011966CB21EBB98C8E9CFBBA9BF85310F508463E914E3221EB34E245C7E5
                                                                            APIs
                                                                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0060682C,00000004,00000000,00000000), ref: 005CF953
                                                                            • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0060682C,00000004,00000000,00000000), ref: 0060F3D1
                                                                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0060682C,00000004,00000000,00000000), ref: 0060F454
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ShowWindow
                                                                            • String ID:
                                                                            • API String ID: 1268545403-0
                                                                            • Opcode ID: 421c7b5aef107199f055202a4833d5652f7ad588d48bc468af59fdf658a851e7
                                                                            • Instruction ID: a3aa6e1f3575a98eb8518cde3d5ab9f382bde03cff285ec75aadc0e3a15a65dd
                                                                            • Opcode Fuzzy Hash: 421c7b5aef107199f055202a4833d5652f7ad588d48bc468af59fdf658a851e7
                                                                            • Instruction Fuzzy Hash: 86412830208780BECF7C8B689888F6B7F97BB47320F14543CE48756AA1C632A880CB51
                                                                            APIs
                                                                            • DeleteObject.GDI32(00000000), ref: 00642D1B
                                                                            • GetDC.USER32(00000000), ref: 00642D23
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00642D2E
                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00642D3A
                                                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00642D76
                                                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00642D87
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00645A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00642DC2
                                                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00642DE1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 3864802216-0
                                                                            • Opcode ID: fe1b505b9d6936b8e7d20520fb71f7518c345b04edc492d9fef2c2a675724165
                                                                            • Instruction ID: 4653961b26befd5fdb11302d77b09a3968a5be5e649eb0f89a1cb8dad29a9877
                                                                            • Opcode Fuzzy Hash: fe1b505b9d6936b8e7d20520fb71f7518c345b04edc492d9fef2c2a675724165
                                                                            • Instruction Fuzzy Hash: 1C317F76202614BFEB214F50CC89FEB3FAAEF0A725F044055FE089A291C6759C50C7A4
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _memcmp
                                                                            • String ID:
                                                                            • API String ID: 2931989736-0
                                                                            • Opcode ID: afa3b12ad908d829bba212144807a8b35992616e8a9ff46e3cb12c8ddf8768f4
                                                                            • Instruction ID: 54e064243eb4dc4fd6b699f4795a0fc5b4b89b3f377500000c26b16fc37ee9c6
                                                                            • Opcode Fuzzy Hash: afa3b12ad908d829bba212144807a8b35992616e8a9ff46e3cb12c8ddf8768f4
                                                                            • Instruction Fuzzy Hash: 5621C861640E06FBD21456144D92FFBA35FAFA1384B480422FD079A792F761ED5181E9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: NULL Pointer assignment$Not an Object type
                                                                            • API String ID: 0-572801152
                                                                            • Opcode ID: 356dfc2cb3ff3fbd63c0ab2aa0ee4a078f2d1b59fbea12b6517bac3c8df11a70
                                                                            • Instruction ID: 91084092ac34765937c0f1bf3f2f9169cb9a7bb051f777d248bc33dfd089bf83
                                                                            • Opcode Fuzzy Hash: 356dfc2cb3ff3fbd63c0ab2aa0ee4a078f2d1b59fbea12b6517bac3c8df11a70
                                                                            • Instruction Fuzzy Hash: 32D1AE71A0060A9FDF14CFA8C880BEEB7B6BF48354F148469E916AB381E771DD45CB90
                                                                            APIs
                                                                            • GetCPInfo.KERNEL32(?,?), ref: 005F15CE
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 005F1651
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 005F16E4
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 005F16FB
                                                                              • Part of subcall function 005E3820: RtlAllocateHeap.NTDLL(00000000,?,00681444,?,005CFDF5,?,?,005BA976,00000010,00681440,005B13FC,?,005B13C6,?,005B1129), ref: 005E3852
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 005F1777
                                                                            • __freea.LIBCMT ref: 005F17A2
                                                                            • __freea.LIBCMT ref: 005F17AE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                            • String ID:
                                                                            • API String ID: 2829977744-0
                                                                            • Opcode ID: dabf4c31d2a7dd4d4234078c9908c1a867dbf6743f71043b2cd756e6ef8721e2
                                                                            • Instruction ID: 55eda8d14bda238fc2623955c884f27a4bdf9974eeaf62a114747ca1698a82e6
                                                                            • Opcode Fuzzy Hash: dabf4c31d2a7dd4d4234078c9908c1a867dbf6743f71043b2cd756e6ef8721e2
                                                                            • Instruction Fuzzy Hash: DF91C271E01A0ADADB249E74C885AFE7FB5FF89310F180659EA06E7141DB29CC40CB68
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit
                                                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                            • API String ID: 2610073882-625585964
                                                                            • Opcode ID: e7d457e8caabc30e878a8c2275b3f53bcd92bbfce4f94a893443ff4e6c5b1e9f
                                                                            • Instruction ID: 253d720640b90f2031a845346abd367fcedd00f89e27370e998f8f6b9c2f5dfc
                                                                            • Opcode Fuzzy Hash: e7d457e8caabc30e878a8c2275b3f53bcd92bbfce4f94a893443ff4e6c5b1e9f
                                                                            • Instruction Fuzzy Hash: 7A918171E00215ABDF20CFA5C885FEEBBBAEF46714F108559F505AB280DB70A941CFA0
                                                                            APIs
                                                                            • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0062125C
                                                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00621284
                                                                            • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 006212A8
                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006212D8
                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0062135F
                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 006213C4
                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00621430
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                            • String ID:
                                                                            • API String ID: 2550207440-0
                                                                            • Opcode ID: 565f23524c52732128100255cb9665a741c8cb6b5c09348b736a5f83629b55b5
                                                                            • Instruction ID: d806c98f362864f88ed189e270c81cd0e7c006cb967b855f0e161e09b57921a2
                                                                            • Opcode Fuzzy Hash: 565f23524c52732128100255cb9665a741c8cb6b5c09348b736a5f83629b55b5
                                                                            • Instruction Fuzzy Hash: 8A91E175A046299FDB00DFA8E885BFEB7B6FF56320F104029E900EB291D774A941CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectSelect$BeginCreatePath
                                                                            • String ID:
                                                                            • API String ID: 3225163088-0
                                                                            • Opcode ID: 6e9c304858501589c13eeceed45fd06253429da64284348c2b966d3b6f6b20de
                                                                            • Instruction ID: 39aeb1632d70a235f7b11af4b3e9d0c905de813393b029ced6d55f5bcadf8294
                                                                            • Opcode Fuzzy Hash: 6e9c304858501589c13eeceed45fd06253429da64284348c2b966d3b6f6b20de
                                                                            • Instruction Fuzzy Hash: ED912771D40219AFCB14CFE9C888AEEBFB9FF49320F148459E515B7291D275AA41CBA0
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 0063396B
                                                                            • CharUpperBuffW.USER32(?,?), ref: 00633A7A
                                                                            • _wcslen.LIBCMT ref: 00633A8A
                                                                            • VariantClear.OLEAUT32(?), ref: 00633C1F
                                                                              • Part of subcall function 00620CDF: VariantInit.OLEAUT32(00000000), ref: 00620D1F
                                                                              • Part of subcall function 00620CDF: VariantCopy.OLEAUT32(?,?), ref: 00620D28
                                                                              • Part of subcall function 00620CDF: VariantClear.OLEAUT32(?), ref: 00620D34
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                            • API String ID: 4137639002-1221869570
                                                                            • Opcode ID: f75e28b0a050a8f45146b7f775cc776b12c9c22b3019f35a06867bb73f416688
                                                                            • Instruction ID: 59899f00168baf57df44a21b342c8fd6d1c4a54e29fa0f70a524775a499c18f2
                                                                            • Opcode Fuzzy Hash: f75e28b0a050a8f45146b7f775cc776b12c9c22b3019f35a06867bb73f416688
                                                                            • Instruction Fuzzy Hash: F29159756083159FC700DF64C4859AABBE6FF89314F14882DF88A9B351DB31EE46CB92
                                                                            APIs
                                                                              • Part of subcall function 0061000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0060FF41,80070057,?,?,?,0061035E), ref: 0061002B
                                                                              • Part of subcall function 0061000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0060FF41,80070057,?,?), ref: 00610046
                                                                              • Part of subcall function 0061000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0060FF41,80070057,?,?), ref: 00610054
                                                                              • Part of subcall function 0061000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0060FF41,80070057,?), ref: 00610064
                                                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00634C51
                                                                            • _wcslen.LIBCMT ref: 00634D59
                                                                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00634DCF
                                                                            • CoTaskMemFree.OLE32(?), ref: 00634DDA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                            • String ID: NULL Pointer assignment
                                                                            • API String ID: 614568839-2785691316
                                                                            • Opcode ID: 6c0aed45a74d4b59a60d9e39e616a3622ea74dcc2f0f3d49cd0b558ef3b42031
                                                                            • Instruction ID: 2ad3043ddce2f8cff98abac6d75abab75e9dd3b88cc4cb25eeb27605a1b40a46
                                                                            • Opcode Fuzzy Hash: 6c0aed45a74d4b59a60d9e39e616a3622ea74dcc2f0f3d49cd0b558ef3b42031
                                                                            • Instruction Fuzzy Hash: 3E911871D0021DAFDF14DFA4C895AEEBBB9FF48310F10816AE915A7251DB34AA45CFA0
                                                                            APIs
                                                                            • GetMenu.USER32(?), ref: 00642183
                                                                            • GetMenuItemCount.USER32(00000000), ref: 006421B5
                                                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 006421DD
                                                                            • _wcslen.LIBCMT ref: 00642213
                                                                            • GetMenuItemID.USER32(?,?), ref: 0064224D
                                                                            • GetSubMenu.USER32(?,?), ref: 0064225B
                                                                              • Part of subcall function 00613A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00613A57
                                                                              • Part of subcall function 00613A3D: GetCurrentThreadId.KERNEL32 ref: 00613A5E
                                                                              • Part of subcall function 00613A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006125B3), ref: 00613A65
                                                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 006422E3
                                                                              • Part of subcall function 0061E97B: Sleep.KERNEL32 ref: 0061E9F3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                            • String ID:
                                                                            • API String ID: 4196846111-0
                                                                            • Opcode ID: efe362dd0d5627b13f4951f01155dd797d1ee166259f86ffa3e8ffb457fcd930
                                                                            • Instruction ID: d4d3dd7206a2a39914188fe55231aea1691a9938f5ccef30f452a0cff10464c7
                                                                            • Opcode Fuzzy Hash: efe362dd0d5627b13f4951f01155dd797d1ee166259f86ffa3e8ffb457fcd930
                                                                            • Instruction Fuzzy Hash: 35717E75A00206AFCB10DF64C855AAEBBF6FF88320F648459F916EB341D774EE418B90
                                                                            APIs
                                                                            • GetParent.USER32(?), ref: 0061AEF9
                                                                            • GetKeyboardState.USER32(?), ref: 0061AF0E
                                                                            • SetKeyboardState.USER32(?), ref: 0061AF6F
                                                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 0061AF9D
                                                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 0061AFBC
                                                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 0061AFFD
                                                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0061B020
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: 3067a9fd767d0ddac4928210db76ee3e167347394036720899446fd4e73eca87
                                                                            • Instruction ID: 1a274c2278ea694cc87a09694ef3d6759ff008b9790cfd504c2a05bf184454a0
                                                                            • Opcode Fuzzy Hash: 3067a9fd767d0ddac4928210db76ee3e167347394036720899446fd4e73eca87
                                                                            • Instruction Fuzzy Hash: 4651E0B0A057D53DFB3682748C45BFABEAA5B06304F0C8589F1D9859C2C3E8ADC9D761
                                                                            APIs
                                                                            • GetParent.USER32(00000000), ref: 0061AD19
                                                                            • GetKeyboardState.USER32(?), ref: 0061AD2E
                                                                            • SetKeyboardState.USER32(?), ref: 0061AD8F
                                                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0061ADBB
                                                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0061ADD8
                                                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0061AE17
                                                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0061AE38
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: 7f6e36885fc86f132d5483440aa5dd16702817f641f24f25d62e1280c232bdec
                                                                            • Instruction ID: 35acba1d0cea4e32a1ccf37ffacb0cd1988d71b9bf2ca172e414b93b5c665239
                                                                            • Opcode Fuzzy Hash: 7f6e36885fc86f132d5483440aa5dd16702817f641f24f25d62e1280c232bdec
                                                                            • Instruction Fuzzy Hash: 3451E7B19057D53DFB3283B48C55BFA7EAA5F46300F0C8588E1D586AC2C2A4ECD8E752
                                                                            APIs
                                                                            • GetConsoleCP.KERNEL32(005F3CD6,?,?,?,?,?,?,?,?,005E5BA3,?,?,005F3CD6,?,?), ref: 005E5470
                                                                            • __fassign.LIBCMT ref: 005E54EB
                                                                            • __fassign.LIBCMT ref: 005E5506
                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,005F3CD6,00000005,00000000,00000000), ref: 005E552C
                                                                            • WriteFile.KERNEL32(?,005F3CD6,00000000,005E5BA3,00000000,?,?,?,?,?,?,?,?,?,005E5BA3,?), ref: 005E554B
                                                                            • WriteFile.KERNEL32(?,?,00000001,005E5BA3,00000000,?,?,?,?,?,?,?,?,?,005E5BA3,?), ref: 005E5584
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                            • String ID:
                                                                            • API String ID: 1324828854-0
                                                                            • Opcode ID: 2bddaee57a6a33cda62d45add0b7174848295365d538ac7be57430b1ebd251f1
                                                                            • Instruction ID: 85fa166011feb5fed686ffa5bf591e329a86d3a92ed251f62550658c05edd55e
                                                                            • Opcode Fuzzy Hash: 2bddaee57a6a33cda62d45add0b7174848295365d538ac7be57430b1ebd251f1
                                                                            • Instruction Fuzzy Hash: 3651E370A00689AFDB14CFA9D845AEEBBF9FF09304F14451BF995E7291E7309A40CB60
                                                                            APIs
                                                                              • Part of subcall function 0063304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0063307A
                                                                              • Part of subcall function 0063304E: _wcslen.LIBCMT ref: 0063309B
                                                                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00631112
                                                                            • WSAGetLastError.WSOCK32 ref: 00631121
                                                                            • WSAGetLastError.WSOCK32 ref: 006311C9
                                                                            • closesocket.WSOCK32(00000000), ref: 006311F9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 2675159561-0
                                                                            • Opcode ID: 4ed22e9ab5a3833301696e5b37aadf2ab81c9082191418e1f58e108d2fda2ab9
                                                                            • Instruction ID: e33955e67c79903c38118a5cc274cc4021270ef986d1115350dfab58e5085c48
                                                                            • Opcode Fuzzy Hash: 4ed22e9ab5a3833301696e5b37aadf2ab81c9082191418e1f58e108d2fda2ab9
                                                                            • Instruction Fuzzy Hash: 2241C135600214AFDB109F14C885BEABBEAFF86364F148059F9159F391C774AD41CBE1
                                                                            APIs
                                                                              • Part of subcall function 0061DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0061CF22,?), ref: 0061DDFD
                                                                              • Part of subcall function 0061DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0061CF22,?), ref: 0061DE16
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 0061CF45
                                                                            • MoveFileW.KERNEL32(?,?), ref: 0061CF7F
                                                                            • _wcslen.LIBCMT ref: 0061D005
                                                                            • _wcslen.LIBCMT ref: 0061D01B
                                                                            • SHFileOperationW.SHELL32(?), ref: 0061D061
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                            • String ID: \*.*
                                                                            • API String ID: 3164238972-1173974218
                                                                            • Opcode ID: 8839d827d0ea66310ced717678e59c63a2a0c9a27bdb1d40b37321d94e82feee
                                                                            • Instruction ID: 27fed7b08804b8dbaa365934350aa3740dd662b61977dcb3b148e970f3601588
                                                                            • Opcode Fuzzy Hash: 8839d827d0ea66310ced717678e59c63a2a0c9a27bdb1d40b37321d94e82feee
                                                                            • Instruction Fuzzy Hash: E34187718452195FDF12EFA4D985ADEB7BAAF48340F1400EAE505EB241EB34E7C9CB50
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00642E1C
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00642E4F
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00642E84
                                                                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00642EB6
                                                                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00642EE0
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00642EF1
                                                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00642F0B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow$MessageSend
                                                                            • String ID:
                                                                            • API String ID: 2178440468-0
                                                                            • Opcode ID: b114d8c544bbe10c0b862513139a816b8096c3582035eb00294c4c3fa00f6782
                                                                            • Instruction ID: bbb96176b5f3510a347beca3a64e42bde31f5639ff36e6366e6c00c51aa012bc
                                                                            • Opcode Fuzzy Hash: b114d8c544bbe10c0b862513139a816b8096c3582035eb00294c4c3fa00f6782
                                                                            • Instruction Fuzzy Hash: FC311434645142AFDB208F58DC94FA537E6EB4A720FA52164FA148F3B2CB71A841DB00
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00617769
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0061778F
                                                                            • SysAllocString.OLEAUT32(00000000), ref: 00617792
                                                                            • SysAllocString.OLEAUT32(?), ref: 006177B0
                                                                            • SysFreeString.OLEAUT32(?), ref: 006177B9
                                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 006177DE
                                                                            • SysAllocString.OLEAUT32(?), ref: 006177EC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                            • String ID:
                                                                            • API String ID: 3761583154-0
                                                                            • Opcode ID: c3a21e812a6260e19075449a1dd26be537fa5a60c7b53a4f23083926dce39621
                                                                            • Instruction ID: 34dbe0627e74e36fd44529a15d51fe988d61f58a45df8a52081c4628dd3c7e88
                                                                            • Opcode Fuzzy Hash: c3a21e812a6260e19075449a1dd26be537fa5a60c7b53a4f23083926dce39621
                                                                            • Instruction Fuzzy Hash: B921B27A605219AFDB10DFA8CC88DFB77EEEB09364B088025F915DB291D670DC818760
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00617842
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00617868
                                                                            • SysAllocString.OLEAUT32(00000000), ref: 0061786B
                                                                            • SysAllocString.OLEAUT32 ref: 0061788C
                                                                            • SysFreeString.OLEAUT32 ref: 00617895
                                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 006178AF
                                                                            • SysAllocString.OLEAUT32(?), ref: 006178BD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                            • String ID:
                                                                            • API String ID: 3761583154-0
                                                                            • Opcode ID: d9e79d6adfe56fb8f9734a2bbd1f36522f8148df45df70a855fb005dd2ba3509
                                                                            • Instruction ID: daf6a48107e2ca083d43a6fc5d59bf925a3ccc4d35747c2e82b121c7e189892b
                                                                            • Opcode Fuzzy Hash: d9e79d6adfe56fb8f9734a2bbd1f36522f8148df45df70a855fb005dd2ba3509
                                                                            • Instruction Fuzzy Hash: 18215C36609204AFDB50AFA8DC88DEA77FEEB097607148125F915CB2A1DA74DC81CB74
                                                                            APIs
                                                                            • GetStdHandle.KERNEL32(0000000C), ref: 006204F2
                                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0062052E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandlePipe
                                                                            • String ID: nul
                                                                            • API String ID: 1424370930-2873401336
                                                                            • Opcode ID: 3f3d76176f474b67878de1fd9f0de6887606792f7ea8d87e3bcf3d268a1421bc
                                                                            • Instruction ID: b63050b8a03ae69678eac42e24955d731c92798f3442339b840d02f69711681c
                                                                            • Opcode Fuzzy Hash: 3f3d76176f474b67878de1fd9f0de6887606792f7ea8d87e3bcf3d268a1421bc
                                                                            • Instruction Fuzzy Hash: 262194756007159FEB208F29ED04A9A77F6AF45724F204A19F8A1E73E1D7B09940CF60
                                                                            APIs
                                                                            • GetStdHandle.KERNEL32(000000F6), ref: 006205C6
                                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00620601
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandlePipe
                                                                            • String ID: nul
                                                                            • API String ID: 1424370930-2873401336
                                                                            • Opcode ID: 9a7f7d6827610b0cc4ef73f5465de5fffb76a07f90047b1df72969f79eb5af47
                                                                            • Instruction ID: daf94c77f8cdd03e227bb5bcd7cdda5a0d657e55478b9cc57c061851fafbb51d
                                                                            • Opcode Fuzzy Hash: 9a7f7d6827610b0cc4ef73f5465de5fffb76a07f90047b1df72969f79eb5af47
                                                                            • Instruction Fuzzy Hash: 3F21B7355007259FEB208F68EC04A9A77E6BF85730F200A19F8A1E73E1D7B09950CF10
                                                                            APIs
                                                                              • Part of subcall function 005B600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 005B604C
                                                                              • Part of subcall function 005B600E: GetStockObject.GDI32(00000011), ref: 005B6060
                                                                              • Part of subcall function 005B600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 005B606A
                                                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00644112
                                                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0064411F
                                                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0064412A
                                                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00644139
                                                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00644145
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CreateObjectStockWindow
                                                                            • String ID: Msctls_Progress32
                                                                            • API String ID: 1025951953-3636473452
                                                                            • Opcode ID: aad88b17dbae8a2c13e1ad1b07058eb4969b504536b889babfb7ef880f609c85
                                                                            • Instruction ID: 9449d02e58ef2d4d15b12b2160056e38e0edc207f4464fe72ec95677c118900a
                                                                            • Opcode Fuzzy Hash: aad88b17dbae8a2c13e1ad1b07058eb4969b504536b889babfb7ef880f609c85
                                                                            • Instruction Fuzzy Hash: 8811B2B214021EBEEF119F64CC86EE77F6EEF09798F014111FA18A6150CA769C21DBA4
                                                                            APIs
                                                                              • Part of subcall function 005ED7A3: _free.LIBCMT ref: 005ED7CC
                                                                            • _free.LIBCMT ref: 005ED82D
                                                                              • Part of subcall function 005E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000), ref: 005E29DE
                                                                              • Part of subcall function 005E29C8: GetLastError.KERNEL32(00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000,00000000), ref: 005E29F0
                                                                            • _free.LIBCMT ref: 005ED838
                                                                            • _free.LIBCMT ref: 005ED843
                                                                            • _free.LIBCMT ref: 005ED897
                                                                            • _free.LIBCMT ref: 005ED8A2
                                                                            • _free.LIBCMT ref: 005ED8AD
                                                                            • _free.LIBCMT ref: 005ED8B8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                            • Instruction ID: c80c841042649350c4c6a5e51a83132ed61b7575e896c491d496dc5b67dd8311
                                                                            • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                            • Instruction Fuzzy Hash: D2114F71940B89AAD525BFB2CC4BFCB7FECBF80700F400825B6DDA6093DA69B5454660
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0061DA74
                                                                            • LoadStringW.USER32(00000000), ref: 0061DA7B
                                                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0061DA91
                                                                            • LoadStringW.USER32(00000000), ref: 0061DA98
                                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0061DADC
                                                                            Strings
                                                                            • %s (%d) : ==> %s: %s %s, xrefs: 0061DAB9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString$Message
                                                                            • String ID: %s (%d) : ==> %s: %s %s
                                                                            • API String ID: 4072794657-3128320259
                                                                            • Opcode ID: d8214de231fccf44dcfcd8159c970ec72ec24972fbd076fd7f07ed44477b0e2d
                                                                            • Instruction ID: 4efc8836795febcef3a5ff33ac0347557ce257da8ea6dc685e2ae977438e0a53
                                                                            • Opcode Fuzzy Hash: d8214de231fccf44dcfcd8159c970ec72ec24972fbd076fd7f07ed44477b0e2d
                                                                            • Instruction Fuzzy Hash: 710181F69002087FE790EBA4DD89EEB376DEB09311F405496B706E2241EA749E848F74
                                                                            APIs
                                                                            • InterlockedExchange.KERNEL32(00F5ECF8,00F5ECF8), ref: 0062097B
                                                                            • EnterCriticalSection.KERNEL32(00F5ECD8,00000000), ref: 0062098D
                                                                            • TerminateThread.KERNEL32(00000000,000001F6), ref: 0062099B
                                                                            • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 006209A9
                                                                            • CloseHandle.KERNEL32(00000000), ref: 006209B8
                                                                            • InterlockedExchange.KERNEL32(00F5ECF8,000001F6), ref: 006209C8
                                                                            • LeaveCriticalSection.KERNEL32(00F5ECD8), ref: 006209CF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                            • String ID:
                                                                            • API String ID: 3495660284-0
                                                                            • Opcode ID: 9d080544991a08c01ad0aceaa55ddc3c2f31974a03339580fcc1eb8e072530be
                                                                            • Instruction ID: c6b70c045051eb79b00a7626d5be2c76149d530807612ee85bc1cc8388a259dd
                                                                            • Opcode Fuzzy Hash: 9d080544991a08c01ad0aceaa55ddc3c2f31974a03339580fcc1eb8e072530be
                                                                            • Instruction Fuzzy Hash: 34F01D31543D12ABE7916F94EE88AD67A26BF06712F403015F102509A1C7B59565DF90
                                                                            APIs
                                                                            • GetClientRect.USER32(?,?), ref: 005B5D30
                                                                            • GetWindowRect.USER32(?,?), ref: 005B5D71
                                                                            • ScreenToClient.USER32(?,?), ref: 005B5D99
                                                                            • GetClientRect.USER32(?,?), ref: 005B5ED7
                                                                            • GetWindowRect.USER32(?,?), ref: 005B5EF8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$Client$Window$Screen
                                                                            • String ID:
                                                                            • API String ID: 1296646539-0
                                                                            • Opcode ID: c7f60e6e4be80670dd2392772fc76a21c41f61eee5a6487622a502ee78fa027e
                                                                            • Instruction ID: a67e8d8b29e3b3a276c8b68ffac57db1d077d64a21511d9ab37b80db560250e2
                                                                            • Opcode Fuzzy Hash: c7f60e6e4be80670dd2392772fc76a21c41f61eee5a6487622a502ee78fa027e
                                                                            • Instruction Fuzzy Hash: 8CB17834A0064ADBDB14CFA8C4807FABBF5FF48310F14891AE9A9D7250EB34EA51DB54
                                                                            APIs
                                                                            • __allrem.LIBCMT ref: 005E00BA
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005E00D6
                                                                            • __allrem.LIBCMT ref: 005E00ED
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005E010B
                                                                            • __allrem.LIBCMT ref: 005E0122
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005E0140
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                            • String ID:
                                                                            • API String ID: 1992179935-0
                                                                            • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                            • Instruction ID: 37c7c1fe93c1a02310ab26d22d68500c1e41d504867382e16c3739aae94335c0
                                                                            • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                            • Instruction Fuzzy Hash: 7B81E672A007479BE7289F6ACC45B6B7BA9BF81324F24453BF591DA3C1E7B0D9408790
                                                                            APIs
                                                                              • Part of subcall function 00633149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,0063101C,00000000,?,?,00000000), ref: 00633195
                                                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00631DC0
                                                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00631DE1
                                                                            • WSAGetLastError.WSOCK32 ref: 00631DF2
                                                                            • inet_ntoa.WSOCK32(?), ref: 00631E8C
                                                                            • htons.WSOCK32(?,?,?,?,?), ref: 00631EDB
                                                                            • _strlen.LIBCMT ref: 00631F35
                                                                              • Part of subcall function 006139E8: _strlen.LIBCMT ref: 006139F2
                                                                              • Part of subcall function 005B6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,005CCF58,?,?,?), ref: 005B6DBA
                                                                              • Part of subcall function 005B6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,005CCF58,?,?,?), ref: 005B6DED
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                            • String ID:
                                                                            • API String ID: 1923757996-0
                                                                            • Opcode ID: 6b2532b577f2916a8754179ef4b8260d444a32af2760cbfd1fab412831b0a493
                                                                            • Instruction ID: 8a0e6b2ce2562c983fbac52767f89a539eaabf1ba27c91415d632b332d528ff9
                                                                            • Opcode Fuzzy Hash: 6b2532b577f2916a8754179ef4b8260d444a32af2760cbfd1fab412831b0a493
                                                                            • Instruction Fuzzy Hash: 78A1AD34104301AFD324DB24C899EAA7BE6BF86318F54894CF4565F2A2DB71ED42CB92
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,005D82D9,005D82D9,?,?,?,005E644F,00000001,00000001,8BE85006), ref: 005E6258
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,005E644F,00000001,00000001,8BE85006,?,?,?), ref: 005E62DE
                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 005E63D8
                                                                            • __freea.LIBCMT ref: 005E63E5
                                                                              • Part of subcall function 005E3820: RtlAllocateHeap.NTDLL(00000000,?,00681444,?,005CFDF5,?,?,005BA976,00000010,00681440,005B13FC,?,005B13C6,?,005B1129), ref: 005E3852
                                                                            • __freea.LIBCMT ref: 005E63EE
                                                                            • __freea.LIBCMT ref: 005E6413
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1414292761-0
                                                                            • Opcode ID: 95753117c48ac683fd04f49f76ede11b3913a653829f5eafc5ac5515cda06993
                                                                            • Instruction ID: 48b05b846f25d1888faa06995c291d0d1222542d884aa321440321e9b5ec4112
                                                                            • Opcode Fuzzy Hash: 95753117c48ac683fd04f49f76ede11b3913a653829f5eafc5ac5515cda06993
                                                                            • Instruction Fuzzy Hash: CF51E572600256ABDB294F66CC85EAF7FA9FB987D0F144A29FD45D7140DB34DC40C660
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                              • Part of subcall function 0063C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0063B6AE,?,?), ref: 0063C9B5
                                                                              • Part of subcall function 0063C998: _wcslen.LIBCMT ref: 0063C9F1
                                                                              • Part of subcall function 0063C998: _wcslen.LIBCMT ref: 0063CA68
                                                                              • Part of subcall function 0063C998: _wcslen.LIBCMT ref: 0063CA9E
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0063BCCA
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0063BD25
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0063BD6A
                                                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0063BD99
                                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0063BDF3
                                                                            • RegCloseKey.ADVAPI32(?), ref: 0063BDFF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                            • String ID:
                                                                            • API String ID: 1120388591-0
                                                                            • Opcode ID: 17302acf31cfc7d857316d79af8a014acef601c6c76e7e3e38219a07dd9fc754
                                                                            • Instruction ID: 44119bc2213e8d4e3e04dbabeaf1f6a6cfca45df4da937d5fb743a310d1602aa
                                                                            • Opcode Fuzzy Hash: 17302acf31cfc7d857316d79af8a014acef601c6c76e7e3e38219a07dd9fc754
                                                                            • Instruction Fuzzy Hash: A581BF30208241EFD714DF24C885EAABBE6FF84308F14995CF5594B2A2DB32ED45CB92
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(00000035), ref: 0060F7B9
                                                                            • SysAllocString.OLEAUT32(00000001), ref: 0060F860
                                                                            • VariantCopy.OLEAUT32(0060FA64,00000000), ref: 0060F889
                                                                            • VariantClear.OLEAUT32(0060FA64), ref: 0060F8AD
                                                                            • VariantCopy.OLEAUT32(0060FA64,00000000), ref: 0060F8B1
                                                                            • VariantClear.OLEAUT32(?), ref: 0060F8BB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearCopy$AllocInitString
                                                                            • String ID:
                                                                            • API String ID: 3859894641-0
                                                                            • Opcode ID: a40871a8f9dd104d4ce66bf6bb7ac56f1d10330e40ba38f448ee70cab313b773
                                                                            • Instruction ID: 2b64071de61a83d725db51d6dc05dd7565097f5e88252b6427f519ce49d68a4f
                                                                            • Opcode Fuzzy Hash: a40871a8f9dd104d4ce66bf6bb7ac56f1d10330e40ba38f448ee70cab313b773
                                                                            • Instruction Fuzzy Hash: FF512835A40300BACF78AB65D885B6AB3E6FF45310F20946AE902DF6D1DB749C40C7A6
                                                                            APIs
                                                                              • Part of subcall function 005B7620: _wcslen.LIBCMT ref: 005B7625
                                                                              • Part of subcall function 005B6B57: _wcslen.LIBCMT ref: 005B6B6A
                                                                            • GetOpenFileNameW.COMDLG32(00000058), ref: 006294E5
                                                                            • _wcslen.LIBCMT ref: 00629506
                                                                            • _wcslen.LIBCMT ref: 0062952D
                                                                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00629585
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$FileName$OpenSave
                                                                            • String ID: X
                                                                            • API String ID: 83654149-3081909835
                                                                            • Opcode ID: 5ddc64c7b49b7af779ec8546ea0bcd26aec20a7235e0bc927d1cb5133b9fd0ae
                                                                            • Instruction ID: 913e1dcbc8390a4e1c806b678105f37d0d40007610779f349f661394737d209a
                                                                            • Opcode Fuzzy Hash: 5ddc64c7b49b7af779ec8546ea0bcd26aec20a7235e0bc927d1cb5133b9fd0ae
                                                                            • Instruction Fuzzy Hash: A7E190316047118FD724DF24D485AAABBE5BFC5310F14896DF8899B3A2DB31ED05CBA2
                                                                            APIs
                                                                              • Part of subcall function 005C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005C9BB2
                                                                            • BeginPaint.USER32(?,?,?), ref: 005C9241
                                                                            • GetWindowRect.USER32(?,?), ref: 005C92A5
                                                                            • ScreenToClient.USER32(?,?), ref: 005C92C2
                                                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 005C92D3
                                                                            • EndPaint.USER32(?,?,?,?,?), ref: 005C9321
                                                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 006071EA
                                                                              • Part of subcall function 005C9339: BeginPath.GDI32(00000000), ref: 005C9357
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                            • String ID:
                                                                            • API String ID: 3050599898-0
                                                                            • Opcode ID: d2102fa829e36e144672af5203f8d49bb1a66175b29de46f87dd8c03af7446c9
                                                                            • Instruction ID: 75228e5398517ccae395d9ad7aab14119aeedf639785ef426fb1eac6b0489c07
                                                                            • Opcode Fuzzy Hash: d2102fa829e36e144672af5203f8d49bb1a66175b29de46f87dd8c03af7446c9
                                                                            • Instruction Fuzzy Hash: C441AF74105201AFDB10DF64CC88FAA7BBAFF86720F040A6DF9948B2E1C731A845DB61
                                                                            APIs
                                                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0062080C
                                                                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00620847
                                                                            • EnterCriticalSection.KERNEL32(?), ref: 00620863
                                                                            • LeaveCriticalSection.KERNEL32(?), ref: 006208DC
                                                                            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 006208F3
                                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00620921
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                            • String ID:
                                                                            • API String ID: 3368777196-0
                                                                            • Opcode ID: 9ae734f9c8426645b009a2f0ff35daa759c7b375311353577695c78853efcca6
                                                                            • Instruction ID: 9f75031bf0dd7ee38c4fa2263f7cf6f20e92bb3de1ee147ac6d5da04e25644f3
                                                                            • Opcode Fuzzy Hash: 9ae734f9c8426645b009a2f0ff35daa759c7b375311353577695c78853efcca6
                                                                            • Instruction Fuzzy Hash: BD416D71900205EFEF14AF94DC85AAA7B7AFF44310F1440A9ED059A297D770DE50DFA0
                                                                            APIs
                                                                            • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0060F3AB,00000000,?,?,00000000,?,0060682C,00000004,00000000,00000000), ref: 0064824C
                                                                            • EnableWindow.USER32(00000000,00000000), ref: 00648272
                                                                            • ShowWindow.USER32(FFFFFFFF,00000000), ref: 006482D1
                                                                            • ShowWindow.USER32(00000000,00000004), ref: 006482E5
                                                                            • EnableWindow.USER32(00000000,00000001), ref: 0064830B
                                                                            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0064832F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Show$Enable$MessageSend
                                                                            • String ID:
                                                                            • API String ID: 642888154-0
                                                                            • Opcode ID: d5bdd064fcfc65fdfd0c4a629497b883031515bb22f1c9d6868cd4a8518ab9b8
                                                                            • Instruction ID: ee8861a0625d76c9ab938c99b3f6cd80393808fd4e85add729991800b9363e81
                                                                            • Opcode Fuzzy Hash: d5bdd064fcfc65fdfd0c4a629497b883031515bb22f1c9d6868cd4a8518ab9b8
                                                                            • Instruction Fuzzy Hash: EF419434601644AFDF12CF55C899BE97BE3BB0A714F186269E5184F362CB71AD42CB90
                                                                            APIs
                                                                            • IsWindowVisible.USER32(?), ref: 00614C95
                                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00614CB2
                                                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00614CEA
                                                                            • _wcslen.LIBCMT ref: 00614D08
                                                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00614D10
                                                                            • _wcsstr.LIBVCRUNTIME ref: 00614D1A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                            • String ID:
                                                                            • API String ID: 72514467-0
                                                                            • Opcode ID: 256cbe8a3d29dc999d4d269e2df6af6a5e975c9cdfd73708906eaedb66ee0d3b
                                                                            • Instruction ID: da26d5e853183eb5860f6988a5c826d126fa28df6a906bd7d239e9def86d17c0
                                                                            • Opcode Fuzzy Hash: 256cbe8a3d29dc999d4d269e2df6af6a5e975c9cdfd73708906eaedb66ee0d3b
                                                                            • Instruction Fuzzy Hash: 55212975605201BBEB255B79AC09EFB7F9EDF45760F14802EF805CB292EE61CC4197A0
                                                                            APIs
                                                                              • Part of subcall function 005B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005B3A97,?,?,005B2E7F,?,?,?,00000000), ref: 005B3AC2
                                                                            • _wcslen.LIBCMT ref: 0062587B
                                                                            • CoInitialize.OLE32(00000000), ref: 00625995
                                                                            • CoCreateInstance.OLE32(0064FCF8,00000000,00000001,0064FB68,?), ref: 006259AE
                                                                            • CoUninitialize.OLE32 ref: 006259CC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                            • String ID: .lnk
                                                                            • API String ID: 3172280962-24824748
                                                                            • Opcode ID: 92f1e1fbf1eca4c279ebe934baea953b0e2348162ff7a2c15d0469afb9ca8078
                                                                            • Instruction ID: 37e98f1d9eaee9ad75877f10e352a300e77697a27362ae824fa85bb1f1c07def
                                                                            • Opcode Fuzzy Hash: 92f1e1fbf1eca4c279ebe934baea953b0e2348162ff7a2c15d0469afb9ca8078
                                                                            • Instruction Fuzzy Hash: BAD16474A04A119FC724DF14D494AAABBE6FF89310F14885DF88A9B361D731EC45CF92
                                                                            APIs
                                                                              • Part of subcall function 00610FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00610FCA
                                                                              • Part of subcall function 00610FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00610FD6
                                                                              • Part of subcall function 00610FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00610FE5
                                                                              • Part of subcall function 00610FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00610FEC
                                                                              • Part of subcall function 00610FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00611002
                                                                            • GetLengthSid.ADVAPI32(?,00000000,00611335), ref: 006117AE
                                                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006117BA
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 006117C1
                                                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 006117DA
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000,00611335), ref: 006117EE
                                                                            • HeapFree.KERNEL32(00000000), ref: 006117F5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                            • String ID:
                                                                            • API String ID: 3008561057-0
                                                                            • Opcode ID: b6858cc268e293814df81b58bb9f62af670b814390fe1b4f84491e15a2070384
                                                                            • Instruction ID: f37c25d761ceefcf6bf8a35061d5440c53a34a9332ad80803099908378e2d323
                                                                            • Opcode Fuzzy Hash: b6858cc268e293814df81b58bb9f62af670b814390fe1b4f84491e15a2070384
                                                                            • Instruction Fuzzy Hash: CA11BE35502205FFDB109FA4CC49BEE7BAAEB43365F184018F5419B350C736AA80DB60
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006114FF
                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00611506
                                                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00611515
                                                                            • CloseHandle.KERNEL32(00000004), ref: 00611520
                                                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0061154F
                                                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00611563
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                            • String ID:
                                                                            • API String ID: 1413079979-0
                                                                            • Opcode ID: e0ba71b9b35e4f1aa107289a6121af3c850433cc0c1a37e3933e1b9b6ce57b54
                                                                            • Instruction ID: c1e0e4cc7e910e55892fdfc66aeb429d00791f57d7165460c70fb6e4abaa1864
                                                                            • Opcode Fuzzy Hash: e0ba71b9b35e4f1aa107289a6121af3c850433cc0c1a37e3933e1b9b6ce57b54
                                                                            • Instruction Fuzzy Hash: 44115C7660120DABDF11CF94DD49FDE7BAAEF4A714F085014FA05A6260C3758E60DB60
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,005D3379,005D2FE5), ref: 005D3390
                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 005D339E
                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005D33B7
                                                                            • SetLastError.KERNEL32(00000000,?,005D3379,005D2FE5), ref: 005D3409
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastValue___vcrt_
                                                                            • String ID:
                                                                            • API String ID: 3852720340-0
                                                                            • Opcode ID: d672ce75b8632ea8d636229287ffd990dfc8199ba7751c1e07c3dc0c357566f0
                                                                            • Instruction ID: 56ad8b939e3f99d4fe378eb2e83aae7fc3f99ee0a79760f775a141a55c1c93e2
                                                                            • Opcode Fuzzy Hash: d672ce75b8632ea8d636229287ffd990dfc8199ba7751c1e07c3dc0c357566f0
                                                                            • Instruction Fuzzy Hash: CA012432209312BEEB392BBC7C995272E95FB45379720022FF410803F0EF128D41D686
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,005E5686,005F3CD6,?,00000000,?,005E5B6A,?,?,?,?,?,005DE6D1,?,00678A48), ref: 005E2D78
                                                                            • _free.LIBCMT ref: 005E2DAB
                                                                            • _free.LIBCMT ref: 005E2DD3
                                                                            • SetLastError.KERNEL32(00000000,?,?,?,?,005DE6D1,?,00678A48,00000010,005B4F4A,?,?,00000000,005F3CD6), ref: 005E2DE0
                                                                            • SetLastError.KERNEL32(00000000,?,?,?,?,005DE6D1,?,00678A48,00000010,005B4F4A,?,?,00000000,005F3CD6), ref: 005E2DEC
                                                                            • _abort.LIBCMT ref: 005E2DF2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free$_abort
                                                                            • String ID:
                                                                            • API String ID: 3160817290-0
                                                                            • Opcode ID: 0436a6eb2f6a2bad5bced419cb4e1c0d0476c8d22275547c60315dda53de37ea
                                                                            • Instruction ID: 07d76ebc141fc1c62200a88382214c6485908fce300f33eed2431fe23d9c3655
                                                                            • Opcode Fuzzy Hash: 0436a6eb2f6a2bad5bced419cb4e1c0d0476c8d22275547c60315dda53de37ea
                                                                            • Instruction Fuzzy Hash: 6FF0F93690568167C35E373B6D0EA1A1E5EBFC27B0F254518F6E9D229AEE2488425120
                                                                            APIs
                                                                              • Part of subcall function 005C9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005C9693
                                                                              • Part of subcall function 005C9639: SelectObject.GDI32(?,00000000), ref: 005C96A2
                                                                              • Part of subcall function 005C9639: BeginPath.GDI32(?), ref: 005C96B9
                                                                              • Part of subcall function 005C9639: SelectObject.GDI32(?,00000000), ref: 005C96E2
                                                                            • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00648A4E
                                                                            • LineTo.GDI32(?,00000003,00000000), ref: 00648A62
                                                                            • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00648A70
                                                                            • LineTo.GDI32(?,00000000,00000003), ref: 00648A80
                                                                            • EndPath.GDI32(?), ref: 00648A90
                                                                            • StrokePath.GDI32(?), ref: 00648AA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                            • String ID:
                                                                            • API String ID: 43455801-0
                                                                            • Opcode ID: f1e82a75b93c842dfc07e944667b9016344e70b66852b55de281fe8bc14fd533
                                                                            • Instruction ID: b9fb3f80dde6f0b581a816063fe84899a5655e267cedb81e9ce813a4b6da2216
                                                                            • Opcode Fuzzy Hash: f1e82a75b93c842dfc07e944667b9016344e70b66852b55de281fe8bc14fd533
                                                                            • Instruction Fuzzy Hash: 35110C7600110DFFDF119F90DC48E9A7F6EEB05364F048011FA159A2A1C7729D55DBA0
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 00615218
                                                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 00615229
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00615230
                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00615238
                                                                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0061524F
                                                                            • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00615261
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDevice$Release
                                                                            • String ID:
                                                                            • API String ID: 1035833867-0
                                                                            • Opcode ID: aa1c5bb169abaf9112ddb08c4fb2e4cc0382aff7ae814a8f0f9ffd7e373579d6
                                                                            • Instruction ID: 1eb3967aa1763d6bc5d2976297ad867ec9b705aac0fb4034be4a7a169220a8ab
                                                                            • Opcode Fuzzy Hash: aa1c5bb169abaf9112ddb08c4fb2e4cc0382aff7ae814a8f0f9ffd7e373579d6
                                                                            • Instruction Fuzzy Hash: 3F01A275E01708BBEB109BE59C49E8EBFB9EF49761F044065FA05A7390D6709D00CFA0
                                                                            APIs
                                                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 005B1BF4
                                                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 005B1BFC
                                                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 005B1C07
                                                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 005B1C12
                                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 005B1C1A
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 005B1C22
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual
                                                                            • String ID:
                                                                            • API String ID: 4278518827-0
                                                                            • Opcode ID: 099dd00d74e4ee07f9ef3011430ac66e2670777a8af88cdbce4d2dfd1b810065
                                                                            • Instruction ID: 2005bea5b253d6e6e0a4fe3692b5dd58da140cc0fe146c4967708f425e348944
                                                                            • Opcode Fuzzy Hash: 099dd00d74e4ee07f9ef3011430ac66e2670777a8af88cdbce4d2dfd1b810065
                                                                            • Instruction Fuzzy Hash: 850167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CFE5
                                                                            APIs
                                                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0061EB30
                                                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0061EB46
                                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 0061EB55
                                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0061EB64
                                                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0061EB6E
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0061EB75
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 839392675-0
                                                                            • Opcode ID: ded18d9cf9aecfe15fad3d359afeb203ef8125cf897d6cad8aa7aed0e3c232e0
                                                                            • Instruction ID: acb700e40edb76d9a350614bada5111e6c3102ec94be65a7d749089d28af4e21
                                                                            • Opcode Fuzzy Hash: ded18d9cf9aecfe15fad3d359afeb203ef8125cf897d6cad8aa7aed0e3c232e0
                                                                            • Instruction Fuzzy Hash: 06F0B476202558BBE7215B529C0DEEF3E7DEFCBB21F005158F601D1290D7A05A01C6B4
                                                                            APIs
                                                                            • GetClientRect.USER32(?), ref: 00607452
                                                                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 00607469
                                                                            • GetWindowDC.USER32(?), ref: 00607475
                                                                            • GetPixel.GDI32(00000000,?,?), ref: 00607484
                                                                            • ReleaseDC.USER32(?,00000000), ref: 00607496
                                                                            • GetSysColor.USER32(00000005), ref: 006074B0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                            • String ID:
                                                                            • API String ID: 272304278-0
                                                                            • Opcode ID: 98d2ecfd6ad4d238e22b15ea83e8a3e5c8ff7673402c20165ce8aceac206d7a7
                                                                            • Instruction ID: 3dd11748daf40fcb8ce7eef107ab13791f8759b0d6557cc7dcfa4245ae8d7372
                                                                            • Opcode Fuzzy Hash: 98d2ecfd6ad4d238e22b15ea83e8a3e5c8ff7673402c20165ce8aceac206d7a7
                                                                            • Instruction Fuzzy Hash: 0F014635801215FFEB915FA4DC08BEE7BB6FB06321F615164F916A22A1CB312E52AB50
                                                                            APIs
                                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0061187F
                                                                            • UnloadUserProfile.USERENV(?,?), ref: 0061188B
                                                                            • CloseHandle.KERNEL32(?), ref: 00611894
                                                                            • CloseHandle.KERNEL32(?), ref: 0061189C
                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 006118A5
                                                                            • HeapFree.KERNEL32(00000000), ref: 006118AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                            • String ID:
                                                                            • API String ID: 146765662-0
                                                                            • Opcode ID: 83f669512c1502ee38928a2c366f33e2d9e0274e4afdc2f2f1f6bfc6f0c2464f
                                                                            • Instruction ID: 00478bae0cb288271a5fb9c837e5c1d30d15264d52d3ea1b4e8804e41c0453a7
                                                                            • Opcode Fuzzy Hash: 83f669512c1502ee38928a2c366f33e2d9e0274e4afdc2f2f1f6bfc6f0c2464f
                                                                            • Instruction Fuzzy Hash: 9FE0ED3A105501BBD7416FA1ED0C905BF3AFF4A731710A220F22581270CB325420DF50
                                                                            APIs
                                                                            • __Init_thread_footer.LIBCMT ref: 005BBEB3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Init_thread_footer
                                                                            • String ID: D%h$D%h$D%h$D%hD%h
                                                                            • API String ID: 1385522511-1916761091
                                                                            • Opcode ID: 6d3073d31abdf5d9468f1eeaaf5c49f8c4a9189eaaf6f73a12a7296ca4918eef
                                                                            • Instruction ID: e6499d4ea6b5e4ca52539f4460f185669f3d63fea62f5228f125f4ba30a8ad33
                                                                            • Opcode Fuzzy Hash: 6d3073d31abdf5d9468f1eeaaf5c49f8c4a9189eaaf6f73a12a7296ca4918eef
                                                                            • Instruction Fuzzy Hash: 21913875A0020ADFDB18CF58C4916E9BFF2FF58310B24456AD945AB351D7B1ED81CB90
                                                                            APIs
                                                                              • Part of subcall function 005D0242: EnterCriticalSection.KERNEL32(0068070C,00681884,?,?,005C198B,00682518,?,?,?,005B12F9,00000000), ref: 005D024D
                                                                              • Part of subcall function 005D0242: LeaveCriticalSection.KERNEL32(0068070C,?,005C198B,00682518,?,?,?,005B12F9,00000000), ref: 005D028A
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                              • Part of subcall function 005D00A3: __onexit.LIBCMT ref: 005D00A9
                                                                            • __Init_thread_footer.LIBCMT ref: 00637BFB
                                                                              • Part of subcall function 005D01F8: EnterCriticalSection.KERNEL32(0068070C,?,?,005C8747,00682514), ref: 005D0202
                                                                              • Part of subcall function 005D01F8: LeaveCriticalSection.KERNEL32(0068070C,?,005C8747,00682514), ref: 005D0235
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                            • String ID: +T`$5$G$Variable must be of type 'Object'.
                                                                            • API String ID: 535116098-2564330142
                                                                            • Opcode ID: 07eaf5720f91a24ac2644a2a72c54e2dfe40733672f2dcdca39ade3a39c9a269
                                                                            • Instruction ID: 8d9783cfad0d43e496b56f8234d27970f021e31f12a020224e2aa2923dc07ffc
                                                                            • Opcode Fuzzy Hash: 07eaf5720f91a24ac2644a2a72c54e2dfe40733672f2dcdca39ade3a39c9a269
                                                                            • Instruction Fuzzy Hash: BC914DB4A04209EFCB24EF94D8959EDBBB2FF45304F148059F8069B392DB71AE45CB91
                                                                            APIs
                                                                              • Part of subcall function 005B7620: _wcslen.LIBCMT ref: 005B7625
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0061C6EE
                                                                            • _wcslen.LIBCMT ref: 0061C735
                                                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0061C79C
                                                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0061C7CA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info_wcslen$Default
                                                                            • String ID: 0
                                                                            • API String ID: 1227352736-4108050209
                                                                            • Opcode ID: 38604365e46f9b92ac3a08bc181937615c64b8f42b51aeb792b8f71b1b5b4c88
                                                                            • Instruction ID: f2bcc19c345992b03a304d40836f340a2f6a53885c64959b7020a9b4d8e15219
                                                                            • Opcode Fuzzy Hash: 38604365e46f9b92ac3a08bc181937615c64b8f42b51aeb792b8f71b1b5b4c88
                                                                            • Instruction Fuzzy Hash: E151D1716843419FD7549F28C889BEF7BEAAF85320F080A2DF595D72D0DBA0D884DB52
                                                                            APIs
                                                                            • ShellExecuteExW.SHELL32(0000003C), ref: 0063AEA3
                                                                              • Part of subcall function 005B7620: _wcslen.LIBCMT ref: 005B7625
                                                                            • GetProcessId.KERNEL32(00000000), ref: 0063AF38
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0063AF67
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                            • String ID: <$@
                                                                            • API String ID: 146682121-1426351568
                                                                            • Opcode ID: a1e52e922ff60df8939a133280373954ff24d217269a3d62c7eeda54c52cfaf3
                                                                            • Instruction ID: ce3548189c1efcb9525cbd2f0e3c8dcce32ff784311d7df329e8b124259cbfe8
                                                                            • Opcode Fuzzy Hash: a1e52e922ff60df8939a133280373954ff24d217269a3d62c7eeda54c52cfaf3
                                                                            • Instruction Fuzzy Hash: 31718B70A0021ADFCB14DF94C489A9EBBF1FF48310F148499E856AB3A2DB74ED41DB91
                                                                            APIs
                                                                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00617206
                                                                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0061723C
                                                                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0061724D
                                                                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 006172CF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$AddressCreateInstanceProc
                                                                            • String ID: DllGetClassObject
                                                                            • API String ID: 753597075-1075368562
                                                                            • Opcode ID: 76a129af854839bb1d855d71dfda90e1dc8bc14cb38cb73fc02e9345febe94fc
                                                                            • Instruction ID: 49cb61c0e4fbadd2f94960490323c22972c04211b2eb2b1e383715cb95f87435
                                                                            • Opcode Fuzzy Hash: 76a129af854839bb1d855d71dfda90e1dc8bc14cb38cb73fc02e9345febe94fc
                                                                            • Instruction Fuzzy Hash: 08414F71604204EFDB15CF54C884ADA7BBAEF49310F1980ADFD059F20AD7B1DA86CBA0
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00643E35
                                                                            • IsMenu.USER32(?), ref: 00643E4A
                                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00643E92
                                                                            • DrawMenuBar.USER32 ref: 00643EA5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$DrawInfoInsert
                                                                            • String ID: 0
                                                                            • API String ID: 3076010158-4108050209
                                                                            • Opcode ID: 3bac46d25b48ae924c642bcc16f92a0361d3f2a545853d7a2cfed129c4822020
                                                                            • Instruction ID: dc880d5d079a423014fe6869cb51b98f1218a450db7d906842be31900b20be01
                                                                            • Opcode Fuzzy Hash: 3bac46d25b48ae924c642bcc16f92a0361d3f2a545853d7a2cfed129c4822020
                                                                            • Instruction Fuzzy Hash: B2414875A02219AFDB10EF50D884AEABBBAFF49360F04412AE915AB350D730AE55CF50
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                              • Part of subcall function 00613CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00613CCA
                                                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00611E66
                                                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00611E79
                                                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00611EA9
                                                                              • Part of subcall function 005B6B57: _wcslen.LIBCMT ref: 005B6B6A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$_wcslen$ClassName
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 2081771294-1403004172
                                                                            • Opcode ID: bd898e4c5bbb394ea32840a08b26fcb273803e1c2c114fb88df1fd6eec54d884
                                                                            • Instruction ID: 7289e14d9a14eb971195955c340b910b791762f3823edd941f34ff3099f24c6f
                                                                            • Opcode Fuzzy Hash: bd898e4c5bbb394ea32840a08b26fcb273803e1c2c114fb88df1fd6eec54d884
                                                                            • Instruction Fuzzy Hash: 42216B71A00104BFDB14ABE0CC49CFFBBBAEF82360B184119F916AB2E1DB345D468620
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen
                                                                            • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                                            • API String ID: 176396367-4004644295
                                                                            • Opcode ID: a27b83ff9a18e7d4e2fd9827c958c1c055c162309bd6302caa796cd8a84865da
                                                                            • Instruction ID: 6e0cd349628812f945315e43b17eb95c013f7009d9d24113abbce86d40b754fe
                                                                            • Opcode Fuzzy Hash: a27b83ff9a18e7d4e2fd9827c958c1c055c162309bd6302caa796cd8a84865da
                                                                            • Instruction Fuzzy Hash: 7B31D673A0016A8BCB20EF6D99505FE3793ABA1760F15402AF845BB349EA71DE41D7E0
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00642F8D
                                                                            • LoadLibraryW.KERNEL32(?), ref: 00642F94
                                                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00642FA9
                                                                            • DestroyWindow.USER32(?), ref: 00642FB1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                            • String ID: SysAnimate32
                                                                            • API String ID: 3529120543-1011021900
                                                                            • Opcode ID: 779a10ce481a98117eb5f99142f2d1cb89ecf7ae3f3462c786dcb55a30cb7027
                                                                            • Instruction ID: 37e6fec671084ba6956a282d3db157f1c6ce7c22b7e2620c4d605ad0cbb9a81c
                                                                            • Opcode Fuzzy Hash: 779a10ce481a98117eb5f99142f2d1cb89ecf7ae3f3462c786dcb55a30cb7027
                                                                            • Instruction Fuzzy Hash: DB21FD7124020AABEB504F64DCA0EFB3BBEFB59364FA04218F910D2290D371DC859760
                                                                            APIs
                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,005D4D1E,005E28E9,?,005D4CBE,005E28E9,006788B8,0000000C,005D4E15,005E28E9,00000002), ref: 005D4D8D
                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005D4DA0
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,005D4D1E,005E28E9,?,005D4CBE,005E28E9,006788B8,0000000C,005D4E15,005E28E9,00000002,00000000), ref: 005D4DC3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                            • API String ID: 4061214504-1276376045
                                                                            • Opcode ID: 4d56d18c856dcd0f35c6d35144980eb5c8758940d75d690bd788d85f68dd88ab
                                                                            • Instruction ID: ec881322df648d0ef429d7a11642d2c3b64c433db93f26368e930456826cd8aa
                                                                            • Opcode Fuzzy Hash: 4d56d18c856dcd0f35c6d35144980eb5c8758940d75d690bd788d85f68dd88ab
                                                                            • Instruction Fuzzy Hash: 4BF04435541208FBDB515F94DC49B9DBFB6EF44762F010056F805A2350DB319944CE91
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,005B4EDD,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4E9C
                                                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005B4EAE
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,005B4EDD,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4EC0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AddressFreeLoadProc
                                                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                            • API String ID: 145871493-3689287502
                                                                            • Opcode ID: 9206bbc89422c87dc88e42f11a5a6775ab7368379ddc0074e9d444547dc3650b
                                                                            • Instruction ID: 2c06b108e623fc13ad12f07f18743fd35ccc799373099627c2e77614a7919d4e
                                                                            • Opcode Fuzzy Hash: 9206bbc89422c87dc88e42f11a5a6775ab7368379ddc0074e9d444547dc3650b
                                                                            • Instruction Fuzzy Hash: 26E0CD39A035329BD37117296C18B9F6D5DBFC2F727050115FC04D3302DB60DD0589A2
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,005F3CDE,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4E62
                                                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005B4E74
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,005F3CDE,?,00681418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 005B4E87
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AddressFreeLoadProc
                                                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                            • API String ID: 145871493-1355242751
                                                                            • Opcode ID: 49e2905bb4ae8a98b03d200bb17fdb4f0261a9d465e490a6d562528bb6539ea5
                                                                            • Instruction ID: 338d48a3847f05641a37158680931f300e8689826ae0e3811cad1655322ea9dc
                                                                            • Opcode Fuzzy Hash: 49e2905bb4ae8a98b03d200bb17fdb4f0261a9d465e490a6d562528bb6539ea5
                                                                            • Instruction Fuzzy Hash: BDD01239503A3197D7721B256C18DDB6F1EBF86B713064515F905A3315CF61DD01C9E2
                                                                            APIs
                                                                            • GetCurrentProcessId.KERNEL32 ref: 0063A427
                                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0063A435
                                                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0063A468
                                                                            • CloseHandle.KERNEL32(?), ref: 0063A63D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CloseCountersCurrentHandleOpen
                                                                            • String ID:
                                                                            • API String ID: 3488606520-0
                                                                            • Opcode ID: 133a18348e8f486201ffda53ac0224d13b3fa3335f507f373f7823f1be6c367d
                                                                            • Instruction ID: be276e38d2c75cc37e230bbd97c89624d1393393cb3c462f1817dfb4733f0d65
                                                                            • Opcode Fuzzy Hash: 133a18348e8f486201ffda53ac0224d13b3fa3335f507f373f7823f1be6c367d
                                                                            • Instruction Fuzzy Hash: DBA17D756043019FD720DF24C886F6ABBE6AF84714F14885DF59A9B3D2DBB0EC418B92
                                                                            APIs
                                                                              • Part of subcall function 0061DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0061CF22,?), ref: 0061DDFD
                                                                              • Part of subcall function 0061DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0061CF22,?), ref: 0061DE16
                                                                              • Part of subcall function 0061E199: GetFileAttributesW.KERNEL32(?,0061CF95), ref: 0061E19A
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 0061E473
                                                                            • MoveFileW.KERNEL32(?,?), ref: 0061E4AC
                                                                            • _wcslen.LIBCMT ref: 0061E5EB
                                                                            • _wcslen.LIBCMT ref: 0061E603
                                                                            • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0061E650
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 3183298772-0
                                                                            • Opcode ID: c74e00e29738e3866ef93a8a1b16717c5fac270c99cb25f9d9df47f3c4d875dc
                                                                            • Instruction ID: bf9f74996b58feb1cfe1eff188cad7fb92309d71a63a2b94674e1d46202d484a
                                                                            • Opcode Fuzzy Hash: c74e00e29738e3866ef93a8a1b16717c5fac270c99cb25f9d9df47f3c4d875dc
                                                                            • Instruction Fuzzy Hash: C251B2B24083459BC764DBA4DC859DFB7EDAF84340F04492EF689C3241EF35E688876A
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                              • Part of subcall function 0063C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0063B6AE,?,?), ref: 0063C9B5
                                                                              • Part of subcall function 0063C998: _wcslen.LIBCMT ref: 0063C9F1
                                                                              • Part of subcall function 0063C998: _wcslen.LIBCMT ref: 0063CA68
                                                                              • Part of subcall function 0063C998: _wcslen.LIBCMT ref: 0063CA9E
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0063BAA5
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0063BB00
                                                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0063BB63
                                                                            • RegCloseKey.ADVAPI32(?,?), ref: 0063BBA6
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0063BBB3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                            • String ID:
                                                                            • API String ID: 826366716-0
                                                                            • Opcode ID: 3f1a07b8ab0480033176834c8a758f37bada77b44e0532d1f4be1bbfd1f47eb9
                                                                            • Instruction ID: 11b93e0a8c9686a2f72a13fea1e3e91803894a5b00c0aa9371e4aa9ee52736aa
                                                                            • Opcode Fuzzy Hash: 3f1a07b8ab0480033176834c8a758f37bada77b44e0532d1f4be1bbfd1f47eb9
                                                                            • Instruction Fuzzy Hash: FA61AF31208241AFD314DF14C894EAABBE6FF84318F14955CF59A8B2A2DF31ED45CB92
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 00618BCD
                                                                            • VariantClear.OLEAUT32 ref: 00618C3E
                                                                            • VariantClear.OLEAUT32 ref: 00618C9D
                                                                            • VariantClear.OLEAUT32(?), ref: 00618D10
                                                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00618D3B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$Clear$ChangeInitType
                                                                            • String ID:
                                                                            • API String ID: 4136290138-0
                                                                            • Opcode ID: e8b0e675a3c3451eef848db6760a4d4f519591c4d82d70b7b615acdc6619c476
                                                                            • Instruction ID: 7cd66526a7001eaf13c594e29bf5dcc1f262a96014f2c961e565d51892c52703
                                                                            • Opcode Fuzzy Hash: e8b0e675a3c3451eef848db6760a4d4f519591c4d82d70b7b615acdc6619c476
                                                                            • Instruction Fuzzy Hash: 3E5166B5A00219EFCB10CF68D884AEAB7FAFF89310B158559E909DB350E730E911CF90
                                                                            APIs
                                                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00628BAE
                                                                            • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00628BDA
                                                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00628C32
                                                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00628C57
                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00628C5F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfile$SectionWrite$String
                                                                            • String ID:
                                                                            • API String ID: 2832842796-0
                                                                            • Opcode ID: 9ebed497d2724c4338ba0fc08ebfad3c64d907a86170500ca32b018d92981f0b
                                                                            • Instruction ID: a6d7df01815f6fb573b3a13bbacd4b25e93ee33ca31189a196eba32111e0c4ca
                                                                            • Opcode Fuzzy Hash: 9ebed497d2724c4338ba0fc08ebfad3c64d907a86170500ca32b018d92981f0b
                                                                            • Instruction Fuzzy Hash: B8514E35A006159FCB15DF54C885AA9BBF6FF89314F048058E8496B362DB31FD41CF90
                                                                            APIs
                                                                            • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00638F40
                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00638FD0
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00638FEC
                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00639032
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00639052
                                                                              • Part of subcall function 005CF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00621043,?,753CE610), ref: 005CF6E6
                                                                              • Part of subcall function 005CF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0060FA64,00000000,00000000,?,?,00621043,?,753CE610,?,0060FA64), ref: 005CF70D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                            • String ID:
                                                                            • API String ID: 666041331-0
                                                                            • Opcode ID: 64f3366c49307e6fe0609afa88f25b9c409f590cdb49d89ee875362fac786a9b
                                                                            • Instruction ID: 1f79ccd8cf158a4e0dee9ab3ea488e6b0782a5008a018ffec5e5745d90ced136
                                                                            • Opcode Fuzzy Hash: 64f3366c49307e6fe0609afa88f25b9c409f590cdb49d89ee875362fac786a9b
                                                                            • Instruction Fuzzy Hash: EB511835605205DFCB15DF58C4848E9BBB2FF89324F148098E80A9B362DB71ED86CF91
                                                                            APIs
                                                                            • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00646C33
                                                                            • SetWindowLongW.USER32(?,000000EC,?), ref: 00646C4A
                                                                            • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00646C73
                                                                            • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0062AB79,00000000,00000000), ref: 00646C98
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00646CC7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$MessageSendShow
                                                                            • String ID:
                                                                            • API String ID: 3688381893-0
                                                                            • Opcode ID: 82ae4d6f97e2681c164503c257a0cb466f45aacad26832564edf420f57cb1251
                                                                            • Instruction ID: 2f5caad3f29ab782d1c6709ee3f1822b48ad39c531d70ba479d44d30a51c7141
                                                                            • Opcode Fuzzy Hash: 82ae4d6f97e2681c164503c257a0cb466f45aacad26832564edf420f57cb1251
                                                                            • Instruction Fuzzy Hash: 7B41D435A04104AFDB24CF68CC98FE97BA7EB0B360F150268F895A73E0C371AD51CA41
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: 7816fc94dbd5fb35f4b68090319997b9088ea32f1fb4c2a66abb73e59cdc346b
                                                                            • Instruction ID: 59e78915308fe3a1129d5d60cecbc1528763a7463720f8358bae0335cc38dc1a
                                                                            • Opcode Fuzzy Hash: 7816fc94dbd5fb35f4b68090319997b9088ea32f1fb4c2a66abb73e59cdc346b
                                                                            • Instruction Fuzzy Hash: 2841F532A002009FCB28DF79C885A5DBBFAFF89314F1545A9E555EB396D731AE01CB80
                                                                            APIs
                                                                            • GetCursorPos.USER32(?), ref: 005C9141
                                                                            • ScreenToClient.USER32(00000000,?), ref: 005C915E
                                                                            • GetAsyncKeyState.USER32(00000001), ref: 005C9183
                                                                            • GetAsyncKeyState.USER32(00000002), ref: 005C919D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AsyncState$ClientCursorScreen
                                                                            • String ID:
                                                                            • API String ID: 4210589936-0
                                                                            • Opcode ID: c0b9d264c6398c4114fa7ab78e25446e0d34d877f4b8c26f41a6dbf164f9d4e6
                                                                            • Instruction ID: 6b6b115faf05fd6f907d05cbe2190e2e5f919cbf2c5ba1f4edb2c573ac39ca5d
                                                                            • Opcode Fuzzy Hash: c0b9d264c6398c4114fa7ab78e25446e0d34d877f4b8c26f41a6dbf164f9d4e6
                                                                            • Instruction Fuzzy Hash: 37416035A0850BFFDF199FA4C849BEEBB76FB45324F248259E425A32D0C7346950CB91
                                                                            APIs
                                                                            • GetInputState.USER32 ref: 006238CB
                                                                            • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00623922
                                                                            • TranslateMessage.USER32(?), ref: 0062394B
                                                                            • DispatchMessageW.USER32(?), ref: 00623955
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00623966
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                            • String ID:
                                                                            • API String ID: 2256411358-0
                                                                            • Opcode ID: 00c8e60e5ee068657beac86e7ac19a3a10958def369c54311f778e7cac315edc
                                                                            • Instruction ID: 796b50975cbc48aaac874fd9e00f6f74ed2024e424e8a90c9fa13f1ed01bddea
                                                                            • Opcode Fuzzy Hash: 00c8e60e5ee068657beac86e7ac19a3a10958def369c54311f778e7cac315edc
                                                                            • Instruction Fuzzy Hash: 3A319570D04B76AFEB25CB34A849BE637AAAB07304F040559E4568A790F7AC96C6CF11
                                                                            APIs
                                                                            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0062C21E,00000000), ref: 0062CF38
                                                                            • InternetReadFile.WININET(?,00000000,?,?), ref: 0062CF6F
                                                                            • GetLastError.KERNEL32(?,00000000,?,?,?,0062C21E,00000000), ref: 0062CFB4
                                                                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,0062C21E,00000000), ref: 0062CFC8
                                                                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,0062C21E,00000000), ref: 0062CFF2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                            • String ID:
                                                                            • API String ID: 3191363074-0
                                                                            • Opcode ID: a2b2f6c609790d72bdc790b263b101aeaff9ec6092b1f202f1db0cb50d1d373f
                                                                            • Instruction ID: 72af49ff5945f6c858ed144bdf7845314f0ffb3725105b792d6fd52780b70107
                                                                            • Opcode Fuzzy Hash: a2b2f6c609790d72bdc790b263b101aeaff9ec6092b1f202f1db0cb50d1d373f
                                                                            • Instruction Fuzzy Hash: 04316B71500A15EFDB20DFA5EA84AAFBBFAEF14364B10442EF516D2250DB30AE41DF60
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,?), ref: 00611915
                                                                            • PostMessageW.USER32(00000001,00000201,00000001), ref: 006119C1
                                                                            • Sleep.KERNEL32(00000000,?,?,?), ref: 006119C9
                                                                            • PostMessageW.USER32(00000001,00000202,00000000), ref: 006119DA
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?), ref: 006119E2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostSleep$RectWindow
                                                                            • String ID:
                                                                            • API String ID: 3382505437-0
                                                                            • Opcode ID: 824239a41dfd468307e8fd37498dfc31bf5a3b7f9cd80b42ee024a2f23aa3094
                                                                            • Instruction ID: dff96e39d50f45f408ecf591639a13ed36f475096ab2d2397d38ea01450f8001
                                                                            • Opcode Fuzzy Hash: 824239a41dfd468307e8fd37498dfc31bf5a3b7f9cd80b42ee024a2f23aa3094
                                                                            • Instruction Fuzzy Hash: F531D675900219EFCB00CFA8CD59ADE3BB6EB46315F148625FA31AB2D1C7709D44DB90
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00645745
                                                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 0064579D
                                                                            • _wcslen.LIBCMT ref: 006457AF
                                                                            • _wcslen.LIBCMT ref: 006457BA
                                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00645816
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$_wcslen
                                                                            • String ID:
                                                                            • API String ID: 763830540-0
                                                                            • Opcode ID: 62d15b601eb1da36a2d79b9541ff50a36b0c9078bf0fa203d7c2ca10e1266e01
                                                                            • Instruction ID: 5b8a7dabdeebc10e8c7a41963e408120066821df83cef7e2d79acbf0052cb5e8
                                                                            • Opcode Fuzzy Hash: 62d15b601eb1da36a2d79b9541ff50a36b0c9078bf0fa203d7c2ca10e1266e01
                                                                            • Instruction Fuzzy Hash: 3A219675904618DBDB209F64CC85AED7BBEFF45724F108216F92AEB281D7708985CF50
                                                                            APIs
                                                                            • IsWindow.USER32(00000000), ref: 00630951
                                                                            • GetForegroundWindow.USER32 ref: 00630968
                                                                            • GetDC.USER32(00000000), ref: 006309A4
                                                                            • GetPixel.GDI32(00000000,?,00000003), ref: 006309B0
                                                                            • ReleaseDC.USER32(00000000,00000003), ref: 006309E8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ForegroundPixelRelease
                                                                            • String ID:
                                                                            • API String ID: 4156661090-0
                                                                            • Opcode ID: ff75af4167b5c9e10d71650e6d7d2568a3a250de328e1fb605145bfc02d80653
                                                                            • Instruction ID: 6a24643570ea7f7709e560ed9661710326dfe24359bba854ae8b8f5a32b5f39c
                                                                            • Opcode Fuzzy Hash: ff75af4167b5c9e10d71650e6d7d2568a3a250de328e1fb605145bfc02d80653
                                                                            • Instruction Fuzzy Hash: E4218439600214AFD754EF65D858AAEBBFAFF45710F05806CF84697762DB70AD04CB90
                                                                            APIs
                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 005ECDC6
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 005ECDE9
                                                                              • Part of subcall function 005E3820: RtlAllocateHeap.NTDLL(00000000,?,00681444,?,005CFDF5,?,?,005BA976,00000010,00681440,005B13FC,?,005B13C6,?,005B1129), ref: 005E3852
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 005ECE0F
                                                                            • _free.LIBCMT ref: 005ECE22
                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 005ECE31
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                            • String ID:
                                                                            • API String ID: 336800556-0
                                                                            • Opcode ID: 66acdfc20a96aedc84643fb39d2b00ee941f29507ccdff6c4ab2b8b2f8b05364
                                                                            • Instruction ID: e552977a91d3e2cd66ad19b50a6383f48ceb6b36dfed5641d411c5111045acc0
                                                                            • Opcode Fuzzy Hash: 66acdfc20a96aedc84643fb39d2b00ee941f29507ccdff6c4ab2b8b2f8b05364
                                                                            • Instruction Fuzzy Hash: 6D01D4726022957F632A1ABB6C8CC7B6D6EFEC7BA13151129F945D7201EA61CD0281B0
                                                                            APIs
                                                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005C9693
                                                                            • SelectObject.GDI32(?,00000000), ref: 005C96A2
                                                                            • BeginPath.GDI32(?), ref: 005C96B9
                                                                            • SelectObject.GDI32(?,00000000), ref: 005C96E2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectSelect$BeginCreatePath
                                                                            • String ID:
                                                                            • API String ID: 3225163088-0
                                                                            • Opcode ID: d5aecd5eb193116ccc31899fd3f510f887ee0263e8c773f9e536fae3a308ec4a
                                                                            • Instruction ID: 54c30987d906ea67e93aad0dad16a3010f70415383b4b2f8b0b2709e036b311e
                                                                            • Opcode Fuzzy Hash: d5aecd5eb193116ccc31899fd3f510f887ee0263e8c773f9e536fae3a308ec4a
                                                                            • Instruction Fuzzy Hash: AD214F30802305EFDF119FA4EC18BA97FBABB52765F10571AF510AA2E0D3709892CB94
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _memcmp
                                                                            • String ID:
                                                                            • API String ID: 2931989736-0
                                                                            • Opcode ID: 031cf2c1dd4049c99dcfb400e65ef73c4b1b59ef5b83198a6783edf4e270eaea
                                                                            • Instruction ID: eddfea7a825a289c33db9e5ba1caa2070325da07d6b397db0a16a307b70ecebc
                                                                            • Opcode Fuzzy Hash: 031cf2c1dd4049c99dcfb400e65ef73c4b1b59ef5b83198a6783edf4e270eaea
                                                                            • Instruction Fuzzy Hash: C801F965241A05FBD31892149D83FFBB34FABE13A4F080022FD069A3C1F720ED5182A4
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,?,005DF2DE,005E3863,00681444,?,005CFDF5,?,?,005BA976,00000010,00681440,005B13FC,?,005B13C6), ref: 005E2DFD
                                                                            • _free.LIBCMT ref: 005E2E32
                                                                            • _free.LIBCMT ref: 005E2E59
                                                                            • SetLastError.KERNEL32(00000000,005B1129), ref: 005E2E66
                                                                            • SetLastError.KERNEL32(00000000,005B1129), ref: 005E2E6F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free
                                                                            • String ID:
                                                                            • API String ID: 3170660625-0
                                                                            • Opcode ID: 723fbf2ad59fa0eb21fd4f6b20738fc0c50759d6522eb5a2b9aa2d9205580167
                                                                            • Instruction ID: c9de50708d4de62fce0f9c87f22f1be47c46ee6f605cb4f80a087cfbef627f1c
                                                                            • Opcode Fuzzy Hash: 723fbf2ad59fa0eb21fd4f6b20738fc0c50759d6522eb5a2b9aa2d9205580167
                                                                            • Instruction Fuzzy Hash: 8601F93610669167C71F27776C4ED3B2E5EBBD1775F214428F4D5E329BEA248C014120
                                                                            APIs
                                                                            • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0060FF41,80070057,?,?,?,0061035E), ref: 0061002B
                                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0060FF41,80070057,?,?), ref: 00610046
                                                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0060FF41,80070057,?,?), ref: 00610054
                                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0060FF41,80070057,?), ref: 00610064
                                                                            • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0060FF41,80070057,?,?), ref: 00610070
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 3897988419-0
                                                                            • Opcode ID: 6c185ae957c5e19e1ce16170f80fee722ba5cf8966974effd5495794125c7369
                                                                            • Instruction ID: 8adc2c051da4f0df05ec8636fe4f5551db3079c6df3651c2cabd8dba3427cef0
                                                                            • Opcode Fuzzy Hash: 6c185ae957c5e19e1ce16170f80fee722ba5cf8966974effd5495794125c7369
                                                                            • Instruction Fuzzy Hash: D2017176601204AFEB514F64DC04BEA7AAEEB48762F185114F905D2310E7B1DDC087A0
                                                                            APIs
                                                                            • QueryPerformanceCounter.KERNEL32(?), ref: 0061E997
                                                                            • QueryPerformanceFrequency.KERNEL32(?), ref: 0061E9A5
                                                                            • Sleep.KERNEL32(00000000), ref: 0061E9AD
                                                                            • QueryPerformanceCounter.KERNEL32(?), ref: 0061E9B7
                                                                            • Sleep.KERNEL32 ref: 0061E9F3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                            • String ID:
                                                                            • API String ID: 2833360925-0
                                                                            • Opcode ID: 4317a86ca85f3b31e9a3151729ff7b9abb905ff4c75bda85ae315a720e6e836f
                                                                            • Instruction ID: 90ced2f77c34c9fddc2859509bc1d8b7b3961ef8d494e76cdf1ba3168b96e418
                                                                            • Opcode Fuzzy Hash: 4317a86ca85f3b31e9a3151729ff7b9abb905ff4c75bda85ae315a720e6e836f
                                                                            • Instruction Fuzzy Hash: E3018035C0252DDBCF40AFE4DC49AEDBB7AFF09710F040946E902B2250DB359691C761
                                                                            APIs
                                                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00611114
                                                                            • GetLastError.KERNEL32(?,00000000,00000000,?,?,00610B9B,?,?,?), ref: 00611120
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00610B9B,?,?,?), ref: 0061112F
                                                                            • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00610B9B,?,?,?), ref: 00611136
                                                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0061114D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 842720411-0
                                                                            • Opcode ID: 3559105c1505fca6626a651a498be8fc18badcca1ae00f379646fc3e5980b16b
                                                                            • Instruction ID: 09fa1ff585c2b26b47732e3d80584f19ffbffe32245988697b4513a96d526a88
                                                                            • Opcode Fuzzy Hash: 3559105c1505fca6626a651a498be8fc18badcca1ae00f379646fc3e5980b16b
                                                                            • Instruction Fuzzy Hash: B4016979202205BFDB515FA5DC49AAA3B6FEF8B3A4B240418FA41C7360DA31DC409A60
                                                                            APIs
                                                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00610FCA
                                                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00610FD6
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00610FE5
                                                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00610FEC
                                                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00611002
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 44706859-0
                                                                            • Opcode ID: adbd56be28fc02bd6a7dbda2b8f638986f40b06e64c1034bfc8b022a390effa6
                                                                            • Instruction ID: 3b0634df78a757a7989a568c4154a31d78068283f4c4c1671ee86d6e4d9c66c6
                                                                            • Opcode Fuzzy Hash: adbd56be28fc02bd6a7dbda2b8f638986f40b06e64c1034bfc8b022a390effa6
                                                                            • Instruction Fuzzy Hash: 33F04939602301ABDB215FA4DC49F963BAEEF8A7A2F145414FA45CB351CA71DC808A60
                                                                            APIs
                                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0061102A
                                                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00611036
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00611045
                                                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0061104C
                                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00611062
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 44706859-0
                                                                            • Opcode ID: c9289e8e95b27d283b93eb5fb1a76395a9dea6259245b282ae04a34bb9f94b1b
                                                                            • Instruction ID: 0e6c005950aa88bd1c5f7573182fb5f4b4a4a599c23cba3f4d0f395a6092790b
                                                                            • Opcode Fuzzy Hash: c9289e8e95b27d283b93eb5fb1a76395a9dea6259245b282ae04a34bb9f94b1b
                                                                            • Instruction Fuzzy Hash: 7EF04939602345ABDB225FA5EC49F963BAEEF8A762F141414FA45CB350CA71D8C0CA60
                                                                            APIs
                                                                            • CloseHandle.KERNEL32(?,?,?,?,0062017D,?,006232FC,?,00000001,005F2592,?), ref: 00620324
                                                                            • CloseHandle.KERNEL32(?,?,?,?,0062017D,?,006232FC,?,00000001,005F2592,?), ref: 00620331
                                                                            • CloseHandle.KERNEL32(?,?,?,?,0062017D,?,006232FC,?,00000001,005F2592,?), ref: 0062033E
                                                                            • CloseHandle.KERNEL32(?,?,?,?,0062017D,?,006232FC,?,00000001,005F2592,?), ref: 0062034B
                                                                            • CloseHandle.KERNEL32(?,?,?,?,0062017D,?,006232FC,?,00000001,005F2592,?), ref: 00620358
                                                                            • CloseHandle.KERNEL32(?,?,?,?,0062017D,?,006232FC,?,00000001,005F2592,?), ref: 00620365
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandle
                                                                            • String ID:
                                                                            • API String ID: 2962429428-0
                                                                            • Opcode ID: 7bcb1f47930e3622887615ac765dfe230623d1d6554abee3ff0b667d4d24077b
                                                                            • Instruction ID: 4707c7fd873ff8ec6cf66d0310fc3a53ad15529c79eb52d00da125efd29c85dc
                                                                            • Opcode Fuzzy Hash: 7bcb1f47930e3622887615ac765dfe230623d1d6554abee3ff0b667d4d24077b
                                                                            • Instruction Fuzzy Hash: 7301A276801F269FD7309F66E880452FBF6BF503153158A3FD19652A32C371A954CF80
                                                                            APIs
                                                                            • _free.LIBCMT ref: 005ED752
                                                                              • Part of subcall function 005E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000), ref: 005E29DE
                                                                              • Part of subcall function 005E29C8: GetLastError.KERNEL32(00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000,00000000), ref: 005E29F0
                                                                            • _free.LIBCMT ref: 005ED764
                                                                            • _free.LIBCMT ref: 005ED776
                                                                            • _free.LIBCMT ref: 005ED788
                                                                            • _free.LIBCMT ref: 005ED79A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 074ae92e2f9c614133d2bd22c15ea8b15fe919543bd42b82cc77b9895ff3030f
                                                                            • Instruction ID: 07657551d31e59ad3b151740a5b12d29e44b6a56ae26076fc41cf2092673ccca
                                                                            • Opcode Fuzzy Hash: 074ae92e2f9c614133d2bd22c15ea8b15fe919543bd42b82cc77b9895ff3030f
                                                                            • Instruction Fuzzy Hash: 6BF0CD325442896BC65DEB56F986D167FEEFB44720B951809F09CD7506C624F8C04A74
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00615C58
                                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00615C6F
                                                                            • MessageBeep.USER32(00000000), ref: 00615C87
                                                                            • KillTimer.USER32(?,0000040A), ref: 00615CA3
                                                                            • EndDialog.USER32(?,00000001), ref: 00615CBD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                            • String ID:
                                                                            • API String ID: 3741023627-0
                                                                            • Opcode ID: e70649578fb4aefa9a231907397e01e73aa35bbfb3b5cb3a0db681d902587d1c
                                                                            • Instruction ID: c9e515c2f4a7ddb3ef97a386a2ed8550ef7d69661810b7a10d9da28fa3eac68c
                                                                            • Opcode Fuzzy Hash: e70649578fb4aefa9a231907397e01e73aa35bbfb3b5cb3a0db681d902587d1c
                                                                            • Instruction Fuzzy Hash: 7401D634501B04EBEB205F10DD4EFE6BBBABB41B01F04115DA683A11E0DBF4A9848A90
                                                                            APIs
                                                                            • _free.LIBCMT ref: 005E22BE
                                                                              • Part of subcall function 005E29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000), ref: 005E29DE
                                                                              • Part of subcall function 005E29C8: GetLastError.KERNEL32(00000000,?,005ED7D1,00000000,00000000,00000000,00000000,?,005ED7F8,00000000,00000007,00000000,?,005EDBF5,00000000,00000000), ref: 005E29F0
                                                                            • _free.LIBCMT ref: 005E22D0
                                                                            • _free.LIBCMT ref: 005E22E3
                                                                            • _free.LIBCMT ref: 005E22F4
                                                                            • _free.LIBCMT ref: 005E2305
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: f8e5c3d5d60778e94b0793f84c8490ebe810c2f4e047f281ef4326a02bf98d1b
                                                                            • Instruction ID: 5fdebd44d813c95e2f8024f72fa42137c6de37e61a54e0367aea62afedf0be41
                                                                            • Opcode Fuzzy Hash: f8e5c3d5d60778e94b0793f84c8490ebe810c2f4e047f281ef4326a02bf98d1b
                                                                            • Instruction Fuzzy Hash: 75F03075400155ABC72AAF65BC068083F6FB719760B01770AF568DB27AC73406D29BA5
                                                                            APIs
                                                                            • EndPath.GDI32(?), ref: 005C95D4
                                                                            • StrokeAndFillPath.GDI32(?,?,006071F7,00000000,?,?,?), ref: 005C95F0
                                                                            • SelectObject.GDI32(?,00000000), ref: 005C9603
                                                                            • DeleteObject.GDI32 ref: 005C9616
                                                                            • StrokePath.GDI32(?), ref: 005C9631
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                            • String ID:
                                                                            • API String ID: 2625713937-0
                                                                            • Opcode ID: e2fde7e31322a6ba1b991c6cb8227afbacb3771859b9a1f044fba93ded431d62
                                                                            • Instruction ID: 3264eaabc1af2e4a7ae8919c566fb2696f3ab4a57b569aceb871c886c1fbf81d
                                                                            • Opcode Fuzzy Hash: e2fde7e31322a6ba1b991c6cb8227afbacb3771859b9a1f044fba93ded431d62
                                                                            • Instruction Fuzzy Hash: 47F03C38006608EFDB265FA5ED1CB643F6ABB02332F04A318F525591F0C7318992DF60
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: __freea$_free
                                                                            • String ID: a/p$am/pm
                                                                            • API String ID: 3432400110-3206640213
                                                                            • Opcode ID: d2ff23770497f31a82fc98470c92052e7b21a49ddbd3350349a4eaa08ab5c4ee
                                                                            • Instruction ID: b5989af85dc37999534ee6b269a9af650868eabfc5c3f2aa2ff78623c4d9d606
                                                                            • Opcode Fuzzy Hash: d2ff23770497f31a82fc98470c92052e7b21a49ddbd3350349a4eaa08ab5c4ee
                                                                            • Instruction Fuzzy Hash: EAD1E375900A86CBCB2C9F6AC849BFEBFB1FF09300F140959E6819B654D3759D80CB59
                                                                            APIs
                                                                              • Part of subcall function 005D0242: EnterCriticalSection.KERNEL32(0068070C,00681884,?,?,005C198B,00682518,?,?,?,005B12F9,00000000), ref: 005D024D
                                                                              • Part of subcall function 005D0242: LeaveCriticalSection.KERNEL32(0068070C,?,005C198B,00682518,?,?,?,005B12F9,00000000), ref: 005D028A
                                                                              • Part of subcall function 005D00A3: __onexit.LIBCMT ref: 005D00A9
                                                                            • __Init_thread_footer.LIBCMT ref: 00636238
                                                                              • Part of subcall function 005D01F8: EnterCriticalSection.KERNEL32(0068070C,?,?,005C8747,00682514), ref: 005D0202
                                                                              • Part of subcall function 005D01F8: LeaveCriticalSection.KERNEL32(0068070C,?,005C8747,00682514), ref: 005D0235
                                                                              • Part of subcall function 0062359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 006235E4
                                                                              • Part of subcall function 0062359C: LoadStringW.USER32(00682390,?,00000FFF,?), ref: 0062360A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                                            • String ID: x#h$x#h$x#h
                                                                            • API String ID: 1072379062-1845804875
                                                                            • Opcode ID: 7eb03b3f56b5802eb31648fb431b375bea8a080821e58ac795182b130fdcef14
                                                                            • Instruction ID: 6ddc35703a01453b7c1c28ad076d19a108adaf111e7af497fd2c5eba983c9609
                                                                            • Opcode Fuzzy Hash: 7eb03b3f56b5802eb31648fb431b375bea8a080821e58ac795182b130fdcef14
                                                                            • Instruction Fuzzy Hash: 33C14B71A00106AFDB14DF98C895EFABBBAFF48310F148069F955AB291DB70ED45CB90
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 005E8B6E
                                                                            • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 005E8B7A
                                                                            • __dosmaperr.LIBCMT ref: 005E8B81
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                            • String ID: .]
                                                                            • API String ID: 2434981716-3162272647
                                                                            • Opcode ID: 01edfdb8ddf466b4dbd98307b559c8a17567f568d1450ec3aee8cb28eaceed64
                                                                            • Instruction ID: 6f87642ec44fff09fee743e64e02cfb958d82861fc927837fab2095bb9519772
                                                                            • Opcode Fuzzy Hash: 01edfdb8ddf466b4dbd98307b559c8a17567f568d1450ec3aee8cb28eaceed64
                                                                            • Instruction Fuzzy Hash: 9A4180705040C5AFDB299F15CC80A797F9AFF85314B1885A9F8CD87242DE318C028750
                                                                            APIs
                                                                              • Part of subcall function 0061B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006121D0,?,?,00000034,00000800,?,00000034), ref: 0061B42D
                                                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00612760
                                                                              • Part of subcall function 0061B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006121FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0061B3F8
                                                                              • Part of subcall function 0061B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0061B355
                                                                              • Part of subcall function 0061B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00612194,00000034,?,?,00001004,00000000,00000000), ref: 0061B365
                                                                              • Part of subcall function 0061B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00612194,00000034,?,?,00001004,00000000,00000000), ref: 0061B37B
                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006127CD
                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0061281A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                            • String ID: @
                                                                            • API String ID: 4150878124-2766056989
                                                                            • Opcode ID: a76325c1c65bfc0ab087ff2a42a66328785825f9c82e11fc55e37f0114f4d18f
                                                                            • Instruction ID: 4b9e7755bd67ded0850001bf740306e9d71c965b4bc4bddaff538f1f0c992f1c
                                                                            • Opcode Fuzzy Hash: a76325c1c65bfc0ab087ff2a42a66328785825f9c82e11fc55e37f0114f4d18f
                                                                            • Instruction Fuzzy Hash: 7C416076900219BFDB50DFA4CC95ADEBBB9EF05300F049099FA55B7181DB706E85CBA0
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\YU SV Payment.exe,00000104), ref: 005E1769
                                                                            • _free.LIBCMT ref: 005E1834
                                                                            • _free.LIBCMT ref: 005E183E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _free$FileModuleName
                                                                            • String ID: C:\Users\user\Desktop\YU SV Payment.exe
                                                                            • API String ID: 2506810119-1576623176
                                                                            • Opcode ID: d62f79d6a46ff199dc7b4e2e94072a53eac0cef4a8aae840c26bd020aa50046d
                                                                            • Instruction ID: 6adb3f4a6318094ca22bb31a7219d1d8799f64c538d06c94cf7f66da3fb0bc4d
                                                                            • Opcode Fuzzy Hash: d62f79d6a46ff199dc7b4e2e94072a53eac0cef4a8aae840c26bd020aa50046d
                                                                            • Instruction Fuzzy Hash: 5B31C071A04698BBDB29DF9A9C85D9EBFFCFB85710F1041A6F844D7211D6708E80CB94
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0061C306
                                                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 0061C34C
                                                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00681990,00F65750), ref: 0061C395
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Delete$InfoItem
                                                                            • String ID: 0
                                                                            • API String ID: 135850232-4108050209
                                                                            • Opcode ID: ab15a3d2a98076e13d963a2a4542d3d9020162ca4309e7500a4f84a69f6f32e5
                                                                            • Instruction ID: f843aa0edef5a99dfa97018fd2dde16093e1de3542eee9b86d04644e9557573d
                                                                            • Opcode Fuzzy Hash: ab15a3d2a98076e13d963a2a4542d3d9020162ca4309e7500a4f84a69f6f32e5
                                                                            • Instruction Fuzzy Hash: EA41AE312443019FD724DF24D884B9EBBE6AF85320F088A1EF9A597391D730A945CB66
                                                                            APIs
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0064CC08,00000000,?,?,?,?), ref: 006444AA
                                                                            • GetWindowLongW.USER32 ref: 006444C7
                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 006444D7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long
                                                                            • String ID: SysTreeView32
                                                                            • API String ID: 847901565-1698111956
                                                                            • Opcode ID: 08197231c939868c034e147f9c2aad927a604e7abc54b8e0b87ca8a34b5ff394
                                                                            • Instruction ID: 8e7c11681ef68f81f44a97d34492b31dbd364558aaf1e7e780fcd087d58d9778
                                                                            • Opcode Fuzzy Hash: 08197231c939868c034e147f9c2aad927a604e7abc54b8e0b87ca8a34b5ff394
                                                                            • Instruction Fuzzy Hash: 2031B031200605AFDF248E78DC46BDA7BAAEB49334F204315F975A32D0DB74EC509750
                                                                            APIs
                                                                            • SysReAllocString.OLEAUT32(?,?), ref: 00616EED
                                                                            • VariantCopyInd.OLEAUT32(?,?), ref: 00616F08
                                                                            • VariantClear.OLEAUT32(?), ref: 00616F12
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$AllocClearCopyString
                                                                            • String ID: *ja
                                                                            • API String ID: 2173805711-1866254535
                                                                            • Opcode ID: 5ee9cebf62811fee2445ed5a00c6d4f446a9c5f759215004a256290abc0bc104
                                                                            • Instruction ID: 8136d85b8f6a72071ac3141bb75d79db183e0794479325592689c6512cb67e64
                                                                            • Opcode Fuzzy Hash: 5ee9cebf62811fee2445ed5a00c6d4f446a9c5f759215004a256290abc0bc104
                                                                            • Instruction Fuzzy Hash: 08318F79604206DFCB04AFA5E8559FE7BBBFF85300B140498F9024B2B1D770A953EBA0
                                                                            APIs
                                                                              • Part of subcall function 0063335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00633077,?,?), ref: 00633378
                                                                            • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0063307A
                                                                            • _wcslen.LIBCMT ref: 0063309B
                                                                            • htons.WSOCK32(00000000,?,?,00000000), ref: 00633106
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                            • String ID: 255.255.255.255
                                                                            • API String ID: 946324512-2422070025
                                                                            • Opcode ID: 8252abc2f4798041b894b37d3f58a0c482ed943b31e6f6287983baa4886d0193
                                                                            • Instruction ID: 81ef6a155fa9d2264ffa981ebc272bb58f11df6e187d94919511d75e4e3a5cf5
                                                                            • Opcode Fuzzy Hash: 8252abc2f4798041b894b37d3f58a0c482ed943b31e6f6287983baa4886d0193
                                                                            • Instruction Fuzzy Hash: 2F31D3396042119FCB24CF28C585EAA7BF2EF55318F248059E9158F3A2DB32EE41C7A0
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00644705
                                                                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00644713
                                                                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0064471A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$DestroyWindow
                                                                            • String ID: msctls_updown32
                                                                            • API String ID: 4014797782-2298589950
                                                                            • Opcode ID: 7d01b8a33afa324e6f94fcf617136f52574c557cd20f48668042c675d5195f1f
                                                                            • Instruction ID: ffa2caea0bb866eb147d7d37c18eede8807ff7c6d07f8154814602c3109f297d
                                                                            • Opcode Fuzzy Hash: 7d01b8a33afa324e6f94fcf617136f52574c557cd20f48668042c675d5195f1f
                                                                            • Instruction Fuzzy Hash: 6F215EB5600209AFDB10DF64DC96DA73BAEEB9A3A4B050559FA049B351CB30EC12CB60
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen
                                                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                            • API String ID: 176396367-2734436370
                                                                            • Opcode ID: 53df0ff1d6daef8cb52c64f2125a12f662395db21a3bd9d847cb242fcc4aeebb
                                                                            • Instruction ID: 14fd974cefebe30a7b8cfaf59c57363489e63643c059554098f2b4a25c07684d
                                                                            • Opcode Fuzzy Hash: 53df0ff1d6daef8cb52c64f2125a12f662395db21a3bd9d847cb242fcc4aeebb
                                                                            • Instruction Fuzzy Hash: 0721263210411266E331AB289826FF777DEEFD5300F184026F949A7242EB51ADC2C2F5
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00643840
                                                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00643850
                                                                            • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00643876
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$MoveWindow
                                                                            • String ID: Listbox
                                                                            • API String ID: 3315199576-2633736733
                                                                            • Opcode ID: 53347b351c25172a580078cf98270fe21df702e75480a71b1c0b8be708562620
                                                                            • Instruction ID: 4da4646d26fc7792f295b6d2f68468699f7a46fd0a30fa6633372b9aa4a053c3
                                                                            • Opcode Fuzzy Hash: 53347b351c25172a580078cf98270fe21df702e75480a71b1c0b8be708562620
                                                                            • Instruction Fuzzy Hash: 0D218072610228BFEB119F55CC45EEB7B6FEF89760F118114F9459B290C671DC5287A0
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 00624A08
                                                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00624A5C
                                                                            • SetErrorMode.KERNEL32(00000000,?,?,0064CC08), ref: 00624AD0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$InformationVolume
                                                                            • String ID: %lu
                                                                            • API String ID: 2507767853-685833217
                                                                            • Opcode ID: 928179f1b7338392e2b35b4ba34e2958676057d5dcf1f6f255a2c9edebb5da89
                                                                            • Instruction ID: 03f5d4bca56d144086d958fb13cb2b217f9880c261d13ff1c92139d426a735d9
                                                                            • Opcode Fuzzy Hash: 928179f1b7338392e2b35b4ba34e2958676057d5dcf1f6f255a2c9edebb5da89
                                                                            • Instruction Fuzzy Hash: 42318D74A00109AFDB10DF64C885EAA7BF9EF49318F1480A8F909DB352DB71EE45CB61
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0064424F
                                                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00644264
                                                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00644271
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: msctls_trackbar32
                                                                            • API String ID: 3850602802-1010561917
                                                                            • Opcode ID: 4717c409553c5af8feb863c2c1d531654ab115f0ad345cb34e613c6035284d30
                                                                            • Instruction ID: 9874040f7471088e4526861caca2ffcc465ebd582a0e1b7c01261289971f0418
                                                                            • Opcode Fuzzy Hash: 4717c409553c5af8feb863c2c1d531654ab115f0ad345cb34e613c6035284d30
                                                                            • Instruction Fuzzy Hash: 72110631240208BEEF205F29CC06FEB3BAEEF95B64F010624FA55E7190D6B1DC119B10
                                                                            APIs
                                                                              • Part of subcall function 005B6B57: _wcslen.LIBCMT ref: 005B6B6A
                                                                              • Part of subcall function 00612DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00612DC5
                                                                              • Part of subcall function 00612DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00612DD6
                                                                              • Part of subcall function 00612DA7: GetCurrentThreadId.KERNEL32 ref: 00612DDD
                                                                              • Part of subcall function 00612DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00612DE4
                                                                            • GetFocus.USER32 ref: 00612F78
                                                                              • Part of subcall function 00612DEE: GetParent.USER32(00000000), ref: 00612DF9
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00612FC3
                                                                            • EnumChildWindows.USER32(?,0061303B), ref: 00612FEB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                            • String ID: %s%d
                                                                            • API String ID: 1272988791-1110647743
                                                                            • Opcode ID: 69cb6a81aa666fa2b71ed4fbe0f1486a99fdbba0185b4c09ecf27a227bf60725
                                                                            • Instruction ID: cced9d3d4ebcab8b1841da031b79e7fcbf9e08c2c4179439e09f710ae5197cae
                                                                            • Opcode Fuzzy Hash: 69cb6a81aa666fa2b71ed4fbe0f1486a99fdbba0185b4c09ecf27a227bf60725
                                                                            • Instruction Fuzzy Hash: FD11E4756002066BCF44BF70DC99EED37ABAF89314F088079F90A9B352DE3099858B70
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 006458C1
                                                                            • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 006458EE
                                                                            • DrawMenuBar.USER32(?), ref: 006458FD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$InfoItem$Draw
                                                                            • String ID: 0
                                                                            • API String ID: 3227129158-4108050209
                                                                            • Opcode ID: 22e904724b8a0784bb8409e646fbe0eeb8cfdcb306759ba0eadd9ada559dceaa
                                                                            • Instruction ID: 2e67f97feddf312de7c2e69446ae279e9b0f8afa5e941613eb59825e98eaf16a
                                                                            • Opcode Fuzzy Hash: 22e904724b8a0784bb8409e646fbe0eeb8cfdcb306759ba0eadd9ada559dceaa
                                                                            • Instruction Fuzzy Hash: 37018431501258EFDB519F51DC44FEEBBBAFF46760F108099E84ADA252DB308A94DF21
                                                                            APIs
                                                                            • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0060D3BF
                                                                            • FreeLibrary.KERNEL32 ref: 0060D3E5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: AddressFreeLibraryProc
                                                                            • String ID: GetSystemWow64DirectoryW$X64
                                                                            • API String ID: 3013587201-2590602151
                                                                            • Opcode ID: fda833da08a6e6fef3db240a924bab0864bd68814002ab56f23f1e2dc089858e
                                                                            • Instruction ID: df370809ec106bca729668224a8575ba32055d3714747125862c7933c297b32e
                                                                            • Opcode Fuzzy Hash: fda833da08a6e6fef3db240a924bab0864bd68814002ab56f23f1e2dc089858e
                                                                            • Instruction Fuzzy Hash: F0F05C62882520EBC37D16904C14A9B7B17EF12711B545718F501E2384D710CE408796
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5e725ef7b31a123000d4a1ed573a672fa2994cb840f53b7bdddf826402695e8f
                                                                            • Instruction ID: 24bb4e88b83d910ab21ca5802ef63861626e9a2ef7ca89753566ff65963a7645
                                                                            • Opcode Fuzzy Hash: 5e725ef7b31a123000d4a1ed573a672fa2994cb840f53b7bdddf826402695e8f
                                                                            • Instruction Fuzzy Hash: 3CC15C75A0021AEFDB14CFA4C894AAEB7B6FF48304F248598E515EB251D771DEC2CB90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInitInitializeUninitialize
                                                                            • String ID:
                                                                            • API String ID: 1998397398-0
                                                                            • Opcode ID: 56650ba0018e2f55f42ca268b1e886cb27536fa458e70abeade72b7ff83bfc65
                                                                            • Instruction ID: 20588a9a7bec5d1ddb3ad8abaab5d7eb656f1add40f7b03e10b6aaecb87db221
                                                                            • Opcode Fuzzy Hash: 56650ba0018e2f55f42ca268b1e886cb27536fa458e70abeade72b7ff83bfc65
                                                                            • Instruction Fuzzy Hash: 73A13A756043119FC710DF24C586A6ABBE6FF89724F14885DF98A9B3A2DB30ED01CB91
                                                                            APIs
                                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0064FC08,?), ref: 006105F0
                                                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0064FC08,?), ref: 00610608
                                                                            • CLSIDFromProgID.OLE32(?,?,00000000,0064CC40,000000FF,?,00000000,00000800,00000000,?,0064FC08,?), ref: 0061062D
                                                                            • _memcmp.LIBVCRUNTIME ref: 0061064E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: FromProg$FreeTask_memcmp
                                                                            • String ID:
                                                                            • API String ID: 314563124-0
                                                                            • Opcode ID: 6dcd0dc8dc6a113a833c7b7f5362c4c679e76b4aecf51d29684a080f9941a6f2
                                                                            • Instruction ID: c668f5f5822432be763b5f04d2735e13db26a4738be50648d2b1ec8dc944bce3
                                                                            • Opcode Fuzzy Hash: 6dcd0dc8dc6a113a833c7b7f5362c4c679e76b4aecf51d29684a080f9941a6f2
                                                                            • Instruction Fuzzy Hash: 67813C71A00109EFDF04DF94C984DEEB7BAFF89315F244558E506AB250DB71AE46CB60
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: b54843d773c2cfaa85d9b0ca89e83350c1e8ae609d731730616af5594a394659
                                                                            • Instruction ID: cc31de8ba72204e0f35412c9714541db26abcb8c9bfdc71ee6ff79f438a2fc58
                                                                            • Opcode Fuzzy Hash: b54843d773c2cfaa85d9b0ca89e83350c1e8ae609d731730616af5594a394659
                                                                            • Instruction Fuzzy Hash: 5E413A3550090AEBDF256BBD9C4D6BE3EA4FFC1330F240626FA19D6392E63848415775
                                                                            APIs
                                                                            • GetWindowRect.USER32(00F6E7B0,?), ref: 006462E2
                                                                            • ScreenToClient.USER32(?,?), ref: 00646315
                                                                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00646382
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ClientMoveRectScreen
                                                                            • String ID:
                                                                            • API String ID: 3880355969-0
                                                                            • Opcode ID: 67696b7eea371655694a90b23d829cc800aaf3b54a42ac73407b0a506c7aaaac
                                                                            • Instruction ID: 3cd0a5f09d051283a5889ff294659bba649b43ee725b5a428aee04a4a271572e
                                                                            • Opcode Fuzzy Hash: 67696b7eea371655694a90b23d829cc800aaf3b54a42ac73407b0a506c7aaaac
                                                                            • Instruction Fuzzy Hash: 83510874A00249EFCF15DF68D8809EE7BB6FB46364F109259F8159B390D730AE81CB91
                                                                            APIs
                                                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 00631AFD
                                                                            • WSAGetLastError.WSOCK32 ref: 00631B0B
                                                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00631B8A
                                                                            • WSAGetLastError.WSOCK32 ref: 00631B94
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$socket
                                                                            • String ID:
                                                                            • API String ID: 1881357543-0
                                                                            • Opcode ID: 5b16b624ea0563b84d85a6fecf149a6bb829541bc68cd78487c74c9fcc337760
                                                                            • Instruction ID: baf02d74fc78c3e01e91e87df281f73aafdd00e2d33a0ad073437449f2f2ae4c
                                                                            • Opcode Fuzzy Hash: 5b16b624ea0563b84d85a6fecf149a6bb829541bc68cd78487c74c9fcc337760
                                                                            • Instruction Fuzzy Hash: FE41A638600201AFE720AF24C88AF667BE5AB85718F54845CF5169F7D2D772ED42CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d6c5c41350383e330085389c5df274867967c89a4a5c2d1105e31bd178014fee
                                                                            • Instruction ID: cf27bf95035631ae456b59807442d5a2c7c730358a535e68fb17f5e07d75191f
                                                                            • Opcode Fuzzy Hash: d6c5c41350383e330085389c5df274867967c89a4a5c2d1105e31bd178014fee
                                                                            • Instruction Fuzzy Hash: 9141E6B5A00745AFEB289F79CC45B6BBFAAFBC4711F10452AF581DB2C2D77199018780
                                                                            APIs
                                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00625783
                                                                            • GetLastError.KERNEL32(?,00000000), ref: 006257A9
                                                                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 006257CE
                                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 006257FA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 3321077145-0
                                                                            • Opcode ID: 9c712be952ba77ef9af08cf26594d18f56303eb9fda6d8d13ac1a1b31406bb0f
                                                                            • Instruction ID: 98d7f810b0b50f262ed73a6bfc7d088ac9a68de3bad6a3a6758978271600c91e
                                                                            • Opcode Fuzzy Hash: 9c712be952ba77ef9af08cf26594d18f56303eb9fda6d8d13ac1a1b31406bb0f
                                                                            • Instruction Fuzzy Hash: 67411C39600A11DFCB21DF15C445A9ABBE2BF89320B188488E84A5B3A2DB75FD40CF91
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,005D6D71,00000000,00000000,005D82D9,?,005D82D9,?,00000001,005D6D71,?,00000001,005D82D9,005D82D9), ref: 005ED910
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 005ED999
                                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 005ED9AB
                                                                            • __freea.LIBCMT ref: 005ED9B4
                                                                              • Part of subcall function 005E3820: RtlAllocateHeap.NTDLL(00000000,?,00681444,?,005CFDF5,?,?,005BA976,00000010,00681440,005B13FC,?,005B13C6,?,005B1129), ref: 005E3852
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                            • String ID:
                                                                            • API String ID: 2652629310-0
                                                                            • Opcode ID: d76ba6e58da51b32f6c653e2a69f8f6eb6f365ff62c0066b4b219feda4e9e1db
                                                                            • Instruction ID: 022d5358f15ecd21dd86a5d402f56dda9297bf0a52f63b9c2b8d3410b56578ab
                                                                            • Opcode Fuzzy Hash: d76ba6e58da51b32f6c653e2a69f8f6eb6f365ff62c0066b4b219feda4e9e1db
                                                                            • Instruction Fuzzy Hash: 1131CD72A0024AABDB288F66DC45EAE7FB6FB41350F050169FC44D7252EB35CD50CBA0
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 00645352
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00645375
                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00645382
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006453A8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow$InvalidateMessageRectSend
                                                                            • String ID:
                                                                            • API String ID: 3340791633-0
                                                                            • Opcode ID: 8d517e2e2e9a2f0fcc9a8071dfd10889fbeb3ecfb1818140ac6e5bb4ddbd2b79
                                                                            • Instruction ID: a734213500d31dd01cd5bc6db4e4cadf665dcfd7154edb09c642b72ba5fd0245
                                                                            • Opcode Fuzzy Hash: 8d517e2e2e9a2f0fcc9a8071dfd10889fbeb3ecfb1818140ac6e5bb4ddbd2b79
                                                                            • Instruction Fuzzy Hash: 7231C234A55A08FFEF329F14CC06BE837A7AB05390F585141FA12963E2E7B49D41DB82
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 0061ABF1
                                                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 0061AC0D
                                                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 0061AC74
                                                                            • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 0061ACC6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: KeyboardState$InputMessagePostSend
                                                                            • String ID:
                                                                            • API String ID: 432972143-0
                                                                            • Opcode ID: 13c4ea8abc5d1c427e6aefe59a739cea91b479c3cd14b8651ada7a3b2609af23
                                                                            • Instruction ID: ffcd41ecaac0177d99969212b19460b11aa78c0cb0fe1303eb30169c209eaee4
                                                                            • Opcode Fuzzy Hash: 13c4ea8abc5d1c427e6aefe59a739cea91b479c3cd14b8651ada7a3b2609af23
                                                                            • Instruction Fuzzy Hash: 84310630A01718AFEF35CBA58C047FA7BA7AB89320F0C421AE485923D1D37589C597E2
                                                                            APIs
                                                                            • ClientToScreen.USER32(?,?), ref: 0064769A
                                                                            • GetWindowRect.USER32(?,?), ref: 00647710
                                                                            • PtInRect.USER32(?,?,00648B89), ref: 00647720
                                                                            • MessageBeep.USER32(00000000), ref: 0064778C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                                            • String ID:
                                                                            • API String ID: 1352109105-0
                                                                            • Opcode ID: bdeab7cc33444a271de6c449d83b44a22ab5d8e20c99e6eea43f5999ac61cdb1
                                                                            • Instruction ID: dc583ea56e20da94e3f061f7edbae6795c1a0c10b25bca19b5b812fb7524f671
                                                                            • Opcode Fuzzy Hash: bdeab7cc33444a271de6c449d83b44a22ab5d8e20c99e6eea43f5999ac61cdb1
                                                                            • Instruction Fuzzy Hash: D0416D38605214EFCB11CF58D894EA9B7FAFF4A314F5951A8E4149F361C731A942CF90
                                                                            APIs
                                                                            • GetForegroundWindow.USER32 ref: 006416EB
                                                                              • Part of subcall function 00613A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00613A57
                                                                              • Part of subcall function 00613A3D: GetCurrentThreadId.KERNEL32 ref: 00613A5E
                                                                              • Part of subcall function 00613A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,006125B3), ref: 00613A65
                                                                            • GetCaretPos.USER32(?), ref: 006416FF
                                                                            • ClientToScreen.USER32(00000000,?), ref: 0064174C
                                                                            • GetForegroundWindow.USER32 ref: 00641752
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                            • String ID:
                                                                            • API String ID: 2759813231-0
                                                                            • Opcode ID: 45de4bcccf39f9142c9f21df7723e87f8a81093e6443cf02c35bc215b23a716a
                                                                            • Instruction ID: 2319fbfec42801284e15cfaadd20e8000c4ef278dcf7766ca46ba458604073f0
                                                                            • Opcode Fuzzy Hash: 45de4bcccf39f9142c9f21df7723e87f8a81093e6443cf02c35bc215b23a716a
                                                                            • Instruction Fuzzy Hash: A8311E75D00149AFC704EFA9C8858EEBBFAFF89304B5480AAE415E7311D635AE45CBA0
                                                                            APIs
                                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 0061D501
                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0061D50F
                                                                            • Process32NextW.KERNEL32(00000000,?), ref: 0061D52F
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0061D5DC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                            • String ID:
                                                                            • API String ID: 420147892-0
                                                                            • Opcode ID: db4d812460e2b3d7f288c46fdd7e94df587c4a0fef157eb2113adce5901b5b1f
                                                                            • Instruction ID: 590955d79e6fa3c9a5bc4bc8873141e24867d9ddea48ec2b440926ef38fa6df3
                                                                            • Opcode Fuzzy Hash: db4d812460e2b3d7f288c46fdd7e94df587c4a0fef157eb2113adce5901b5b1f
                                                                            • Instruction Fuzzy Hash: 21317E711082019FD301EF54C885AEFBFEABFD9354F14092DF585872A1EB71A985CB92
                                                                            APIs
                                                                              • Part of subcall function 005C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005C9BB2
                                                                            • GetCursorPos.USER32(?), ref: 00649001
                                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00607711,?,?,?,?,?), ref: 00649016
                                                                            • GetCursorPos.USER32(?), ref: 0064905E
                                                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00607711,?,?,?), ref: 00649094
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                            • String ID:
                                                                            • API String ID: 2864067406-0
                                                                            • Opcode ID: 10a071eab505b6094a7e70b6f21cdae02c1ccd60cee41a38d723eb3c99924209
                                                                            • Instruction ID: d704fcbd40bc81e7136c0bf0f76d99b9fd954bb1fd8f6108d9821a7714494059
                                                                            • Opcode Fuzzy Hash: 10a071eab505b6094a7e70b6f21cdae02c1ccd60cee41a38d723eb3c99924209
                                                                            • Instruction Fuzzy Hash: A2218B35601018FFDB29CF94C859EEB7BBAEB8AB60F044169F9058B261C7319991DB70
                                                                            APIs
                                                                            • GetFileAttributesW.KERNEL32(?,0064CB68), ref: 0061D2FB
                                                                            • GetLastError.KERNEL32 ref: 0061D30A
                                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0061D319
                                                                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0064CB68), ref: 0061D376
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectory$AttributesErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 2267087916-0
                                                                            • Opcode ID: 264f83de8bf0c825fa1c9b409671de0b462bb77d0b341dc5a7055aa84a047608
                                                                            • Instruction ID: 50290cd8610800a14182846cedd02613c8d519bb4099d46a0fa8772a98608dfb
                                                                            • Opcode Fuzzy Hash: 264f83de8bf0c825fa1c9b409671de0b462bb77d0b341dc5a7055aa84a047608
                                                                            • Instruction Fuzzy Hash: 6B2160745052019FC710DF24C8854EA7BE5EE96364F144A1DF4A9C73A1DB31DA86CB93
                                                                            APIs
                                                                              • Part of subcall function 00611014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0061102A
                                                                              • Part of subcall function 00611014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00611036
                                                                              • Part of subcall function 00611014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00611045
                                                                              • Part of subcall function 00611014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0061104C
                                                                              • Part of subcall function 00611014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00611062
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006115BE
                                                                            • _memcmp.LIBVCRUNTIME ref: 006115E1
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00611617
                                                                            • HeapFree.KERNEL32(00000000), ref: 0061161E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                            • String ID:
                                                                            • API String ID: 1592001646-0
                                                                            • Opcode ID: c8f73ff758a6c55941f2cfa11e1f0c17e7a4e681acea09b336f224dd75a5a943
                                                                            • Instruction ID: cec1ad07c21edd9c8be44420c44fc8485db13b109e58e47a5380f58814e84bb6
                                                                            • Opcode Fuzzy Hash: c8f73ff758a6c55941f2cfa11e1f0c17e7a4e681acea09b336f224dd75a5a943
                                                                            • Instruction Fuzzy Hash: C721CF71E01108EFDF00DFA4C944BEEB7BAEF86354F084459E501AB341E731AA84CBA0
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0064280A
                                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00642824
                                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00642832
                                                                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00642840
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$AttributesLayered
                                                                            • String ID:
                                                                            • API String ID: 2169480361-0
                                                                            • Opcode ID: f6913c645981c101927cc4c7d0f1c1c6f2f15c81775c91b2ab502971c7bcc903
                                                                            • Instruction ID: 32f5866068b93b474da51c282a7ce80b7627a537adb46e7fcfdbf01fa0100d3b
                                                                            • Opcode Fuzzy Hash: f6913c645981c101927cc4c7d0f1c1c6f2f15c81775c91b2ab502971c7bcc903
                                                                            • Instruction Fuzzy Hash: DC21D635205512AFD7149B24C854FAA7B9BBF86324F248158F4168B7D2C771FC82CB90
                                                                            APIs
                                                                              • Part of subcall function 00618D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0061790A,?,000000FF,?,00618754,00000000,?,0000001C,?,?), ref: 00618D8C
                                                                              • Part of subcall function 00618D7D: lstrcpyW.KERNEL32(00000000,?,?,0061790A,?,000000FF,?,00618754,00000000,?,0000001C,?,?,00000000), ref: 00618DB2
                                                                              • Part of subcall function 00618D7D: lstrcmpiW.KERNEL32(00000000,?,0061790A,?,000000FF,?,00618754,00000000,?,0000001C,?,?), ref: 00618DE3
                                                                            • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00618754,00000000,?,0000001C,?,?,00000000), ref: 00617923
                                                                            • lstrcpyW.KERNEL32(00000000,?,?,00618754,00000000,?,0000001C,?,?,00000000), ref: 00617949
                                                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,00618754,00000000,?,0000001C,?,?,00000000), ref: 00617984
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: lstrcmpilstrcpylstrlen
                                                                            • String ID: cdecl
                                                                            • API String ID: 4031866154-3896280584
                                                                            • Opcode ID: 21d2fdc0e365689a99639cbe9d52e9932bd26b5fdc1165a81aa90951cd7f6d30
                                                                            • Instruction ID: b83f6de3d2feed69d8a5a5c6898507f9f1e2e44f71d9437862c6d0e24e9f4d2b
                                                                            • Opcode Fuzzy Hash: 21d2fdc0e365689a99639cbe9d52e9932bd26b5fdc1165a81aa90951cd7f6d30
                                                                            • Instruction Fuzzy Hash: 3811033A200302AFCB159F34D844EFA77BAFF85350B14802AF906CB3A4EB319841C7A1
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00647D0B
                                                                            • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00647D2A
                                                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00647D42
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0062B7AD,00000000), ref: 00647D6B
                                                                              • Part of subcall function 005C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 005C9BB2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long
                                                                            • String ID:
                                                                            • API String ID: 847901565-0
                                                                            • Opcode ID: bd50938e8267c7696ea005e6d64fad4f69c8663fa4aba70870bc748973d53a8f
                                                                            • Instruction ID: 8343f011be4f570055cdc710f7bf140b1979163f1583732e637d9fa1d26d0c35
                                                                            • Opcode Fuzzy Hash: bd50938e8267c7696ea005e6d64fad4f69c8663fa4aba70870bc748973d53a8f
                                                                            • Instruction Fuzzy Hash: 5611AF35A15615AFCB10AF68CC04AAA3BAABF46370B159724F839DB3F0E7309D51CB50
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00001060,?,00000004), ref: 006456BB
                                                                            • _wcslen.LIBCMT ref: 006456CD
                                                                            • _wcslen.LIBCMT ref: 006456D8
                                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00645816
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend_wcslen
                                                                            • String ID:
                                                                            • API String ID: 455545452-0
                                                                            • Opcode ID: fd0e2b75d156a8900b742df19697731b2811f2dfd77a296c2358b0cce2b391a2
                                                                            • Instruction ID: 9802bc135c70be866426359617d30a127dec39f0f1ed277870564a7d3ac78d40
                                                                            • Opcode Fuzzy Hash: fd0e2b75d156a8900b742df19697731b2811f2dfd77a296c2358b0cce2b391a2
                                                                            • Instruction Fuzzy Hash: C811D375600619E7DF209F65CC85AEE7BADFF11760F104127F916DA282EB70CA85CB60
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c59cbd999417ffbe25fb4bf75480d0089bd61cb0e763b4153498fdbebf2c7b3d
                                                                            • Instruction ID: 9caa312a0387a1f920729c788339b998c24ff0264fa0ddf7d2f70fd62a3649b9
                                                                            • Opcode Fuzzy Hash: c59cbd999417ffbe25fb4bf75480d0089bd61cb0e763b4153498fdbebf2c7b3d
                                                                            • Instruction Fuzzy Hash: 2D01DFB2205A8A3EF718167A6CC5F272A1DFF813B8F301725F560921D2DB708C404164
                                                                            APIs
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00611A47
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00611A59
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00611A6F
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00611A8A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: f998645f71f9549521b2bca8ffd1e9e16eb797d40e811ad221901cc938d15ce6
                                                                            • Instruction ID: d849a735946f006a18998cbaf3a08a7c2addecec4bec455b0a49e5cb1cdc49ce
                                                                            • Opcode Fuzzy Hash: f998645f71f9549521b2bca8ffd1e9e16eb797d40e811ad221901cc938d15ce6
                                                                            • Instruction Fuzzy Hash: 6F11273A901219FFEB109BA4C985FEDBB79EF09750F240092EA00BB290D6716E50DB94
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 0061E1FD
                                                                            • MessageBoxW.USER32(?,?,?,?), ref: 0061E230
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0061E246
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0061E24D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                            • String ID:
                                                                            • API String ID: 2880819207-0
                                                                            • Opcode ID: 1dd162cfb479c2d083214505e29987791bc160ed06ff466f502e60979ffd651d
                                                                            • Instruction ID: 3fe93abba8773c78697e56b94cf47fb8bbe74bf23507a075a02a6f288b389ad1
                                                                            • Opcode Fuzzy Hash: 1dd162cfb479c2d083214505e29987791bc160ed06ff466f502e60979ffd651d
                                                                            • Instruction Fuzzy Hash: A9110476A04254BBC7019FA89C19ADE7FAEAB47320F044315FC24E3391D6B1CA0087A0
                                                                            APIs
                                                                            • CreateThread.KERNEL32(00000000,?,005DCFF9,00000000,00000004,00000000), ref: 005DD218
                                                                            • GetLastError.KERNEL32 ref: 005DD224
                                                                            • __dosmaperr.LIBCMT ref: 005DD22B
                                                                            • ResumeThread.KERNEL32(00000000), ref: 005DD249
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                            • String ID:
                                                                            • API String ID: 173952441-0
                                                                            • Opcode ID: f69553266fba86bfd8b5bead65e0010758779ee34fa0385a3f289f99bede288f
                                                                            • Instruction ID: ac89cb21a6b72312ad7f2c76acb1bf3dfc2d5e9844f738d337f74f8566475f7c
                                                                            • Opcode Fuzzy Hash: f69553266fba86bfd8b5bead65e0010758779ee34fa0385a3f289f99bede288f
                                                                            • Instruction Fuzzy Hash: 03016D3A805205BBDB315BA9DC09AAA7E69FBC2731F10421BF925963D0DA718941C7B1
                                                                            APIs
                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 005B604C
                                                                            • GetStockObject.GDI32(00000011), ref: 005B6060
                                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 005B606A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CreateMessageObjectSendStockWindow
                                                                            • String ID:
                                                                            • API String ID: 3970641297-0
                                                                            • Opcode ID: 4f93c202d4de11ce05c676ce893833bb55f002bbc4cebca514a3ae3b2242c434
                                                                            • Instruction ID: 83714456127e45f02e27243c7784f26efb55b0cf915d29cc4ab68d3fc264ee25
                                                                            • Opcode Fuzzy Hash: 4f93c202d4de11ce05c676ce893833bb55f002bbc4cebca514a3ae3b2242c434
                                                                            • Instruction Fuzzy Hash: 0611AD7210250CBFEF125FA58C58EFABF6AFF093A4F000205FA0452120D73AAC60DBA1
                                                                            APIs
                                                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 005D3B56
                                                                              • Part of subcall function 005D3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 005D3AD2
                                                                              • Part of subcall function 005D3AA3: ___AdjustPointer.LIBCMT ref: 005D3AED
                                                                            • _UnwindNestedFrames.LIBCMT ref: 005D3B6B
                                                                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 005D3B7C
                                                                            • CallCatchBlock.LIBVCRUNTIME ref: 005D3BA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                            • String ID:
                                                                            • API String ID: 737400349-0
                                                                            • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                            • Instruction ID: ad3a5a9fd645477f28f4b641954157b8413192ee419353916805ad589f348f89
                                                                            • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                            • Instruction Fuzzy Hash: 4501DB32100149BBDF219F99CC4ADEB7F69FF98754F04401BFE4856221C732D9619BA1
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,005B13C6,00000000,00000000,?,005E301A,005B13C6,00000000,00000000,00000000,?,005E328B,00000006,FlsSetValue), ref: 005E30A5
                                                                            • GetLastError.KERNEL32(?,005E301A,005B13C6,00000000,00000000,00000000,?,005E328B,00000006,FlsSetValue,00652290,FlsSetValue,00000000,00000364,?,005E2E46), ref: 005E30B1
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,005E301A,005B13C6,00000000,00000000,00000000,?,005E328B,00000006,FlsSetValue,00652290,FlsSetValue,00000000), ref: 005E30BF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 3177248105-0
                                                                            • Opcode ID: 7df8e0597082aa66f952ed1858bffdaf4e533665d8ebf303a1ad3ac22cde3060
                                                                            • Instruction ID: ebed8d21cd316ae22e83682bdd6aebed1cf611a25b310dd91dcd23e8a6e0668b
                                                                            • Opcode Fuzzy Hash: 7df8e0597082aa66f952ed1858bffdaf4e533665d8ebf303a1ad3ac22cde3060
                                                                            • Instruction Fuzzy Hash: 7C012B36302262ABCB358B7B9C4CA677F99BF46B71B200720F945E7250D721DA05C6E0
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0061747F
                                                                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00617497
                                                                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 006174AC
                                                                            • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 006174CA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Type$Register$FileLoadModuleNameUser
                                                                            • String ID:
                                                                            • API String ID: 1352324309-0
                                                                            • Opcode ID: fa60d36684bad3aaef72c699bd033d7b08913a942fd2098b6c039cfa2cab1391
                                                                            • Instruction ID: e0381ba08bbaa481a12ab4e24529d1227c61e2752a5fd6ff3ca27aaa24e06506
                                                                            • Opcode Fuzzy Hash: fa60d36684bad3aaef72c699bd033d7b08913a942fd2098b6c039cfa2cab1391
                                                                            • Instruction Fuzzy Hash: F511ADB9206314ABE720CF18DD08BD27BFEEB00B10F148569E656D7291DBB0E984DB60
                                                                            APIs
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0061ACD3,?,00008000), ref: 0061B0C4
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0061ACD3,?,00008000), ref: 0061B0E9
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0061ACD3,?,00008000), ref: 0061B0F3
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0061ACD3,?,00008000), ref: 0061B126
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CounterPerformanceQuerySleep
                                                                            • String ID:
                                                                            • API String ID: 2875609808-0
                                                                            • Opcode ID: 24dc462e82f06800cf7438336b0efbb05afed0d92d8801d2d6e29c2996b44d4a
                                                                            • Instruction ID: 1c6217291225823f440426cfe8189c91d7658edec37be5f983a43bb66137e9ab
                                                                            • Opcode Fuzzy Hash: 24dc462e82f06800cf7438336b0efbb05afed0d92d8801d2d6e29c2996b44d4a
                                                                            • Instruction Fuzzy Hash: 2511AD30C0252DEBCF00AFE4E959AEEBF79FF0A721F155085D941B3281CB305A908B51
                                                                            APIs
                                                                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00612DC5
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00612DD6
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00612DDD
                                                                            • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00612DE4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 2710830443-0
                                                                            • Opcode ID: 34c0d3bfc6110ae06910c0432ab7c384c28bb3dceb6c6c03ca8be5e628629c9c
                                                                            • Instruction ID: a57b4f84750e2ac895d0bfca005d0e24c53a7be2f348cb074fb70d06586f2110
                                                                            • Opcode Fuzzy Hash: 34c0d3bfc6110ae06910c0432ab7c384c28bb3dceb6c6c03ca8be5e628629c9c
                                                                            • Instruction Fuzzy Hash: 1FE092756022287BD7202BB3EC0DFEB7E6EEF43BB1F055015F105D12809AA0C881D6B0
                                                                            APIs
                                                                              • Part of subcall function 005C9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005C9693
                                                                              • Part of subcall function 005C9639: SelectObject.GDI32(?,00000000), ref: 005C96A2
                                                                              • Part of subcall function 005C9639: BeginPath.GDI32(?), ref: 005C96B9
                                                                              • Part of subcall function 005C9639: SelectObject.GDI32(?,00000000), ref: 005C96E2
                                                                            • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00648887
                                                                            • LineTo.GDI32(?,?,?), ref: 00648894
                                                                            • EndPath.GDI32(?), ref: 006488A4
                                                                            • StrokePath.GDI32(?), ref: 006488B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                            • String ID:
                                                                            • API String ID: 1539411459-0
                                                                            • Opcode ID: 288f5d7edaafce3f19d2ba7efb6e3b71a25fffe397c5c18bf19a96df99c27e49
                                                                            • Instruction ID: 6e951f3af1ef13f43539a05e54779e9992d250e291f5bb3786f2d60eca1de7b5
                                                                            • Opcode Fuzzy Hash: 288f5d7edaafce3f19d2ba7efb6e3b71a25fffe397c5c18bf19a96df99c27e49
                                                                            • Instruction Fuzzy Hash: F0F03A3A042259BADB125F94AC0DFCE3E5AAF06720F049100FA11662E2C7755551CBE9
                                                                            APIs
                                                                            • GetSysColor.USER32(00000008), ref: 005C98CC
                                                                            • SetTextColor.GDI32(?,?), ref: 005C98D6
                                                                            • SetBkMode.GDI32(?,00000001), ref: 005C98E9
                                                                            • GetStockObject.GDI32(00000005), ref: 005C98F1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Color$ModeObjectStockText
                                                                            • String ID:
                                                                            • API String ID: 4037423528-0
                                                                            • Opcode ID: 0784264c59f05c4be79b9c4520d98327169341d632947ef55851cedb31ed5697
                                                                            • Instruction ID: 0d22130475b9f724e4ed7bb42d0a0fa5efa5718502142a2a7e8fa1adee4f16d5
                                                                            • Opcode Fuzzy Hash: 0784264c59f05c4be79b9c4520d98327169341d632947ef55851cedb31ed5697
                                                                            • Instruction Fuzzy Hash: 10E0ED35680280AEEB210B78AC08BE93F22AB13332F048219F6FA582E1C77156408B10
                                                                            APIs
                                                                            • GetCurrentThread.KERNEL32 ref: 00611634
                                                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,006111D9), ref: 0061163B
                                                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006111D9), ref: 00611648
                                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,006111D9), ref: 0061164F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentOpenProcessThreadToken
                                                                            • String ID:
                                                                            • API String ID: 3974789173-0
                                                                            • Opcode ID: 4996c9a4633dfb451a8c5d4d0dc981ade42dbe4578384dd614618f46199484a5
                                                                            • Instruction ID: 02e34ca06fdfd668c2778c5836154d8cf0988ceacc15ffeacfb62320c8874157
                                                                            • Opcode Fuzzy Hash: 4996c9a4633dfb451a8c5d4d0dc981ade42dbe4578384dd614618f46199484a5
                                                                            • Instruction Fuzzy Hash: 73E04F356022119BD7A01FA09D0DB863B6AAF46BA1F185808F245C9190D66544808B90
                                                                            APIs
                                                                            • GetDesktopWindow.USER32 ref: 0060D858
                                                                            • GetDC.USER32(00000000), ref: 0060D862
                                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0060D882
                                                                            • ReleaseDC.USER32(?), ref: 0060D8A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 2889604237-0
                                                                            • Opcode ID: 7da3f9bb2892c429680c51e3ce9fbc8202ad6946dac730994a30107c6ef58fbe
                                                                            • Instruction ID: eb34db66f59cf60aef61400f3deaa8e628cf02876a0f68d5f145c52864135154
                                                                            • Opcode Fuzzy Hash: 7da3f9bb2892c429680c51e3ce9fbc8202ad6946dac730994a30107c6ef58fbe
                                                                            • Instruction Fuzzy Hash: 90E0E5B8801205EFCB819FA0980CA6DBFB2BB09320B11A459F806E7360C7389901AF50
                                                                            APIs
                                                                            • GetDesktopWindow.USER32 ref: 0060D86C
                                                                            • GetDC.USER32(00000000), ref: 0060D876
                                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0060D882
                                                                            • ReleaseDC.USER32(?), ref: 0060D8A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 2889604237-0
                                                                            • Opcode ID: 292bef2823557fca1fbf3f9e47e12f2eacf64052b1821869b693e3feeb9747c0
                                                                            • Instruction ID: fe523a1794cfeaa2a089d033121b515639dd730f4f33f5abdea927e68e95df94
                                                                            • Opcode Fuzzy Hash: 292bef2823557fca1fbf3f9e47e12f2eacf64052b1821869b693e3feeb9747c0
                                                                            • Instruction Fuzzy Hash: C1E01A78801200DFCB909FA0D80C66DBFB2BB08320B11A448F806E7360C73859019F50
                                                                            APIs
                                                                              • Part of subcall function 005B7620: _wcslen.LIBCMT ref: 005B7625
                                                                            • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00624ED4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Connection_wcslen
                                                                            • String ID: *$LPT
                                                                            • API String ID: 1725874428-3443410124
                                                                            • Opcode ID: 0f0ccbf617e9e4fe0e3e8a6f1652d69e4ef74fd6c4af025479cdae44c021361b
                                                                            • Instruction ID: f396dcb8bdff3b910c5d81aeb034915e30b23a65f8a65b2974a94d2d179da786
                                                                            • Opcode Fuzzy Hash: 0f0ccbf617e9e4fe0e3e8a6f1652d69e4ef74fd6c4af025479cdae44c021361b
                                                                            • Instruction Fuzzy Hash: 1B919075A006159FCB14DF58D584EA9BBF2BF88304F158099E80A9F3A2DB31ED85CF90
                                                                            APIs
                                                                            • __startOneArgErrorHandling.LIBCMT ref: 005DE30D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorHandling__start
                                                                            • String ID: pow
                                                                            • API String ID: 3213639722-2276729525
                                                                            • Opcode ID: e683a57230ecdb13822ec5503a752bd96f46cbd070104b1e3e113c49ef6ff6e8
                                                                            • Instruction ID: c245126ae5552cb9ee119da2f593fc6b812a0067b7af56c7d6d7650ea1271027
                                                                            • Opcode Fuzzy Hash: e683a57230ecdb13822ec5503a752bd96f46cbd070104b1e3e113c49ef6ff6e8
                                                                            • Instruction Fuzzy Hash: F9517D61A0C24B96CB29772DDE073793FA8FB44741F304D9BE0D54A3E9EB308C819A46
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(0060569E,00000000,?,0064CC08,?,00000000,00000000), ref: 006378DD
                                                                              • Part of subcall function 005B6B57: _wcslen.LIBCMT ref: 005B6B6A
                                                                            • CharUpperBuffW.USER32(0060569E,00000000,?,0064CC08,00000000,?,00000000,00000000), ref: 0063783B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper$_wcslen
                                                                            • String ID: <sg
                                                                            • API String ID: 3544283678-99883816
                                                                            • Opcode ID: d3a7452b8cd5027734be78b97d9fcd0f5199cb77b2bd967d1b223c3203b41568
                                                                            • Instruction ID: 8c0d7144c25ed5e6dc5e3dde95ab9fdeb9a0cfd3dd8a6b105ed2576934398bf1
                                                                            • Opcode Fuzzy Hash: d3a7452b8cd5027734be78b97d9fcd0f5199cb77b2bd967d1b223c3203b41568
                                                                            • Instruction Fuzzy Hash: BD616CB291421AEACF14EBA4CC95DFDBBB9BF58300F544529F542B3191EB346A05CBA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: #
                                                                            • API String ID: 0-1885708031
                                                                            • Opcode ID: c6c89472efa2a690a711dd8251748c80f28726ef95e94ca1d6fed20b3089c767
                                                                            • Instruction ID: b9693cd374eff18c029701c11380f26a93953f91a5f321930db72ba57b9108e8
                                                                            • Opcode Fuzzy Hash: c6c89472efa2a690a711dd8251748c80f28726ef95e94ca1d6fed20b3089c767
                                                                            • Instruction Fuzzy Hash: 34515539640256DFDB28DF68C082BFA7FA6FF56310F248819E8919B3C0D6319D42CB90
                                                                            APIs
                                                                            • Sleep.KERNEL32(00000000), ref: 005CF2A2
                                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 005CF2BB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: GlobalMemorySleepStatus
                                                                            • String ID: @
                                                                            • API String ID: 2783356886-2766056989
                                                                            • Opcode ID: 6ffe62364e08129bebed465e0198ae940d7a57427d7972661a62109803365953
                                                                            • Instruction ID: 91e2c478960f5a75fbfc5442710e0b8cfd5e826177cb9b36cefef370be76fd00
                                                                            • Opcode Fuzzy Hash: 6ffe62364e08129bebed465e0198ae940d7a57427d7972661a62109803365953
                                                                            • Instruction Fuzzy Hash: 045137714087499BD320AF10DC8ABABBBF8FBC5300F81885DF1D941295EB709529CB6A
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 006357E0
                                                                            • _wcslen.LIBCMT ref: 006357EC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper_wcslen
                                                                            • String ID: CALLARGARRAY
                                                                            • API String ID: 157775604-1150593374
                                                                            • Opcode ID: 0ceee66cce2fd341571d69b78b069b7883d02104a72d48143af48962d0412df3
                                                                            • Instruction ID: 66e479627eab2b79081ff0f00147160d5a04e44978ac7dbb22e878efc3eb1e6b
                                                                            • Opcode Fuzzy Hash: 0ceee66cce2fd341571d69b78b069b7883d02104a72d48143af48962d0412df3
                                                                            • Instruction Fuzzy Hash: F9417071A002199FCB14DFA9C8859FEBBB6FF99324F14406DE516A7391E7309D81CB90
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 0062D130
                                                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0062D13A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CrackInternet_wcslen
                                                                            • String ID: |
                                                                            • API String ID: 596671847-2343686810
                                                                            • Opcode ID: 50fb9b1c6456be438bf63ca06a06955d8f9125875f4ef1c74a0b9df06e43e04c
                                                                            • Instruction ID: 3eaa66cc6e1e3b0b71bc124e7d1e6ab4b575e8bb9aded6fccc9348991c0c4480
                                                                            • Opcode Fuzzy Hash: 50fb9b1c6456be438bf63ca06a06955d8f9125875f4ef1c74a0b9df06e43e04c
                                                                            • Instruction Fuzzy Hash: 11311B71D0021AABCF15EFA4DC89AEE7FBAFF44300F100019F815A62A1D735AA16CF50
                                                                            APIs
                                                                            • DestroyWindow.USER32(?,?,?,?), ref: 00643621
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0064365C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$DestroyMove
                                                                            • String ID: static
                                                                            • API String ID: 2139405536-2160076837
                                                                            • Opcode ID: 169cf527c2b6bd7753b34a501f0f7650574f339160f5625365200142f523f3b9
                                                                            • Instruction ID: 4d24583d850554effa32dcc1586ccbaa80c3ec6426ea64a25b4287d5eaa07754
                                                                            • Opcode Fuzzy Hash: 169cf527c2b6bd7753b34a501f0f7650574f339160f5625365200142f523f3b9
                                                                            • Instruction Fuzzy Hash: CF319C71100205AEDB149F68DC81EFB77AAFF89720F01961DF8A597380DA31AD91C764
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0064461F
                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00644634
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: '
                                                                            • API String ID: 3850602802-1997036262
                                                                            • Opcode ID: 6646708fb82dc53230245dca07f9c46a8f146bb391c813c86e06813fd8a31238
                                                                            • Instruction ID: bc6c965638e8e31443565fc9482b3d94f4305792d85d96253b67335a0e6a66ca
                                                                            • Opcode Fuzzy Hash: 6646708fb82dc53230245dca07f9c46a8f146bb391c813c86e06813fd8a31238
                                                                            • Instruction Fuzzy Hash: 87314C74A013099FDF14CFA9C992BDA7BB6FF49300F114169E904AB341DB70A941CF90
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0064327C
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00643287
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: Combobox
                                                                            • API String ID: 3850602802-2096851135
                                                                            • Opcode ID: 3a2610649912b3edd89aaf87ba9c86abc0df51996d603c9f590ea5fb9a1fdf6e
                                                                            • Instruction ID: 272032e7d66710d790f80e6cff1b173a2bf7a9a3913ad26219ad37204b7595ab
                                                                            • Opcode Fuzzy Hash: 3a2610649912b3edd89aaf87ba9c86abc0df51996d603c9f590ea5fb9a1fdf6e
                                                                            • Instruction Fuzzy Hash: 3B11D071300218BFEF219F54DC84EEB3B6BEB95364F104228F91897390D6B19E518760
                                                                            APIs
                                                                              • Part of subcall function 005B600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 005B604C
                                                                              • Part of subcall function 005B600E: GetStockObject.GDI32(00000011), ref: 005B6060
                                                                              • Part of subcall function 005B600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 005B606A
                                                                            • GetWindowRect.USER32(00000000,?), ref: 0064377A
                                                                            • GetSysColor.USER32(00000012), ref: 00643794
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                            • String ID: static
                                                                            • API String ID: 1983116058-2160076837
                                                                            • Opcode ID: b05442bbc3cf2d3098107c4f75618be4fb9f14040e9ba5616811f4e3d4b9eee3
                                                                            • Instruction ID: 321dbd64714df662fa80d09543115ce16d813de0f3412f15d4ddbff519f44dae
                                                                            • Opcode Fuzzy Hash: b05442bbc3cf2d3098107c4f75618be4fb9f14040e9ba5616811f4e3d4b9eee3
                                                                            • Instruction Fuzzy Hash: 8C1129B261021AAFDB00DFA8CC46AEA7BB9FB09314F015515F995E3250E735E8519B50
                                                                            APIs
                                                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0062CD7D
                                                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0062CDA6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$OpenOption
                                                                            • String ID: <local>
                                                                            • API String ID: 942729171-4266983199
                                                                            • Opcode ID: af2225fc807579f4ae0342c12af47a2e1f5f528cc34417eae4295302072b5187
                                                                            • Instruction ID: f4673c7100aa6a23737dcbcdebd88f48438fc505ee9be087cc5eec77b9499f15
                                                                            • Opcode Fuzzy Hash: af2225fc807579f4ae0342c12af47a2e1f5f528cc34417eae4295302072b5187
                                                                            • Instruction Fuzzy Hash: FD110675205E31BAD7344B669C44EEBBE6EEF127B4F004A26B10983180D3709845DEF0
                                                                            APIs
                                                                            • GetWindowTextLengthW.USER32(00000000), ref: 006434AB
                                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006434BA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: LengthMessageSendTextWindow
                                                                            • String ID: edit
                                                                            • API String ID: 2978978980-2167791130
                                                                            • Opcode ID: 35478233a6b0ea60c8807142ce5c406acc4d827489269603188c9549b76afc12
                                                                            • Instruction ID: ab6f99bdb83b601018aa9fa399ba81a33a9101c6663d16a426dc8b1ae3085d71
                                                                            • Opcode Fuzzy Hash: 35478233a6b0ea60c8807142ce5c406acc4d827489269603188c9549b76afc12
                                                                            • Instruction Fuzzy Hash: 6C11BC71200218AFEB129F64DC44AEB3BABEB15374F505324F960933E0C735EC519B60
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            • CharUpperBuffW.USER32(?,?,?), ref: 00616CB6
                                                                            • _wcslen.LIBCMT ref: 00616CC2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$BuffCharUpper
                                                                            • String ID: STOP
                                                                            • API String ID: 1256254125-2411985666
                                                                            • Opcode ID: 29df53954e7d370cf20f19eb97a8a6beaedd20e20327cde4daf927bd1a9af98e
                                                                            • Instruction ID: 5eeb7d71fd03f07b46e1a43ac09af51a42040b9abf1b32356119504a1b55dcb1
                                                                            • Opcode Fuzzy Hash: 29df53954e7d370cf20f19eb97a8a6beaedd20e20327cde4daf927bd1a9af98e
                                                                            • Instruction Fuzzy Hash: 2101C436A005278BCB209FBDDC859FF7BB6FEA17107540525F85296290EB31D980C690
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                              • Part of subcall function 00613CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00613CCA
                                                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00611D4C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 624084870-1403004172
                                                                            • Opcode ID: 2861d44ddeb98b8d4aab8b28ec280082531bfcf765a0137f8927dfe9a2644714
                                                                            • Instruction ID: 74e9e6ec4a44dad13e7a58a9ffb6ef423ea3bcc297986d3622c99077e243ee06
                                                                            • Opcode Fuzzy Hash: 2861d44ddeb98b8d4aab8b28ec280082531bfcf765a0137f8927dfe9a2644714
                                                                            • Instruction Fuzzy Hash: 42012831A01219ABCB04EBA0DC55CFE776AFF43350B180519F9235B3D1EA305948C660
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                              • Part of subcall function 00613CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00613CCA
                                                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00611C46
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 624084870-1403004172
                                                                            • Opcode ID: 1383d01339cd092505a6fbc1374d3127d79756627fc745e74114d7df0e679586
                                                                            • Instruction ID: 077010118efa40f053a133cdfe11afd02ec2c72117cc81e115efefcfa5897c52
                                                                            • Opcode Fuzzy Hash: 1383d01339cd092505a6fbc1374d3127d79756627fc745e74114d7df0e679586
                                                                            • Instruction Fuzzy Hash: E601DB7578110967CB04EB90CA55DFF7BAAAF52340F180019BA07773C1EA64AF48C6F1
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                              • Part of subcall function 00613CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00613CCA
                                                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00611CC8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 624084870-1403004172
                                                                            • Opcode ID: 415fcb06b877ef69772985a1a9f73e4bda0437c9c404e5324dc21518263d5cdc
                                                                            • Instruction ID: d829a69b37a1aa42bf964dc0f809099d0a8d9b6a4183bd0af63626a73e4310a0
                                                                            • Opcode Fuzzy Hash: 415fcb06b877ef69772985a1a9f73e4bda0437c9c404e5324dc21518263d5cdc
                                                                            • Instruction Fuzzy Hash: 9D01D67568111967CF04EBA0CA55AFF7BAAAB12340F180019BA0777381EA649F48C6F1
                                                                            APIs
                                                                            • __Init_thread_footer.LIBCMT ref: 005CA529
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Init_thread_footer_wcslen
                                                                            • String ID: ,%h$3y`
                                                                            • API String ID: 2551934079-3512788184
                                                                            • Opcode ID: a5a7a7d265fc67ad698f4cc874707ca92b3504a137c02f928d69c06786eb2d0c
                                                                            • Instruction ID: 70f92910dc8dd4d322b8d014c80e759601ef34bc8227ee6756d4254a800b062c
                                                                            • Opcode Fuzzy Hash: a5a7a7d265fc67ad698f4cc874707ca92b3504a137c02f928d69c06786eb2d0c
                                                                            • Instruction Fuzzy Hash: B401243164021A5BCA14F7E89C6EFAC3F15FB85724F404429F601172C2DE50AD018687
                                                                            APIs
                                                                              • Part of subcall function 005B9CB3: _wcslen.LIBCMT ref: 005B9CBD
                                                                              • Part of subcall function 00613CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00613CCA
                                                                            • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00611DD3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 624084870-1403004172
                                                                            • Opcode ID: b49137d7dc9ad0303ad7ad826ab0fb0fee3b7ab489ca1258795db659b516f457
                                                                            • Instruction ID: 9e88cd7f89a39db85e5044023eaa97f09c277ac454be5976b485ad0a46203a7b
                                                                            • Opcode Fuzzy Hash: b49137d7dc9ad0303ad7ad826ab0fb0fee3b7ab489ca1258795db659b516f457
                                                                            • Instruction Fuzzy Hash: 7EF02871F4122967CB04F7A4DC96FFF7B79BF42350F080919BA23673C1EA60690886A0
                                                                            APIs
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00683018,0068305C), ref: 006481BF
                                                                            • CloseHandle.KERNEL32 ref: 006481D1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateHandleProcess
                                                                            • String ID: \0h
                                                                            • API String ID: 3712363035-113824095
                                                                            • Opcode ID: e864954039b4b156fae205d37c6218704cf9a779fc7cc7e9100780ec1d8f46b9
                                                                            • Instruction ID: ff04a9490fb11675aa7f7ddcb07c9d47e73bb56a20d0ac3046d594b2eff3835a
                                                                            • Opcode Fuzzy Hash: e864954039b4b156fae205d37c6218704cf9a779fc7cc7e9100780ec1d8f46b9
                                                                            • Instruction Fuzzy Hash: 44F054B1640310BEE3206B65AC45FBB3E5EEB15B54F001421BB08D63A1D6759A0093B5
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen
                                                                            • String ID: 3, 3, 16, 1
                                                                            • API String ID: 176396367-3042988571
                                                                            • Opcode ID: b3a22d9c28d1216bd2595fc5befca24430fa2523fa7ac8f0cf3502807a27a9a1
                                                                            • Instruction ID: 53f95caf7273473d6d2a092151b50edfb7f9882e05ee2e5e9fce92b73a8423a8
                                                                            • Opcode Fuzzy Hash: b3a22d9c28d1216bd2595fc5befca24430fa2523fa7ac8f0cf3502807a27a9a1
                                                                            • Instruction Fuzzy Hash: F8E02B42604321219331137E9DC59BF5ACBDFC9760B10182BF985C2367EAA4AD9193E1
                                                                            APIs
                                                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00610B23
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Message
                                                                            • String ID: AutoIt$Error allocating memory.
                                                                            • API String ID: 2030045667-4017498283
                                                                            • Opcode ID: 0e248de7ee4fb9e5b0f34210485c6e5a27acfd5c400c33ab5f03a99544656256
                                                                            • Instruction ID: 90d2bb040df8bc02c7a9e325cd271ea12d77106cecdf1b5e54b30d1c6e2350b4
                                                                            • Opcode Fuzzy Hash: 0e248de7ee4fb9e5b0f34210485c6e5a27acfd5c400c33ab5f03a99544656256
                                                                            • Instruction Fuzzy Hash: AAE0D8312853193BD3543794BC07FC97F8ADF05B20F10442BF748556C38AE2649006E9
                                                                            APIs
                                                                              • Part of subcall function 005CF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,005D0D71,?,?,?,005B100A), ref: 005CF7CE
                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,005B100A), ref: 005D0D75
                                                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,005B100A), ref: 005D0D84
                                                                            Strings
                                                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 005D0D7F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                            • API String ID: 55579361-631824599
                                                                            • Opcode ID: 359853b7fd53009253932f2f090b3f2b2b6d80ff80a631ae8f6ac0fe57c3918f
                                                                            • Instruction ID: 2574d431abfd2c60d258d94ac9614af2ff4228b4c9b80150d4f13a0f1217d851
                                                                            • Opcode Fuzzy Hash: 359853b7fd53009253932f2f090b3f2b2b6d80ff80a631ae8f6ac0fe57c3918f
                                                                            • Instruction Fuzzy Hash: A6E039742003018BD770AFACE4087427FE6BB04745F00592FE482C6791EBF1E4448BA1
                                                                            APIs
                                                                            • __Init_thread_footer.LIBCMT ref: 005CE3D5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: Init_thread_footer
                                                                            • String ID: 0%h$8%h
                                                                            • API String ID: 1385522511-1704880105
                                                                            • Opcode ID: 25b0c994d3b83783633970b3d673b84d514570f89be65375552fe050dc3cdd44
                                                                            • Instruction ID: 4f34ff02444707b17c1429f5fb21a7b5e1705eea6d22d20f99c434525316f3b1
                                                                            • Opcode Fuzzy Hash: 25b0c994d3b83783633970b3d673b84d514570f89be65375552fe050dc3cdd44
                                                                            • Instruction Fuzzy Hash: 23E0DF314909929FC714ABDCB87EF883B92BB46B20B102A6AE002876D19B3438418746
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: LocalTime
                                                                            • String ID: %.3d$X64
                                                                            • API String ID: 481472006-1077770165
                                                                            • Opcode ID: 75547ceff73b3988d45d72e017cf4be90e2e567ea1e3e35d260565233262bc85
                                                                            • Instruction ID: 524703908bf88292f1f27508809cf27ab5c548d4d1979fc13f316a9f0adee5d8
                                                                            • Opcode Fuzzy Hash: 75547ceff73b3988d45d72e017cf4be90e2e567ea1e3e35d260565233262bc85
                                                                            • Instruction Fuzzy Hash: 93D01261849119FACB9496D0CC49DBBB77EFB18311F508566FA0AE1080E724C7096B61
                                                                            APIs
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0064236C
                                                                            • PostMessageW.USER32(00000000), ref: 00642373
                                                                              • Part of subcall function 0061E97B: Sleep.KERNEL32 ref: 0061E9F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: FindMessagePostSleepWindow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 529655941-2988720461
                                                                            • Opcode ID: 92aa39a3c6ba8c8c15e59512b47283a041a357aa7ca1986d528638cf47e2a753
                                                                            • Instruction ID: 9c0b2ee79b3b06821e80638ae00bc8797e7c3d792bf6e697d13d3d3cf4ec44fe
                                                                            • Opcode Fuzzy Hash: 92aa39a3c6ba8c8c15e59512b47283a041a357aa7ca1986d528638cf47e2a753
                                                                            • Instruction Fuzzy Hash: 60D0A936382300BAE2A8A330DC0FFCA66169B01B20F0189067706AA2D0C8A0A8008A08
                                                                            APIs
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0064232C
                                                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0064233F
                                                                              • Part of subcall function 0061E97B: Sleep.KERNEL32 ref: 0061E9F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: FindMessagePostSleepWindow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 529655941-2988720461
                                                                            • Opcode ID: 1cae224d03d8041a1d7ce64a0718a2c0237ac0334b48aabed30bbb476cd288ec
                                                                            • Instruction ID: c37493bb1b114339a34b60becbed5d5305cf6931e294939d9299af4c595502a4
                                                                            • Opcode Fuzzy Hash: 1cae224d03d8041a1d7ce64a0718a2c0237ac0334b48aabed30bbb476cd288ec
                                                                            • Instruction Fuzzy Hash: 4BD0223A381300B7E3E8B330DC0FFCA7A169B00B20F018906770AAA2D0C8F0A800CA04
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 005EBE93
                                                                            • GetLastError.KERNEL32 ref: 005EBEA1
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 005EBEFC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1689469986.00000000005B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005B0000, based on PE: true
                                                                            • Associated: 00000000.00000002.1688998480.00000000005B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.000000000064C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1689645070.0000000000672000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690031967.000000000067C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000684000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1690169863.0000000000692000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_5b0000_YU SV Payment.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1717984340-0
                                                                            • Opcode ID: c61094ece071a43aa236a8f5366a8e1342e0ae2d08e11a6f6dcefead2ae92b6b
                                                                            • Instruction ID: 2f9fd989e9fc429185242755bc0c3a7f58c678f2b816f39ce4e3dceef27fd740
                                                                            • Opcode Fuzzy Hash: c61094ece071a43aa236a8f5366a8e1342e0ae2d08e11a6f6dcefead2ae92b6b
                                                                            • Instruction Fuzzy Hash: 3841EB34601286AFEF298F66CC84ABB7FA9FF41321F144169F9E9572A1DB308D01DB50