Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment-Order #24560274 for 8,380 USD.exe

Overview

General Information

Sample name:Payment-Order #24560274 for 8,380 USD.exe
Analysis ID:1585875
MD5:f19ce6f6790292bbd9b8533d33b1a46f
SHA1:ce057013f389e0f2506f4cd495799d684b0be2a3
SHA256:67afda69254336cc140c2fe7474eb6b93c27ec134b07f91a604bee1c15c9135c
Tags:exeuser-adrian__luca
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • Payment-Order #24560274 for 8,380 USD.exe (PID: 5484 cmdline: "C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exe" MD5: F19CE6F6790292BBD9B8533D33B1A46F)
    • conhost.exe (PID: 6232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 6224 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • WerFault.exe (PID: 3200 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6224 -s 1508 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["212.23.222.198"], "Port": 7000, "Aes key": "<1234567829>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V3.1"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3636532690.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000003.00000002.3636532690.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6186:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6223:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6338:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x5ff6:$cnc4: POST / HTTP/1.1
    00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x80bca6:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x80bd43:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x80be58:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x80bb16:$cnc4: POST / HTTP/1.1
      00000000.00000002.1500296317.000002AAAF800000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        3.2.MSBuild.exe.400000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
          3.2.MSBuild.exe.400000.0.unpackrat_win_xworm_v3Finds XWorm (version XClient, v3) samples based on characteristic stringsSekoia.io
          • 0x516e:$str01: $VB$Local_Port
          • 0x515f:$str02: $VB$Local_Host
          • 0x5368:$str03: get_Jpeg
          • 0x4eb2:$str04: get_ServicePack
          • 0x5dc2:$str05: Select * from AntivirusProduct
          • 0x5ee4:$str06: PCRestart
          • 0x5ef8:$str07: shutdown.exe /f /r /t 0
          • 0x5f98:$str08: StopReport
          • 0x5f6e:$str09: StopDDos
          • 0x5fde:$str10: sendPlugin
          • 0x6020:$str11: OfflineKeylogger Not Enabled
          • 0x61a6:$str12: -ExecutionPolicy Bypass -File "
          • 0x62db:$str13: Content-length: 5235
          3.2.MSBuild.exe.400000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x6386:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x6423:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x6538:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x61f6:$cnc4: POST / HTTP/1.1
          0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.unpackrat_win_xworm_v3Finds XWorm (version XClient, v3) samples based on characteristic stringsSekoia.io
            • 0x336e:$str01: $VB$Local_Port
            • 0x335f:$str02: $VB$Local_Host
            • 0x3568:$str03: get_Jpeg
            • 0x30b2:$str04: get_ServicePack
            • 0x3fc2:$str05: Select * from AntivirusProduct
            • 0x40e4:$str06: PCRestart
            • 0x40f8:$str07: shutdown.exe /f /r /t 0
            • 0x4198:$str08: StopReport
            • 0x416e:$str09: StopDDos
            • 0x41de:$str10: sendPlugin
            • 0x4220:$str11: OfflineKeylogger Not Enabled
            • 0x43a6:$str12: -ExecutionPolicy Bypass -File "
            • 0x44db:$str13: Content-length: 5235
            Click to see the 16 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-08T12:32:09.836709+010028594591Malware Command and Control Activity Detected192.168.2.952880212.23.222.1987000TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000003.00000002.3640980221.0000000003211000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["212.23.222.198"], "Port": 7000, "Aes key": "<1234567829>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V3.1"}
            Source: Payment-Order #24560274 for 8,380 USD.exeVirustotal: Detection: 52%Perma Link
            Source: Payment-Order #24560274 for 8,380 USD.exeReversingLabs: Detection: 65%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmpString decryptor: 212.23.222.198
            Source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmpString decryptor: 7000
            Source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmpString decryptor: <1234567829>
            Source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmpString decryptor: <Xwormmm>
            Source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmpString decryptor: USB.exe
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: @To.pdb source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Xml.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb J0 source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.ni.pdbRSDS source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Configuration.pdbSystem.Xml.dllSystem.Core.ni.dll source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Configuration.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbd source: MSBuild.exe, 00000003.00000002.3639572299.0000000001338000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: ?ToC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Xml.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdbO source: MSBuild.exe, 00000003.00000002.3639572299.00000000013BF000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Core.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: %%.pdb source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: MSBuild.exe, 00000003.00000002.3642568255.0000000006405000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp, WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Management.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: MSBuild.exe, 00000003.00000002.3642568255.0000000006405000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Management.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: MSBuild.exe, 00000003.00000002.3639572299.00000000013BF000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: symbols\dll\mscorlib.pdbLb source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\MSBuild.pdbpdbild.pdb< source: MSBuild.exe, 00000003.00000002.3639572299.00000000013BF000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: HPHo0C:\Windows\mscorlib.pdb source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 4x nop then push rdi0_2_00007FF7A6624450
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 4x nop then push rdi0_2_00007FF7A6620200
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 4x nop then mov rax, rcx0_2_00007FF7A65B9FC0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 4x nop then push rbx0_2_00007FF7A65FCC30
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF7A65CF9C0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF7A6627A90
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 4x nop then push rbx0_2_00007FF7A65CFAA0

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2859460 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.9:49705 -> 212.23.222.198:7000
            Source: Network trafficSuricata IDS: 2859459 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.9:52880 -> 212.23.222.198:7000
            Source: Malware configuration extractorURLs: 212.23.222.198
            Source: global trafficTCP traffic: 192.168.2.9:49705 -> 212.23.222.198:7000
            Source: global trafficTCP traffic: 192.168.2.9:52736 -> 162.159.36.2:53
            Source: Joe Sandbox ViewASN Name: TMRDE TMRDE
            Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
            Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
            Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
            Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
            Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
            Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
            Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: unknownTCP traffic detected without corresponding DNS query: 212.23.222.198
            Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
            Source: MSBuild.exe, 00000003.00000002.3640980221.0000000003211000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
            Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

            System Summary

            barindex
            Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
            Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.raw.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000003.00000002.3636532690.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.1500296317.000002AAAF800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: initial sampleStatic PE information: Filename: Payment-Order #24560274 for 8,380 USD.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65688300_2_00007FF7A6568830
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65593400_2_00007FF7A6559340
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65661900_2_00007FF7A6566190
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A656D16A0_2_00007FF7A656D16A
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A656DFD00_2_00007FF7A656DFD0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6570C500_2_00007FF7A6570C50
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65527500_2_00007FF7A6552750
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A657C8000_2_00007FF7A657C800
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65667F00_2_00007FF7A65667F0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A657A7B00_2_00007FF7A657A7B0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A656A8500_2_00007FF7A656A850
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65A19100_2_00007FF7A65A1910
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65788D90_2_00007FF7A65788D9
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A655E8A00_2_00007FF7A655E8A0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A654A8B00_2_00007FF7A654A8B0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A657E5400_2_00007FF7A657E540
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65615200_2_00007FF7A6561520
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65666100_2_00007FF7A6566610
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65735C00_2_00007FF7A65735C0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65636400_2_00007FF7A6563640
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A656B6B00_2_00007FF7A656B6B0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65743900_2_00007FF7A6574390
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65603600_2_00007FF7A6560360
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65723700_2_00007FF7A6572370
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A657D3200_2_00007FF7A657D320
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65483C40_2_00007FF7A65483C4
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65F34800_2_00007FF7A65F3480
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65504700_2_00007FF7A6550470
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65714700_2_00007FF7A6571470
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A656A4200_2_00007FF7A656A420
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65494300_2_00007FF7A6549430
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A657B4F00_2_00007FF7A657B4F0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65644D00_2_00007FF7A65644D0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A657B1800_2_00007FF7A657B180
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65652000_2_00007FF7A6565200
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65812000_2_00007FF7A6581200
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65682000_2_00007FF7A6568200
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65791B00_2_00007FF7A65791B0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A657F2800_2_00007FF7A657F280
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A661E2400_2_00007FF7A661E240
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65482200_2_00007FF7A6548220
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65752E00_2_00007FF7A65752E0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65792CE0_2_00007FF7A65792CE
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6573F600_2_00007FF7A6573F60
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A655EFE00_2_00007FF7A655EFE0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A66100E00_2_00007FF7A66100E0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65580D00_2_00007FF7A65580D0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6562D300_2_00007FF7A6562D30
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A656FDD00_2_00007FF7A656FDD0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A657BEA00_2_00007FF7A657BEA0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A656FB400_2_00007FF7A656FB40
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6607BA00_2_00007FF7A6607BA0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A657BBA00_2_00007FF7A657BBA0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6577C790_2_00007FF7A6577C79
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6575C200_2_00007FF7A6575C20
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6564CD90_2_00007FF7A6564CD9
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A657F9600_2_00007FF7A657F960
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6551A000_2_00007FF7A6551A00
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65799C30_2_00007FF7A65799C3
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6584A400_2_00007FF7A6584A40
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6546A500_2_00007FF7A6546A50
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6556A500_2_00007FF7A6556A50
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6569A500_2_00007FF7A6569A50
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6602AC00_2_00007FF7A6602AC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_03155B503_2_03155B50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_031552803_2_03155280
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_03150B623_2_03150B62
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_03154F383_2_03154F38
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: String function: 00007FF7A654C1A0 appears 63 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6224 -s 1508
            Source: Payment-Order #24560274 for 8,380 USD.exeBinary or memory string: OriginalFilename vs Payment-Order #24560274 for 8,380 USD.exe
            Source: Payment-Order #24560274 for 8,380 USD.exe, 00000000.00000000.1495354896.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePaddedReferenceMetadataEnumResult.dlld" vs Payment-Order #24560274 for 8,380 USD.exe
            Source: Payment-Order #24560274 for 8,380 USD.exe, 00000000.00000002.1501110340.000002AAB1C00000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePaddedReferenceMetadataEnumResult.dlld" vs Payment-Order #24560274 for 8,380 USD.exe
            Source: Payment-Order #24560274 for 8,380 USD.exe, 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePaddedReferenceMetadataEnumResult.dlld" vs Payment-Order #24560274 for 8,380 USD.exe
            Source: Payment-Order #24560274 for 8,380 USD.exe, 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClientBZX.exe4 vs Payment-Order #24560274 for 8,380 USD.exe
            Source: Payment-Order #24560274 for 8,380 USD.exe, 00000000.00000002.1500296317.000002AAAF800000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePaddedReferenceMetadataEnumResult.dlld" vs Payment-Order #24560274 for 8,380 USD.exe
            Source: Payment-Order #24560274 for 8,380 USD.exe, 00000000.00000002.1500296317.000002AAAF800000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClientBZX.exe4 vs Payment-Order #24560274 for 8,380 USD.exe
            Source: Payment-Order #24560274 for 8,380 USD.exeBinary or memory string: OriginalFilenamePaddedReferenceMetadataEnumResult.dlld" vs Payment-Order #24560274 for 8,380 USD.exe
            Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
            Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000003.00000002.3636532690.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.1500296317.000002AAAF800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: MSBuild.exe, 00000003.00000002.3642568255.0000000006405000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb
            Source: MSBuild.exe, 00000003.00000002.3639572299.0000000001338000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbd
            Source: classification engineClassification label: mal100.troj.evad.winEXE@5/5@1/1
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6551830 LookupPrivilegeValueW,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLargePageMinimum,VirtualAlloc,GetCurrentProcess,VirtualAllocExNuma,0_2_00007FF7A6551830
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6232:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6224
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Ihzd02cPcnJ09l8B
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\39f9499f-7d5f-41cc-ac82-1e4080ab9ccfJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Payment-Order #24560274 for 8,380 USD.exeVirustotal: Detection: 52%
            Source: Payment-Order #24560274 for 8,380 USD.exeReversingLabs: Detection: 65%
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeFile read: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exe "C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exe"
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6224 -s 1508
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeSection loaded: icu.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic file information: File size 1461760 > 1048576
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: @To.pdb source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Xml.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb J0 source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.ni.pdbRSDS source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Configuration.pdbSystem.Xml.dllSystem.Core.ni.dll source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Configuration.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdbd source: MSBuild.exe, 00000003.00000002.3639572299.0000000001338000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: ?ToC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Xml.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdbO source: MSBuild.exe, 00000003.00000002.3639572299.00000000013BF000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Core.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: %%.pdb source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: MSBuild.exe, 00000003.00000002.3642568255.0000000006405000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp, WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Management.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: MSBuild.exe, 00000003.00000002.3642568255.0000000006405000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Management.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: MSBuild.exe, 00000003.00000002.3639572299.00000000013BF000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: symbols\dll\mscorlib.pdbLb source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\MSBuild.pdbpdbild.pdb< source: MSBuild.exe, 00000003.00000002.3639572299.00000000013BF000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.ni.pdb source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER2C7D.tmp.dmp.10.dr
            Source: Binary string: HPHo0C:\Windows\mscorlib.pdb source: MSBuild.exe, 00000003.00000002.3642118203.000000000579B000.00000004.00000010.00020000.00000000.sdmp
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Helper.SB(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, Messages.cs.Net Code: Memory
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: section name: .managed
            Source: Payment-Order #24560274 for 8,380 USD.exeStatic PE information: section name: hydrated
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeMemory allocated: 2AAAB670000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 3210000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 8791Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 1052Jump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-29279
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1792Thread sleep count: 42 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1792Thread sleep time: -38738162554790034s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 2036Thread sleep count: 8791 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 2036Thread sleep count: 1052 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A6551460 GetSystemInfo,GetNumaHighestNodeNumber,GetCurrentProcess,GetProcessGroupAffinity,GetLastError,GetCurrentProcess,GetProcessAffinityMask,0_2_00007FF7A6551460
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: Amcache.hve.10.drBinary or memory string: VMware
            Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: MSBuild.exe, 00000003.00000002.3639572299.0000000001338000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: Amcache.hve.10.drBinary or memory string: vmci.sys
            Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.10.drBinary or memory string: VMware20,1
            Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.10.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
            Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65AB64C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7A65AB64C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 40A000Jump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 40C000Jump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: CB1008Jump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"Jump to behavior
            Source: MSBuild.exe, 00000003.00000002.3640980221.000000000342F000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3640980221.000000000363B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3640980221.00000000032F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q'PING!<Xwormmm>Program Manager<Xwormmm>0
            Source: MSBuild.exe, 00000003.00000002.3640980221.000000000342F000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3640980221.000000000363B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3640980221.00000000032F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q'PING!<Xwormmm>Program Manager<Xwormmm>0Te
            Source: MSBuild.exe, 00000003.00000002.3640980221.000000000342F000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3640980221.000000000363B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3640980221.00000000032F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: MSBuild.exe, 00000003.00000002.3640980221.000000000342F000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3640980221.000000000363B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3640980221.00000000032F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
            Source: MSBuild.exe, 00000003.00000002.3640980221.000000000342F000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3640980221.000000000363B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3640980221.00000000032F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert-
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: GetLocaleInfoEx,0_2_00007FF7A65D8FB0
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: GetLocaleInfoEx,0_2_00007FF7A65D9080
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exeCode function: 0_2_00007FF7A65AB27C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7A65AB27C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: MSBuild.exe, 00000003.00000002.3639572299.00000000013BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: nder\MsMpeng.exe
            Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
            Source: MSBuild.exe, 00000003.00000002.3639572299.00000000013BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r\MsMpeng.exe
            Source: MSBuild.exe, 00000003.00000002.3639572299.0000000001338000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3639572299.00000000013BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.3636532690.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1500296317.000002AAAF800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Payment-Order #24560274 for 8,380 USD.exe PID: 5484, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6224, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aab3601920.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf980f68.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Payment-Order #24560274 for 8,380 USD.exe.2aaaf994d10.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.3636532690.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1500296317.000002AAAF800000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Payment-Order #24560274 for 8,380 USD.exe PID: 5484, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6224, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Disable or Modify Tools
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            12
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts312
            Process Injection
            31
            Virtualization/Sandbox Evasion
            LSASS Memory21
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Access Token Manipulation
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook312
            Process Injection
            NTDS31
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture12
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials25
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Payment-Order #24560274 for 8,380 USD.exe53%VirustotalBrowse
            Payment-Order #24560274 for 8,380 USD.exe66%ReversingLabsWin64.Trojan.XWorm
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            212.23.222.1980%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            bg.microsoft.map.fastly.net
            199.232.214.172
            truefalse
              high
              s-part-0017.t-0009.t-msedge.net
              13.107.246.45
              truefalse
                high
                fp2e7a.wpc.phicdn.net
                192.229.221.95
                truefalse
                  high
                  241.42.69.40.in-addr.arpa
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    212.23.222.198true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://upx.sf.netAmcache.hve.10.drfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMSBuild.exe, 00000003.00000002.3640980221.0000000003211000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        212.23.222.198
                        unknownunknown
                        12329TMRDEtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1585875
                        Start date and time:2025-01-08 12:29:18 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 7m 55s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:12
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Payment-Order #24560274 for 8,380 USD.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@5/5@1/1
                        EGA Information:
                        • Successful, ratio: 50%
                        HCA Information:
                        • Successful, ratio: 52%
                        • Number of executed functions: 81
                        • Number of non-executed functions: 88
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 4.245.163.56, 199.232.214.172, 192.229.221.95, 13.85.23.206, 20.242.39.171, 40.69.42.241, 172.202.163.200, 4.175.87.197, 40.126.31.73, 40.126.31.69, 20.190.159.2, 40.126.31.67, 40.126.31.71, 20.190.159.4, 20.190.159.64, 20.190.159.75, 52.168.117.173, 13.107.246.45
                        • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                        • Execution Graph export aborted for target MSBuild.exe, PID 6224 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtSetInformationFile calls found.
                        TimeTypeDescription
                        06:30:33API Interceptor5440732x Sleep call for process: MSBuild.exe modified
                        06:34:03API Interceptor1x Sleep call for process: WerFault.exe modified
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        s-part-0017.t-0009.t-msedge.nethttps://www.dollartip.info/unsubscribe/?d=mdlandrec.netGet hashmaliciousUnknownBrowse
                        • 13.107.246.45
                        PO#3311-20250108003.xlsGet hashmaliciousUnknownBrowse
                        • 13.107.246.45
                        Subscription_Renewal_Invoice_2025_HKVXTC.htmlGet hashmaliciousHTMLPhisherBrowse
                        • 13.107.246.45
                        PO#3311-20250108003.xlsGet hashmaliciousUnknownBrowse
                        • 13.107.246.45
                        Swift-TT680169 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                        • 13.107.246.45
                        7ccf88c0bbe3b29bf19d877c4596a8d4.zipGet hashmaliciousUnknownBrowse
                        • 13.107.246.45
                        0a0#U00a0.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                        • 13.107.246.45
                        https://sUNg.ethamoskag.ru/0cUrcw3/#Msburkholder@heartland-derm.comGet hashmaliciousUnknownBrowse
                        • 13.107.246.45
                        Sburkholder.pdfGet hashmaliciousUnknownBrowse
                        • 13.107.246.45
                        audio.mp3_JasonhTranscript.htmlGet hashmaliciousUnknownBrowse
                        • 13.107.246.45
                        fp2e7a.wpc.phicdn.netinvoice-1623385214.pdf.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                        • 192.229.221.95
                        PO#3311-20250108003.xlsGet hashmaliciousUnknownBrowse
                        • 192.229.221.95
                        invoice-1623385214 pdf.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                        • 192.229.221.95
                        0a0#U00a0.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                        • 192.229.221.95
                        3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeGet hashmaliciousAsyncRAT, GhostRatBrowse
                        • 192.229.221.95
                        xmr.exeGet hashmaliciousUnknownBrowse
                        • 192.229.221.95
                        sasdriver_2.0.20.119.exe_MDE_File_Sample_dc3db78edf1ce84f101e976a9966edb4cf6dcd75.zipGet hashmaliciousUnknownBrowse
                        • 192.229.221.95
                        PO_62401394_MITech_20250601.exeGet hashmaliciousFormBookBrowse
                        • 192.229.221.95
                        startuppp.batGet hashmaliciousUnknownBrowse
                        • 192.229.221.95
                        amiri.EXEGet hashmaliciousUnknownBrowse
                        • 192.229.221.95
                        bg.microsoft.map.fastly.netinvoice-1623385214.pdf.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                        • 199.232.214.172
                        PO#3311-20250108003.xlsGet hashmaliciousUnknownBrowse
                        • 199.232.210.172
                        PO#3311-20250108003.xlsGet hashmaliciousUnknownBrowse
                        • 199.232.214.172
                        e-SPT Masa PPh.exeGet hashmaliciousBlackMoonBrowse
                        • 199.232.210.172
                        e-SPT Masa PPh.exeGet hashmaliciousBlackMoonBrowse
                        • 199.232.210.172
                        0a0#U00a0.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                        • 199.232.214.172
                        I6la3suRdt.exeGet hashmaliciousAsyncRATBrowse
                        • 199.232.214.172
                        c2.htaGet hashmaliciousRemcosBrowse
                        • 199.232.210.172
                        Sburkholder.pdfGet hashmaliciousUnknownBrowse
                        • 199.232.214.172
                        U02LaPwnkd.exeGet hashmaliciousValleyRATBrowse
                        • 199.232.210.172
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        TMRDEHilix.mips.elfGet hashmaliciousMiraiBrowse
                        • 185.245.176.190
                        la.bot.arm.elfGet hashmaliciousUnknownBrowse
                        • 62.221.244.56
                        Summaryform_FXnbLLyKOJ.wsfGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                        • 212.23.222.200
                        Summaryform_TgQFBSAqdC.zipGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                        • 212.23.222.200
                        2C8CDA2CCC942B4EDA8E1EE37A8F68C557FEE80E14244.exeGet hashmaliciousQuasarBrowse
                        • 212.23.222.42
                        Hilix.mips.elfGet hashmaliciousMiraiBrowse
                        • 185.245.176.189
                        BiU282bjyR.exeGet hashmaliciousRemcosBrowse
                        • 212.23.211.238
                        https://ipfs.io/ipfs/QmdTwDBzfv7vcTnw34YZhB4VroSotz2NY5Hc5FzzQX8qxQ#rramis@isciii.esGet hashmaliciousHTMLPhisherBrowse
                        • 212.23.144.169
                        wx7x7YkSI8.elfGet hashmaliciousUnknownBrowse
                        • 185.249.170.212
                        2DLd2J82an.elfGet hashmaliciousMiraiBrowse
                        • 212.23.154.151
                        No context
                        No context
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):1.1705584023715618
                        Encrypted:false
                        SSDEEP:192:w43cOxPp0BU/KaaTHy8wdEmzuiFcOZ24IO8G:XfxyBU/Ka2SrdzuiFcOY4IO8G
                        MD5:A1594814D31B7A853370B1085698E843
                        SHA1:7879C62C83CFDFC26DF60DE6CFA8B8E54B3EF137
                        SHA-256:7044460E6F452CAB095136A7B202371C77CF3DE4C82B7F57BA715C30FD610717
                        SHA-512:6954E7CA347050D6C3101113540507B8F8B9E007532D2DC9CDF6EC67AC23DA92688C2C68D922F8CB31996EF9C4395D13D105E97570540B5B9B35DB86B56A348E
                        Malicious:false
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.8.0.9.6.2.4.0.6.1.5.2.2.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.8.0.9.6.2.4.6.3.9.6.6.0.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.d.b.d.e.f.1.e.-.0.3.c.e.-.4.1.a.2.-.8.0.2.a.-.6.3.f.f.e.2.5.0.d.5.4.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.b.3.f.0.a.9.f.-.b.a.b.3.-.4.9.b.c.-.a.6.e.2.-.2.d.b.b.2.0.d.d.a.6.6.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.s.b.u.i.l.d...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.M.S.B.u.i.l.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.5.0.-.0.0.0.1.-.0.0.1.4.-.b.3.a.5.-.d.7.b.8.c.0.6.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.e.6.2.5.6.a.0.1.5.9.6.8.8.f.0.5.6.0.b.0.1.5.d.a.4.d.9.6.7.f.4.1.c.b.f.8.c.9.b.d.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 15 streams, Wed Jan 8 11:33:44 2025, 0x1205a4 type
                        Category:dropped
                        Size (bytes):279399
                        Entropy (8bit):3.784624608667258
                        Encrypted:false
                        SSDEEP:3072:bZV8W2fPhAfZc4uEqXyHJLTgNSkX4iWNkBA:bZ0fcZc4uy1Tg4U4i/
                        MD5:B15413B030358E948FB838C4A3459F20
                        SHA1:8402CD4B362F90389723D2E03210EDC350284EFE
                        SHA-256:1558EC19FE2FEF797286077B26F7ADAECAEBD07AECC6521D1F4070D2C05C8AC0
                        SHA-512:6797DDF7CB31E475334800EC540207EC747FDAE92ECECBD845CAD8074B75C3E21285C449171CF2D9C878F55DE6F07CFB76CD8C14777A92DFB5DD4706784AEC4B
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... ........b~g............t...........H...........$....%......$"...W..........`.......8...........T............<..W............%...........'..............................................................................eJ......x(......GenuineIntel............T.......P....a~g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):6386
                        Entropy (8bit):3.7181036902243743
                        Encrypted:false
                        SSDEEP:96:RSIU6o7wVetbj56876YZhQE/11Y5aM4UR89bA50sf/iOGm:R6l7wVeJj56876YZh4prR89bW0sf/Sm
                        MD5:90B724FAF2CECBF9CDE02CC40A36D9D7
                        SHA1:CFA5CDB21C0F73352F2F474F1D3AB9CC87CE3A41
                        SHA-256:BB43316B5102F143E18EB346A913C67AAADE7487A94BAEA5CED69E786E429AC2
                        SHA-512:62F355EC0C7345D8DC4FCFAC51D4FD3C29ECDEC30D547846247ED461E1F607B35EB97B6BC688A8612494448B881C4F4B390BD442403B779F51B5DA605A93BA4F
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.2.4.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4733
                        Entropy (8bit):4.45829516650132
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zslJg77aI9V6WpW8VYmYm8M4JXWFC6+q8vNYE/mLNd:uIjf/I7X77VSJ96Kx/mLNd
                        MD5:00F96B83617F0986D31EEA6350C7EA6F
                        SHA1:FD862A8A70D7DA02B34C901549B819726CFDB910
                        SHA-256:90CD988C8F754DB0A53AF788BF6C8A5EA4F957120C762670FFFE30B4786C182A
                        SHA-512:4896F033656719EF464CE43BA7D4FF56F462F2E0B22CE73AA529EE082C623DD7FC8DE632B50180241C3C88EE48EF1C808DBE7B6CD5745E3108880C9D6570641C
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="666876" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.39469109565379
                        Encrypted:false
                        SSDEEP:6144:hl4fiJoH0ncNXiUjt10qfG/gaocYGBoaUMMhA2NX4WABlBuNACOBSqa:X4vFfMYQUMM6VFYSCU
                        MD5:339C0F1C1CA73EB614372B742F020424
                        SHA1:B813D0C40DD8DB25E3628E1FBB0908155DA11562
                        SHA-256:66EED41F1B8373DADA4CDA06EE2B8C725140D25500995FBFC64BE3C021EDC9E1
                        SHA-512:3887082EE56215B38C4142F077C8E24790E5C28C6CDA7EB4DAEEDF3DD3CA4CDAFB52D7BFEEED9A31A38FF08AFCD1A799C408002E3869F9311036323FB593B630
                        Malicious:false
                        Reputation:low
                        Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..i,.a................................................................................................................................................................................................................................................................................................................................................~.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                        Entropy (8bit):6.882537072603037
                        TrID:
                        • Win64 Executable GUI (202006/5) 77.37%
                        • InstallShield setup (43055/19) 16.49%
                        • Win64 Executable (generic) (12005/4) 4.60%
                        • Generic Win/DOS Executable (2004/3) 0.77%
                        • DOS Executable Generic (2002/1) 0.77%
                        File name:Payment-Order #24560274 for 8,380 USD.exe
                        File size:1'461'760 bytes
                        MD5:f19ce6f6790292bbd9b8533d33b1a46f
                        SHA1:ce057013f389e0f2506f4cd495799d684b0be2a3
                        SHA256:67afda69254336cc140c2fe7474eb6b93c27ec134b07f91a604bee1c15c9135c
                        SHA512:f940a1551c54babc86e47722729f2bc55c7e28c61b39c69e1a7566efde04905a21ee0d8f24dcdf5f4b76599570d612987ff73c896967456d1ab21baf37bec721
                        SSDEEP:24576:PAonTAWtaG9kwX2t684Bnndby1UuFLan9k5TRM7phylfihgdElUIVjDyh:PAodtaG9kS2U84B+FLan9k5TRM9zlPVj
                        TLSH:A565BE19E3A811FCD527C674CB55A233E6B174560B21A4CB0B99C7452FB3EE26B7B302
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E......E...E...E...D...E...D...E...D/..E..BE...EJ..D...E...E...E...D...E...D...E...E...E...DD..EI..D...EI..D...E...............
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x14006ac2c
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x66E5ADB8 [Sat Sep 14 15:37:28 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:22a65106d3d84ea74d966fa0424a5a0c
                        Instruction
                        dec eax
                        sub esp, 28h
                        call 00007F1118E8B83Ch
                        dec eax
                        add esp, 28h
                        jmp 00007F1118E8B067h
                        int3
                        int3
                        jmp 00007F1118E8BBB8h
                        int3
                        int3
                        int3
                        dec eax
                        sub esp, 28h
                        call 00007F1118E8BBB4h
                        jmp 00007F1118E8B1F4h
                        xor eax, eax
                        dec eax
                        add esp, 28h
                        ret
                        int3
                        int3
                        jmp 00007F1118E8B1DCh
                        int3
                        int3
                        int3
                        dec eax
                        sub esp, 28h
                        dec ebp
                        mov eax, dword ptr [ecx+38h]
                        dec eax
                        mov ecx, edx
                        dec ecx
                        mov edx, ecx
                        call 00007F1118E8B202h
                        mov eax, 00000001h
                        dec eax
                        add esp, 28h
                        ret
                        int3
                        int3
                        int3
                        inc eax
                        push ebx
                        inc ebp
                        mov ebx, dword ptr [eax]
                        dec eax
                        mov ebx, edx
                        inc ecx
                        and ebx, FFFFFFF8h
                        dec esp
                        mov ecx, ecx
                        inc ecx
                        test byte ptr [eax], 00000004h
                        dec esp
                        mov edx, ecx
                        je 00007F1118E8B205h
                        inc ecx
                        mov eax, dword ptr [eax+08h]
                        dec ebp
                        arpl word ptr [eax+04h], dx
                        neg eax
                        dec esp
                        add edx, ecx
                        dec eax
                        arpl ax, cx
                        dec esp
                        and edx, ecx
                        dec ecx
                        arpl bx, ax
                        dec edx
                        mov edx, dword ptr [eax+edx]
                        dec eax
                        mov eax, dword ptr [ebx+10h]
                        mov ecx, dword ptr [eax+08h]
                        dec eax
                        mov eax, dword ptr [ebx+08h]
                        test byte ptr [ecx+eax+03h], 0000000Fh
                        je 00007F1118E8B1FDh
                        movzx eax, byte ptr [ecx+eax+03h]
                        and eax, FFFFFFF0h
                        dec esp
                        add ecx, eax
                        dec esp
                        xor ecx, edx
                        dec ecx
                        mov ecx, ecx
                        pop ebx
                        jmp 00007F1118E8B206h
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        nop word ptr [eax+eax+00000000h]
                        dec eax
                        cmp ecx, dword ptr [00000049h]
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x17f3c00x5c.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x17f41c0xf0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x19c0000x812c.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x18f0000xcdec.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a50000x5b8.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x165ae00x54.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x165d000x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1659a00x140.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x11a0000x6a0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x6f1880x6f20016824105689e93571b28f6d652acf3f1False0.45466728768278963data6.6338226603175485IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .managed0x710000x77a280x77c00459fe8e4d0429964edfb07e39e66b232False0.46850331093423797data6.473781869755907IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        hydrated0xe90000x304980x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rdata0x11a0000x66c6a0x66e0019d69919d9ea837ef6351baa0211b72dFalse0.4881032616950182data6.702703489018048IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x1810000xd5a80x18009d5075bd44b367f703d8e922b003398aFalse0.2294921875data3.190641782829915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x18f0000xcdec0xce00638451eb673a6cdf25f666b19f1b8bb4False0.49419751213592233data6.064103613023274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x19c0000x812c0x82003691b0aede7b180237704710c2d65dbbFalse0.97109375data7.953193437636764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x1a50000x5b80x600adcf9b9e4d3994d1018ad464f4f1db74False0.5826822916666666data5.215191968056739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        BINARY0x19c1300x7a84data1.000510139012881
                        RT_VERSION0x1a3bb40x38cPGP symmetric key encrypted data - Plaintext or unencrypted data0.3579295154185022
                        RT_MANIFEST0x1a3f400x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                        DLLImport
                        ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegSetValueExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegEnumValueW
                        bcrypt.dllBCryptCloseAlgorithmProvider, BCryptGenerateSymmetricKey, BCryptDestroyKey, BCryptOpenAlgorithmProvider, BCryptGenRandom
                        KERNEL32.dllTlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, EncodePointer, GetConsoleWindow, FreeConsole, AllocConsole, SetLastError, GetLastError, LocalFree, CloseHandle, ExitProcess, GetTickCount64, FormatMessageW, K32EnumProcessModulesEx, IsWow64Process, GetExitCodeProcess, OpenProcess, K32EnumProcesses, K32GetModuleInformation, K32GetModuleBaseNameW, K32GetModuleFileNameExW, GetProcessId, DuplicateHandle, GetCurrentProcess, CloseThreadpoolIo, GetCurrentProcessId, MultiByteToWideChar, GetStdHandle, RaiseFailFastException, GetCalendarInfoEx, CompareStringOrdinal, CompareStringEx, FindNLSStringEx, GetLocaleInfoEx, ResolveLocaleName, FindStringOrdinal, GetCurrentThread, Sleep, DeleteCriticalSection, EnterCriticalSection, SleepConditionVariableCS, LeaveCriticalSection, WakeConditionVariable, QueryPerformanceCounter, InitializeCriticalSection, InitializeConditionVariable, WaitForMultipleObjectsEx, QueryPerformanceFrequency, GetFullPathNameW, GetLongPathNameW, WideCharToMultiByte, LocalAlloc, GetConsoleOutputCP, GetProcAddress, LocaleNameToLCID, LCMapStringEx, EnumTimeFormatsEx, EnumCalendarInfoExEx, CreateFileW, CreateThreadpoolIo, StartThreadpoolIo, CancelThreadpoolIo, DeleteFileW, DeviceIoControl, ExpandEnvironmentStringsW, FindClose, FindFirstFileExW, FlushFileBuffers, FreeLibrary, GetFileAttributesExW, GetFileInformationByHandleEx, GetFileType, GetModuleFileNameW, GetOverlappedResult, LoadLibraryExW, ReadFile, SetFileInformationByHandle, SetThreadErrorMode, GetThreadPriority, SetThreadPriority, WriteFile, GetCurrentProcessorNumberEx, SetEvent, CreateEventExW, GetEnvironmentVariableW, FlushProcessWriteBuffers, WaitForSingleObjectEx, RtlVirtualUnwind, RtlCaptureContext, RtlRestoreContext, AddVectoredExceptionHandler, FlsAlloc, FlsGetValue, FlsSetValue, CreateEventW, TerminateProcess, SwitchToThread, CreateThread, GetCurrentThreadId, SuspendThread, ResumeThread, GetThreadContext, SetThreadContext, FlushInstructionCache, VirtualAlloc, VirtualProtect, VirtualFree, QueryInformationJobObject, GetModuleHandleW, GetModuleHandleExW, GetProcessAffinityMask, InitializeContext, GetEnabledXStateFeatures, SetXStateFeaturesMask, InitializeCriticalSectionEx, VirtualQuery, GetSystemTimeAsFileTime, ResetEvent, DebugBreak, WaitForSingleObject, SleepEx, GlobalMemoryStatusEx, GetSystemInfo, GetLogicalProcessorInformation, GetLogicalProcessorInformationEx, GetLargePageMinimum, VirtualUnlock, VirtualAllocExNuma, IsProcessInJob, GetNumaHighestNodeNumber, GetProcessGroupAffinity, K32GetProcessMemoryInfo, RaiseException, RtlPcToFileHeader, RtlUnwindEx, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, RtlLookupFunctionEntry, InitializeSListHead
                        ole32.dllCoGetApartmentType, CoTaskMemAlloc, CoUninitialize, CoInitializeEx, CoTaskMemFree, CoWaitForMultipleHandles
                        api-ms-win-crt-heap-l1-1-0.dllmalloc, free, _callnewh, calloc, _set_new_mode
                        api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                        api-ms-win-crt-string-l1-1-0.dllstrcmp, _stricmp, strcpy_s, strncpy_s, wcsncmp
                        api-ms-win-crt-convert-l1-1-0.dllstrtoull
                        api-ms-win-crt-runtime-l1-1-0.dll__p___wargv, _cexit, exit, terminate, _crt_atexit, _register_onexit_function, _initialize_onexit_table, __p___argc, _exit, abort, _initterm_e, _c_exit, _register_thread_local_exe_atexit_callback, _seh_filter_exe, _set_app_type, _initterm, _configure_wide_argv, _initialize_wide_environment, _get_initial_wide_environment
                        api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsprintf_s, __stdio_common_vfprintf, __p__commode, _set_fmode, __stdio_common_vsscanf, __acrt_iob_func
                        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2025-01-08T12:30:44.571447+01002859460ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.949705212.23.222.1987000TCP
                        2025-01-08T12:32:09.836709+01002859459ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.952880212.23.222.1987000TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 8, 2025 12:30:24.959216118 CET49676443192.168.2.923.206.229.209
                        Jan 8, 2025 12:30:24.959697962 CET49675443192.168.2.923.206.229.209
                        Jan 8, 2025 12:30:25.224812031 CET49674443192.168.2.923.206.229.209
                        Jan 8, 2025 12:30:26.568576097 CET49677443192.168.2.920.189.173.11
                        Jan 8, 2025 12:30:33.879668951 CET497057000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:30:33.884488106 CET700049705212.23.222.198192.168.2.9
                        Jan 8, 2025 12:30:33.884726048 CET497057000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:30:34.001555920 CET497057000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:30:34.007337093 CET700049705212.23.222.198192.168.2.9
                        Jan 8, 2025 12:30:34.568581104 CET49676443192.168.2.923.206.229.209
                        Jan 8, 2025 12:30:34.568586111 CET49675443192.168.2.923.206.229.209
                        Jan 8, 2025 12:30:34.834148884 CET49674443192.168.2.923.206.229.209
                        Jan 8, 2025 12:30:36.470118046 CET4434970423.206.229.209192.168.2.9
                        Jan 8, 2025 12:30:36.470308065 CET49704443192.168.2.923.206.229.209
                        Jan 8, 2025 12:30:44.571446896 CET497057000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:30:44.576209068 CET700049705212.23.222.198192.168.2.9
                        Jan 8, 2025 12:30:55.162787914 CET497057000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:30:55.167644024 CET700049705212.23.222.198192.168.2.9
                        Jan 8, 2025 12:30:55.251075983 CET700049705212.23.222.198192.168.2.9
                        Jan 8, 2025 12:30:55.251151085 CET497057000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:30:55.928132057 CET497057000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:30:55.928993940 CET497127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:30:55.932950974 CET700049705212.23.222.198192.168.2.9
                        Jan 8, 2025 12:30:55.933800936 CET700049712212.23.222.198192.168.2.9
                        Jan 8, 2025 12:30:55.933898926 CET497127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:30:55.957762957 CET497127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:30:55.962589979 CET700049712212.23.222.198192.168.2.9
                        Jan 8, 2025 12:30:59.983284950 CET5273653192.168.2.9162.159.36.2
                        Jan 8, 2025 12:30:59.988101959 CET5352736162.159.36.2192.168.2.9
                        Jan 8, 2025 12:30:59.988188028 CET5273653192.168.2.9162.159.36.2
                        Jan 8, 2025 12:30:59.988259077 CET5273653192.168.2.9162.159.36.2
                        Jan 8, 2025 12:30:59.993037939 CET5352736162.159.36.2192.168.2.9
                        Jan 8, 2025 12:31:00.450556993 CET5352736162.159.36.2192.168.2.9
                        Jan 8, 2025 12:31:00.490413904 CET5273653192.168.2.9162.159.36.2
                        Jan 8, 2025 12:31:00.738907099 CET5273653192.168.2.9162.159.36.2
                        Jan 8, 2025 12:31:00.743887901 CET5352736162.159.36.2192.168.2.9
                        Jan 8, 2025 12:31:00.743949890 CET5273653192.168.2.9162.159.36.2
                        Jan 8, 2025 12:31:06.193911076 CET497127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:06.198697090 CET700049712212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:16.444004059 CET497127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:16.448872089 CET700049712212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:17.318567991 CET700049712212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:17.318706989 CET497127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:18.802973032 CET497127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:18.803575993 CET527417000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:18.807804108 CET700049712212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:18.808418989 CET700052741212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:18.808507919 CET527417000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:18.832483053 CET527417000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:18.837272882 CET700052741212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:31.240783930 CET527417000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:31.245831013 CET700052741212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:40.175231934 CET700052741212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:40.175306082 CET527417000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:42.878282070 CET527417000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:42.880913019 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:42.883155107 CET700052741212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:42.885740042 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:42.885817051 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:42.917424917 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:42.922298908 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:43.209418058 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:43.214243889 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:43.357990026 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:43.362837076 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:44.543999910 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:44.548844099 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:48.498982906 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:48.503760099 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:49.180511951 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:49.185298920 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:49.405648947 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:49.410550117 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:51.359107971 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:51.363893032 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:51.539068937 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:51.543872118 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:52.969865084 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:52.974695921 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:54.212892056 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:54.217814922 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:54.258889914 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:54.263696909 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:55.667860985 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:55.672738075 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:57.208657980 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:57.213484049 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:58.310005903 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:58.314917088 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:58.428193092 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:58.433062077 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:31:59.667752028 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:31:59.672586918 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:00.760358095 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:00.765157938 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:00.841804981 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:00.846858978 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:02.071743965 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:02.076657057 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:02.160181999 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:02.164995909 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:03.282905102 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:03.287693024 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:03.515319109 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:03.520159960 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:03.713530064 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:03.718374968 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:04.253998041 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:04.256294012 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:04.741403103 CET527437000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:04.742286921 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:04.746159077 CET700052743212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:04.747122049 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:04.747195005 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:04.888700962 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:04.893589020 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:07.753523111 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:07.758337975 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:08.405492067 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:08.410250902 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:09.796969891 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:09.801911116 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:09.836709023 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:09.841517925 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:10.032489061 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:10.037271023 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:10.062860966 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:10.067693949 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:10.129153967 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:10.133965015 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:11.582779884 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:11.587583065 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:11.751552105 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:11.756412029 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:11.860374928 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:11.865168095 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:12.442210913 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:12.446954966 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:12.810456991 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:12.815274000 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:13.440227985 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:13.557701111 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:14.007711887 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:14.012846947 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:14.012898922 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:14.018121958 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:14.421849966 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:14.429228067 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:14.606235981 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:14.611109018 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:16.004561901 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:16.009371042 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:16.070910931 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:16.075795889 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:16.594610929 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:16.599499941 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:17.849533081 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:17.854418993 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:18.401660919 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:18.409389019 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:18.651658058 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:18.656497002 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:19.235100985 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:19.240000010 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:19.354571104 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:19.359566927 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:19.411915064 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:19.416781902 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:19.449594975 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:19.454520941 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:19.547051907 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:19.551933050 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:19.728564024 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:19.733465910 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:19.920231104 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:19.925136089 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:20.117825985 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:20.122685909 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:20.230923891 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:20.235809088 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:20.362448931 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:20.367301941 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:20.859937906 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:20.864767075 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:21.552659988 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:21.557432890 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:21.639878988 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:21.644607067 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:21.707216978 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:21.712229013 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:22.060162067 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:22.064938068 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:24.223192930 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:24.227969885 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:24.715359926 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:24.720171928 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:25.426917076 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:25.431688070 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:25.869055033 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:25.873876095 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:26.071788073 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:26.076584101 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:26.096945047 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:26.101763010 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:26.143121004 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:26.143197060 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:31.084211111 CET528807000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:31.085441113 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:31.089199066 CET700052880212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:31.090318918 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:31.090394020 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:31.129831076 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:31.134685040 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:33.985735893 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:33.990634918 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:34.042970896 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:34.047909021 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:34.293309927 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:34.298201084 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:34.531900883 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:34.536861897 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:34.553698063 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:34.558615923 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:34.604895115 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:34.609755039 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:37.098406076 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:37.103318930 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:37.418936968 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:37.425367117 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:38.810987949 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:38.815881014 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:38.850056887 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:38.854990959 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:38.895117998 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:38.901652098 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:39.367816925 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:39.372708082 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:39.393095970 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:39.398014069 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:39.424001932 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:39.429502964 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:40.796758890 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:40.801641941 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:40.820280075 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:40.825074911 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:40.891112089 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:40.896008968 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:41.263784885 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:41.268631935 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:41.284539938 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:41.289458990 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:41.437890053 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:41.442862034 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:41.452894926 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:41.457808018 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:42.811904907 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:42.816833973 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:44.783029079 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:44.919584036 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:45.050352097 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:45.055140972 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:45.248585939 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:45.253508091 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:45.320318937 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:45.325306892 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:45.337245941 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:45.342123032 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:45.344367981 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:45.349283934 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:47.592202902 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:47.597059965 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:49.870326996 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:49.875191927 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:50.835916996 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:50.840775013 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:50.985805988 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:50.990618944 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:51.003515005 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:51.008327007 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:51.385952950 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:51.391201019 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:51.428287029 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:51.433202028 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:51.527560949 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:51.532427073 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:51.569217920 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:51.574141979 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:51.661050081 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:51.745073080 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:51.745160103 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:51.750053883 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:52.473458052 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:52.474240065 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:52.849857092 CET530097000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:52.852407932 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:52.854744911 CET700053009212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:52.857330084 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:52.857388973 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:52.889440060 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:52.894325972 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:53.036459923 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:53.041361094 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:53.073162079 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:53.078119993 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:53.318250895 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:53.323045969 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:53.381333113 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:53.386231899 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:53.600028038 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:53.604938984 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:54.956156969 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:54.961245060 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:54.979676962 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:54.984510899 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:56.224930048 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:56.230424881 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:56.409625053 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:56.417555094 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:58.734594107 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:58.739562988 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:58.757685900 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:58.762605906 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:32:58.898269892 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:32:58.903242111 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:00.022721052 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:00.027537107 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:02.423515081 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:02.428507090 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:04.386661053 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:04.391638041 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:04.653678894 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:04.658549070 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:04.832221031 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:04.837368965 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:05.093055964 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:05.097946882 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:05.140332937 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:05.145153046 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:08.369867086 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:08.374675035 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:09.801034927 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:09.805845022 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:09.877912998 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:09.882827044 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:10.251703024 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:10.256515980 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:10.418582916 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:10.423391104 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:11.350688934 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:11.355463982 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:11.649324894 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:11.654169083 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:13.158427954 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:13.163197994 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:14.221990108 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:14.222055912 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:14.896702051 CET530107000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:14.899189949 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:14.901474953 CET700053010212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:14.904001951 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:14.904068947 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:14.935858011 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:14.940665007 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:15.172894955 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:15.177712917 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:15.406878948 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:15.411794901 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:15.798011065 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:15.802870035 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:16.280585051 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:16.285419941 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:16.318700075 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:16.323523998 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:16.947268963 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:16.952140093 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:16.953229904 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:16.959573030 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:17.036242008 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:17.042947054 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:17.159869909 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:17.166131973 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:17.288821936 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:17.295919895 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:19.018933058 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:19.023760080 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:19.075922966 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:19.080739021 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:20.889806032 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:20.894793987 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:20.961569071 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:20.966413975 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:21.121625900 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:21.126491070 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:21.277781010 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:21.282612085 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:21.283644915 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:21.288414955 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:21.300178051 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:21.304997921 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:21.333503008 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:21.338376999 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:21.351181984 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:21.355945110 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:21.357913971 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:21.362711906 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:21.722867966 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:21.727796078 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:23.154604912 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:23.159373045 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:23.218204021 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:23.223009109 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:23.298943996 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:23.303782940 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:23.351573944 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:23.356467009 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:23.366347075 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:23.371191978 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:23.735888958 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:23.740758896 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:25.091726065 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:25.096662998 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:25.299597979 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:25.304441929 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:25.746618032 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:25.751497030 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:26.883829117 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:26.888637066 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:26.996654987 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:27.001868963 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:27.188920021 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:27.193718910 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:27.282322884 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:27.287195921 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:27.764529943 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:27.769341946 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:28.227647066 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:28.232474089 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:28.555671930 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:28.560530901 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:29.241297007 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:29.246201992 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:29.247114897 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:29.251962900 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:29.264545918 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:29.269366980 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:29.280740976 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:29.285598040 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:30.178138018 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:30.183018923 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:30.944922924 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:30.949753046 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:30.965280056 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:30.970119953 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:31.058121920 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:31.063033104 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:31.222270012 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:31.227144957 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:31.282844067 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:31.287724972 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:31.338730097 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:31.343653917 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:31.346652031 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:31.351572037 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:32.355923891 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:32.360754967 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:32.932374001 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:32.937285900 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:33.098788977 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:33.103652954 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:33.415397882 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:33.420288086 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:34.998748064 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:35.003592968 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:35.346869946 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:35.401034117 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:36.258517981 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:36.258644104 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:36.304301977 CET530117000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:36.304301977 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:36.309175968 CET700053011212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:36.309191942 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:36.309381962 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:36.413444996 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:36.418344975 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:36.595645905 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:36.601170063 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:37.685658932 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:37.690453053 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:37.804780006 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:37.809559107 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:38.917931080 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:38.922820091 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:39.072731018 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:39.077645063 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:39.804286003 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:39.809231043 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:39.825320959 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:39.832947969 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:39.854420900 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:39.859255075 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:40.509623051 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:40.514507055 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:41.712008953 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:41.716877937 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:41.719518900 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:41.724284887 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:41.851339102 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:41.856154919 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:41.885891914 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:41.890774965 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:42.918999910 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:42.923835993 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:42.923892021 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:42.928664923 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:42.958309889 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:42.963123083 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:43.052707911 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:43.057495117 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:43.168068886 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:43.172980070 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:43.173463106 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:43.178272963 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:43.242898941 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:43.247652054 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:43.326445103 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:43.331165075 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:43.687506914 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:43.692382097 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:43.726304054 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:33:43.731372118 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:57.681674004 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:33:57.681781054 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:34:04.128559113 CET530127000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:34:04.133330107 CET530247000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:34:04.133410931 CET700053012212.23.222.198192.168.2.9
                        Jan 8, 2025 12:34:04.138225079 CET700053024212.23.222.198192.168.2.9
                        Jan 8, 2025 12:34:04.138299942 CET530247000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:34:04.259932995 CET530247000192.168.2.9212.23.222.198
                        Jan 8, 2025 12:34:04.264843941 CET700053024212.23.222.198192.168.2.9
                        Jan 8, 2025 12:34:04.965662003 CET530247000192.168.2.9212.23.222.198
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 8, 2025 12:30:59.982758999 CET5350900162.159.36.2192.168.2.9
                        Jan 8, 2025 12:31:00.749682903 CET5681953192.168.2.91.1.1.1
                        Jan 8, 2025 12:31:00.756900072 CET53568191.1.1.1192.168.2.9
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Jan 8, 2025 12:31:00.749682903 CET192.168.2.91.1.1.10x6fe7Standard query (0)241.42.69.40.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Jan 8, 2025 12:30:45.656524897 CET1.1.1.1192.168.2.90x79f1No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                        Jan 8, 2025 12:30:45.656524897 CET1.1.1.1192.168.2.90x79f1No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                        Jan 8, 2025 12:30:46.147207975 CET1.1.1.1192.168.2.90xca30No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                        Jan 8, 2025 12:30:46.147207975 CET1.1.1.1192.168.2.90xca30No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                        Jan 8, 2025 12:30:58.983460903 CET1.1.1.1192.168.2.90x776cNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                        Jan 8, 2025 12:30:58.983460903 CET1.1.1.1192.168.2.90x776cNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                        Jan 8, 2025 12:31:00.756900072 CET1.1.1.1192.168.2.90x6fe7Name error (3)241.42.69.40.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                        Jan 8, 2025 12:31:42.084014893 CET1.1.1.1192.168.2.90x68fbNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                        Jan 8, 2025 12:31:42.084014893 CET1.1.1.1192.168.2.90x68fbNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:06:30:29
                        Start date:08/01/2025
                        Path:C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\Payment-Order #24560274 for 8,380 USD.exe"
                        Imagebase:0x7ff7a6540000
                        File size:1'461'760 bytes
                        MD5 hash:F19CE6F6790292BBD9B8533D33B1A46F
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1501110340.000002AAB2DFC000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1500296317.000002AAAF800000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1500296317.000002AAAF800000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:06:30:29
                        Start date:08/01/2025
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff70f010000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:06:30:30
                        Start date:08/01/2025
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                        Imagebase:0xbb0000
                        File size:262'432 bytes
                        MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.3636532690.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000002.3636532690.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                        Reputation:high
                        Has exited:true

                        Target ID:10
                        Start time:06:33:43
                        Start date:08/01/2025
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6224 -s 1508
                        Imagebase:0xf50000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:5.5%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:24.4%
                          Total number of Nodes:998
                          Total number of Limit Nodes:47
                          execution_graph 30303 7ff7a65faa80 80 API calls 30305 7ff7a655a280 ResetEvent 30280 7ff7a6553580 24 API calls _swprintf_c_l 30281 7ff7a656498e 10 API calls 30215 7ff7a65d7f90 13 API calls 30216 7ff7a6605390 65 API calls 29765 7ff7a654bb90 29766 7ff7a654bba8 29765->29766 29767 7ff7a654bbaf 29765->29767 29775 7ff7a6542d70 29766->29775 29781 7ff7a6545260 9 API calls 29767->29781 29770 7ff7a654bbcc 29782 7ff7a6550750 SetEvent 29770->29782 29772 7ff7a654bbdc 29783 7ff7a6550310 GetCurrentThreadId malloc RtlPcToFileHeader RaiseException _swprintf_c_l 29772->29783 29774 7ff7a654bbe6 29776 7ff7a6542d9d 29775->29776 29780 7ff7a6542dbb 29776->29780 29784 7ff7a654b4e0 FlsGetValue 29776->29784 29778 7ff7a6542db3 29779 7ff7a6544930 6 API calls 29778->29779 29779->29780 29780->29767 29781->29770 29782->29772 29783->29774 29785 7ff7a654b508 FlsSetValue 29784->29785 29786 7ff7a654b4fa RaiseFailFastException 29784->29786 29786->29785 30219 7ff7a6574390 14 API calls 2 library calls 29796 7ff7a6541758 79 API calls 29832 7ff7a65fa660 29833 7ff7a65fa66d 29832->29833 29839 7ff7a65fa67b 29833->29839 29841 7ff7a65cfe10 79 API calls 29833->29841 30220 7ff7a65fab60 81 API calls 30310 7ff7a655d8d0 59 API calls 30283 7ff7a6559d60 34 API calls 30311 7ff7a654b260 malloc RtlPcToFileHeader RaiseException ISource _swprintf_c_l 29959 7ff7a656d16a 120 API calls _swprintf_c_l 30221 7ff7a6601b70 82 API calls 30222 7ff7a6562770 25 API calls 30286 7ff7a65fad40 81 API calls 29029 7ff7a6608650 29032 7ff7a65c4410 29029->29032 29031 7ff7a6608674 29033 7ff7a65c4421 29032->29033 29034 7ff7a65c4430 29032->29034 29033->29031 29037 7ff7a6542080 29034->29037 29036 7ff7a65c443e 29036->29031 29038 7ff7a6542089 29037->29038 29041 7ff7a65420d5 29037->29041 29039 7ff7a65420c8 29038->29039 29047 7ff7a654c700 29038->29047 29039->29036 29042 7ff7a654218c 29041->29042 29052 7ff7a6542540 29041->29052 29042->29036 29048 7ff7a654c746 29047->29048 29049 7ff7a654c786 29048->29049 29058 7ff7a65574ab 29048->29058 29066 7ff7a655759b 29048->29066 29049->29041 29053 7ff7a65425fb 29052->29053 29210 7ff7a65f3e60 26 API calls 29053->29210 29059 7ff7a65574ec 29058->29059 29060 7ff7a6557516 29058->29060 29062 7ff7a65574f5 DebugBreak 29059->29062 29065 7ff7a65574fa 29059->29065 29086 7ff7a655d150 29060->29086 29062->29065 29065->29049 29067 7ff7a65575bc 29066->29067 29068 7ff7a65575ce 29067->29068 29207 7ff7a6563910 39 API calls 29067->29207 29070 7ff7a6557625 29068->29070 29071 7ff7a65576a7 29068->29071 29073 7ff7a65575fe GetTickCount64 29068->29073 29072 7ff7a6557637 29070->29072 29208 7ff7a6563910 39 API calls 29070->29208 29074 7ff7a655d810 3 API calls 29071->29074 29079 7ff7a6557570 29071->29079 29076 7ff7a6582520 14 API calls 29072->29076 29073->29070 29077 7ff7a6557612 29073->29077 29078 7ff7a65576e3 29074->29078 29083 7ff7a6557649 29076->29083 29077->29071 29078->29079 29080 7ff7a65574fa 29078->29080 29081 7ff7a6557709 29078->29081 29206 7ff7a65825f0 WaitForSingleObject 29079->29206 29080->29049 29081->29080 29209 7ff7a655a000 SleepEx SwitchToThread DebugBreak ISource 29081->29209 29083->29071 29083->29079 29084 7ff7a6557683 GetTickCount64 29083->29084 29084->29071 29084->29077 29089 7ff7a655d182 29086->29089 29091 7ff7a655d2c2 29089->29091 29096 7ff7a6557539 29089->29096 29099 7ff7a655de60 29089->29099 29110 7ff7a65825f0 WaitForSingleObject 29089->29110 29111 7ff7a656adc0 SleepEx SwitchToThread SwitchToThread 29089->29111 29112 7ff7a6563910 39 API calls 29089->29112 29091->29089 29092 7ff7a6576690 GetTickCount64 29091->29092 29113 7ff7a6563910 39 API calls 29091->29113 29114 7ff7a6582520 29091->29114 29124 7ff7a655d810 29091->29124 29092->29091 29096->29065 29098 7ff7a655a000 SleepEx SwitchToThread DebugBreak ISource 29096->29098 29098->29065 29100 7ff7a655de9c 29099->29100 29103 7ff7a655df48 29099->29103 29101 7ff7a655df5a 29100->29101 29102 7ff7a655df09 29100->29102 29101->29103 29131 7ff7a6557060 WaitForSingleObject 29101->29131 29105 7ff7a655df18 SwitchToThread 29102->29105 29109 7ff7a655df50 29103->29109 29132 7ff7a6580720 29103->29132 29107 7ff7a655df26 29105->29107 29107->29103 29130 7ff7a656adc0 SleepEx SwitchToThread SwitchToThread 29107->29130 29109->29089 29110->29089 29111->29089 29112->29089 29113->29091 29115 7ff7a65825da 29114->29115 29116 7ff7a6582540 29114->29116 29115->29091 29194 7ff7a6550e30 29116->29194 29119 7ff7a65825ca 29119->29091 29121 7ff7a658259e 29122 7ff7a65825b1 29121->29122 29202 7ff7a656adc0 SleepEx SwitchToThread SwitchToThread 29121->29202 29122->29091 29125 7ff7a655d847 29124->29125 29126 7ff7a655d8ab 29124->29126 29125->29126 29204 7ff7a6551690 SleepEx 29125->29204 29126->29091 29128 7ff7a655d885 29128->29126 29205 7ff7a656adc0 SleepEx SwitchToThread SwitchToThread 29128->29205 29130->29103 29131->29107 29137 7ff7a655adf0 29132->29137 29135 7ff7a6580758 29136 7ff7a658081c 29135->29136 29148 7ff7a655b250 29135->29148 29136->29103 29138 7ff7a655ae39 29137->29138 29146 7ff7a655af10 29138->29146 29161 7ff7a6580570 SwitchToThread SwitchToThread SwitchToThread SwitchToThread 29138->29161 29141 7ff7a655b122 29142 7ff7a655b1e9 29141->29142 29143 7ff7a655b1a0 29141->29143 29164 7ff7a655b750 VirtualAlloc VirtualUnlock DebugBreak _swprintf_c_l 29142->29164 29163 7ff7a65629c0 6 API calls _swprintf_c_l 29143->29163 29146->29135 29147 7ff7a655af49 _swprintf_c_l 29147->29141 29162 7ff7a6573410 VirtualAlloc VirtualUnlock _swprintf_c_l 29147->29162 29152 7ff7a655b2d8 29148->29152 29149 7ff7a655b46d 29149->29135 29150 7ff7a655b2dd 29150->29149 29151 7ff7a655b405 29150->29151 29173 7ff7a6580570 SwitchToThread SwitchToThread SwitchToThread SwitchToThread 29150->29173 29155 7ff7a655b477 29151->29155 29156 7ff7a655b432 29151->29156 29152->29149 29152->29150 29165 7ff7a656f900 29152->29165 29176 7ff7a655b750 VirtualAlloc VirtualUnlock DebugBreak _swprintf_c_l 29155->29176 29175 7ff7a65629c0 6 API calls _swprintf_c_l 29156->29175 29157 7ff7a655b3da 29157->29151 29174 7ff7a6573410 VirtualAlloc VirtualUnlock _swprintf_c_l 29157->29174 29161->29147 29162->29141 29163->29146 29164->29146 29167 7ff7a656f916 29165->29167 29166 7ff7a656f947 29166->29150 29167->29166 29168 7ff7a656f9b0 29167->29168 29188 7ff7a6550130 29167->29188 29177 7ff7a6582320 29168->29177 29172 7ff7a6550130 4 API calls 29172->29166 29173->29157 29174->29151 29175->29149 29176->29149 29178 7ff7a6582359 EnterCriticalSection 29177->29178 29179 7ff7a65823e5 29177->29179 29180 7ff7a6582379 LeaveCriticalSection 29178->29180 29181 7ff7a656f9d9 29179->29181 29182 7ff7a65516e0 VirtualAlloc GetCurrentProcess VirtualAllocExNuma 29179->29182 29180->29179 29181->29166 29181->29172 29184 7ff7a6582413 29182->29184 29184->29181 29185 7ff7a6582424 EnterCriticalSection 29184->29185 29186 7ff7a658244a LeaveCriticalSection 29185->29186 29187 7ff7a6582443 29185->29187 29186->29181 29187->29186 29189 7ff7a65501dc 29188->29189 29191 7ff7a655016b 29188->29191 29189->29168 29190 7ff7a65501f0 _swprintf_c_l malloc RtlPcToFileHeader RaiseException 29190->29189 29191->29189 29192 7ff7a654fe50 GetCurrentThreadId malloc RtlPcToFileHeader RaiseException 29191->29192 29193 7ff7a65501a4 29191->29193 29192->29193 29193->29189 29193->29190 29195 7ff7a6550e67 GetCurrentProcess 29194->29195 29196 7ff7a6550f1f GlobalMemoryStatusEx 29194->29196 29197 7ff7a6550e80 29195->29197 29199 7ff7a6550e88 29196->29199 29197->29196 29197->29199 29203 7ff7a65aacf0 8 API calls 2 library calls 29199->29203 29200 7ff7a6550ff8 29200->29119 29201 7ff7a6557060 WaitForSingleObject 29200->29201 29201->29121 29202->29122 29203->29200 29204->29128 29205->29126 29206->29079 29207->29068 29208->29072 29209->29080 29211 7ff7a6544740 29241 7ff7a654b820 FlsAlloc 29211->29241 29213 7ff7a65448e4 29214 7ff7a654474f 29214->29213 29254 7ff7a654b6c0 GetModuleHandleExW 29214->29254 29216 7ff7a6544778 29255 7ff7a6545ad0 29216->29255 29218 7ff7a6544780 29218->29213 29263 7ff7a654cb30 29218->29263 29222 7ff7a65447e7 29225 7ff7a6544822 29222->29225 29226 7ff7a654ced0 8 API calls 29222->29226 29223 7ff7a65447b1 29223->29213 29223->29222 29293 7ff7a654ced0 29223->29293 29227 7ff7a6544879 29225->29227 29272 7ff7a6550030 29225->29272 29226->29225 29280 7ff7a654c3c0 29227->29280 29230 7ff7a654487e 29230->29213 29296 7ff7a6550470 GetEnabledXStateFeatures GetEnabledXStateFeatures 29230->29296 29232 7ff7a6544896 29233 7ff7a65448aa 29232->29233 29234 7ff7a65448c3 29232->29234 29297 7ff7a654b980 GetStdHandle WriteFile 29233->29297 29298 7ff7a654c8a0 29234->29298 29237 7ff7a65448b6 RaiseFailFastException 29237->29234 29242 7ff7a654b96e 29241->29242 29243 7ff7a654b840 29241->29243 29242->29214 29300 7ff7a6552750 29243->29300 29248 7ff7a654ced0 8 API calls 29249 7ff7a654b872 29248->29249 29250 7ff7a654b89d GetCurrentProcess GetProcessAffinityMask 29249->29250 29251 7ff7a654b894 29249->29251 29253 7ff7a654b908 29249->29253 29250->29251 29252 7ff7a654b8e4 QueryInformationJobObject 29251->29252 29252->29253 29253->29214 29254->29216 29475 7ff7a65aac48 29255->29475 29259 7ff7a6545b24 29259->29218 29260 7ff7a6545af2 29260->29259 29261 7ff7a654c8a0 InitializeCriticalSectionEx 29260->29261 29262 7ff7a6545b1d 29261->29262 29262->29218 29264 7ff7a654c8a0 InitializeCriticalSectionEx 29263->29264 29265 7ff7a65447a1 29264->29265 29265->29213 29266 7ff7a65440a0 29265->29266 29267 7ff7a65aac48 _swprintf_c_l 3 API calls 29266->29267 29268 7ff7a65440be 29267->29268 29269 7ff7a654415a 29268->29269 29490 7ff7a6542e10 4 API calls 2 library calls 29268->29490 29269->29223 29271 7ff7a65440f0 ISource 29271->29223 29273 7ff7a655005b 29272->29273 29274 7ff7a6550106 29272->29274 29275 7ff7a65aac48 _swprintf_c_l 3 API calls 29273->29275 29274->29227 29276 7ff7a655007a 29275->29276 29277 7ff7a654c8a0 InitializeCriticalSectionEx 29276->29277 29278 7ff7a65500a5 29277->29278 29279 7ff7a65500ee GetSystemTimeAsFileTime 29278->29279 29279->29274 29281 7ff7a654c40c 29280->29281 29283 7ff7a654c406 29280->29283 29282 7ff7a654ced0 8 API calls 29281->29282 29282->29283 29491 7ff7a654c830 29283->29491 29286 7ff7a654c483 29286->29230 29287 7ff7a654c45f 29287->29286 29514 7ff7a6545720 29287->29514 29289 7ff7a654c468 29289->29286 29521 7ff7a654daf0 29289->29521 29290 7ff7a654c478 29290->29230 29704 7ff7a654d0e0 8 API calls 29293->29704 29295 7ff7a654cef8 29295->29222 29296->29232 29297->29237 29299 7ff7a65aa952 InitializeCriticalSectionEx 29298->29299 29446 7ff7a654c0d0 29300->29446 29302 7ff7a655276e 29303 7ff7a654c0d0 8 API calls 29302->29303 29304 7ff7a655279b 29303->29304 29305 7ff7a654c0d0 8 API calls 29304->29305 29306 7ff7a65527c3 29305->29306 29307 7ff7a654c0d0 8 API calls 29306->29307 29308 7ff7a65527eb 29307->29308 29309 7ff7a654c0d0 8 API calls 29308->29309 29310 7ff7a6552818 29309->29310 29311 7ff7a654c0d0 8 API calls 29310->29311 29312 7ff7a6552840 29311->29312 29313 7ff7a654c0d0 8 API calls 29312->29313 29314 7ff7a655286d 29313->29314 29315 7ff7a654c0d0 8 API calls 29314->29315 29316 7ff7a6552895 29315->29316 29317 7ff7a654c0d0 8 API calls 29316->29317 29318 7ff7a65528bd 29317->29318 29319 7ff7a654c0d0 8 API calls 29318->29319 29320 7ff7a65528e5 29319->29320 29321 7ff7a654c0d0 8 API calls 29320->29321 29322 7ff7a6552912 29321->29322 29323 7ff7a654c0d0 8 API calls 29322->29323 29324 7ff7a655293f 29323->29324 29451 7ff7a654c1a0 29324->29451 29327 7ff7a654c1a0 18 API calls 29328 7ff7a6552990 29327->29328 29329 7ff7a654c1a0 18 API calls 29328->29329 29330 7ff7a65529b9 29329->29330 29331 7ff7a654c1a0 18 API calls 29330->29331 29332 7ff7a65529e2 29331->29332 29333 7ff7a654c1a0 18 API calls 29332->29333 29334 7ff7a6552a0b 29333->29334 29335 7ff7a654c1a0 18 API calls 29334->29335 29336 7ff7a6552a39 29335->29336 29337 7ff7a654c1a0 18 API calls 29336->29337 29338 7ff7a6552a67 29337->29338 29339 7ff7a654c1a0 18 API calls 29338->29339 29340 7ff7a6552a90 29339->29340 29341 7ff7a654c1a0 18 API calls 29340->29341 29342 7ff7a6552ab9 29341->29342 29343 7ff7a654c1a0 18 API calls 29342->29343 29344 7ff7a6552ae2 29343->29344 29345 7ff7a654c1a0 18 API calls 29344->29345 29346 7ff7a6552b0b 29345->29346 29347 7ff7a654c1a0 18 API calls 29346->29347 29348 7ff7a6552b34 29347->29348 29349 7ff7a654c1a0 18 API calls 29348->29349 29350 7ff7a6552b5d 29349->29350 29351 7ff7a654c1a0 18 API calls 29350->29351 29352 7ff7a6552b8b 29351->29352 29353 7ff7a654c1a0 18 API calls 29352->29353 29354 7ff7a6552bb9 29353->29354 29355 7ff7a654c1a0 18 API calls 29354->29355 29356 7ff7a6552be2 29355->29356 29357 7ff7a654c1a0 18 API calls 29356->29357 29358 7ff7a6552c0b 29357->29358 29359 7ff7a654c1a0 18 API calls 29358->29359 29360 7ff7a6552c34 29359->29360 29361 7ff7a654c1a0 18 API calls 29360->29361 29362 7ff7a6552c5d 29361->29362 29363 7ff7a654c1a0 18 API calls 29362->29363 29364 7ff7a6552c8b 29363->29364 29365 7ff7a654c1a0 18 API calls 29364->29365 29366 7ff7a6552cb9 29365->29366 29367 7ff7a654c1a0 18 API calls 29366->29367 29368 7ff7a6552ce2 29367->29368 29369 7ff7a654c1a0 18 API calls 29368->29369 29370 7ff7a6552d0b 29369->29370 29371 7ff7a654c1a0 18 API calls 29370->29371 29372 7ff7a6552d34 29371->29372 29373 7ff7a654c1a0 18 API calls 29372->29373 29374 7ff7a6552d5d 29373->29374 29375 7ff7a654c1a0 18 API calls 29374->29375 29376 7ff7a6552d86 29375->29376 29377 7ff7a654c1a0 18 API calls 29376->29377 29378 7ff7a6552daf 29377->29378 29379 7ff7a654c1a0 18 API calls 29378->29379 29380 7ff7a6552dd8 29379->29380 29381 7ff7a654c1a0 18 API calls 29380->29381 29382 7ff7a6552e01 29381->29382 29383 7ff7a654c1a0 18 API calls 29382->29383 29384 7ff7a6552e2a 29383->29384 29385 7ff7a654c1a0 18 API calls 29384->29385 29386 7ff7a6552e53 29385->29386 29387 7ff7a654c1a0 18 API calls 29386->29387 29388 7ff7a6552e7c 29387->29388 29389 7ff7a654c1a0 18 API calls 29388->29389 29390 7ff7a6552ea5 29389->29390 29391 7ff7a654c1a0 18 API calls 29390->29391 29392 7ff7a6552ece 29391->29392 29393 7ff7a654c1a0 18 API calls 29392->29393 29394 7ff7a6552ef7 29393->29394 29395 7ff7a654c1a0 18 API calls 29394->29395 29396 7ff7a6552f20 29395->29396 29397 7ff7a654c1a0 18 API calls 29396->29397 29398 7ff7a6552f49 29397->29398 29399 7ff7a654c1a0 18 API calls 29398->29399 29400 7ff7a6552f72 29399->29400 29401 7ff7a654c1a0 18 API calls 29400->29401 29402 7ff7a6552f9b 29401->29402 29403 7ff7a654c1a0 18 API calls 29402->29403 29404 7ff7a6552fc4 29403->29404 29405 7ff7a654c1a0 18 API calls 29404->29405 29406 7ff7a6552fed 29405->29406 29407 7ff7a654c1a0 18 API calls 29406->29407 29408 7ff7a6553016 29407->29408 29409 7ff7a654c1a0 18 API calls 29408->29409 29410 7ff7a655303f 29409->29410 29411 7ff7a654c1a0 18 API calls 29410->29411 29412 7ff7a6553068 29411->29412 29413 7ff7a654c1a0 18 API calls 29412->29413 29414 7ff7a6553096 29413->29414 29415 7ff7a654c1a0 18 API calls 29414->29415 29416 7ff7a65530c4 29415->29416 29417 7ff7a654c1a0 18 API calls 29416->29417 29418 7ff7a65530f2 29417->29418 29419 7ff7a654c1a0 18 API calls 29418->29419 29420 7ff7a6553120 29419->29420 29421 7ff7a654c1a0 18 API calls 29420->29421 29422 7ff7a655314e 29421->29422 29423 7ff7a654c1a0 18 API calls 29422->29423 29424 7ff7a655317c 29423->29424 29425 7ff7a654c1a0 18 API calls 29424->29425 29426 7ff7a65531a5 29425->29426 29427 7ff7a654c1a0 18 API calls 29426->29427 29428 7ff7a65531d3 29427->29428 29429 7ff7a654c1a0 18 API calls 29428->29429 29430 7ff7a65531fc 29429->29430 29431 7ff7a654c1a0 18 API calls 29430->29431 29432 7ff7a6553225 29431->29432 29433 7ff7a654c1a0 18 API calls 29432->29433 29434 7ff7a654b845 29433->29434 29435 7ff7a6551460 GetSystemInfo 29434->29435 29436 7ff7a65514a4 29435->29436 29437 7ff7a65514ce GetCurrentProcess GetProcessGroupAffinity 29436->29437 29438 7ff7a65514a8 GetNumaHighestNodeNumber 29436->29438 29440 7ff7a65514f9 GetLastError 29437->29440 29441 7ff7a6551504 29437->29441 29438->29437 29439 7ff7a65514b7 29438->29439 29439->29437 29440->29441 29442 7ff7a6551526 29441->29442 29474 7ff7a6551240 GetLogicalProcessorInformationEx GetLastError GetLogicalProcessorInformationEx ISource 29441->29474 29444 7ff7a6551590 GetCurrentProcess GetProcessAffinityMask 29442->29444 29445 7ff7a654b84a 29442->29445 29444->29445 29445->29242 29445->29248 29447 7ff7a654c0f4 29446->29447 29448 7ff7a654c0f8 29447->29448 29449 7ff7a654ced0 8 API calls 29447->29449 29448->29302 29450 7ff7a654c124 29449->29450 29450->29302 29452 7ff7a654c1ca 29451->29452 29453 7ff7a654c2df 29451->29453 29454 7ff7a654c1d7 strcmp 29452->29454 29455 7ff7a654c1ef 29452->29455 29456 7ff7a654ced0 8 API calls 29453->29456 29454->29455 29462 7ff7a654c1e7 29454->29462 29458 7ff7a654c1fc strcmp 29455->29458 29459 7ff7a654c20f 29455->29459 29457 7ff7a654c2f6 29456->29457 29457->29462 29473 7ff7a654d050 _stricmp strtoull 29457->29473 29458->29459 29458->29462 29460 7ff7a654c21c strcmp 29459->29460 29461 7ff7a654c22f 29459->29461 29460->29461 29460->29462 29463 7ff7a654c23c strcmp 29461->29463 29464 7ff7a654c24f 29461->29464 29462->29327 29463->29462 29463->29464 29466 7ff7a654c25c strcmp 29464->29466 29467 7ff7a654c273 29464->29467 29466->29462 29466->29467 29468 7ff7a654c297 29467->29468 29469 7ff7a654c280 strcmp 29467->29469 29470 7ff7a654c2bb 29468->29470 29471 7ff7a654c2a4 strcmp 29468->29471 29469->29462 29469->29468 29470->29453 29472 7ff7a654c2c8 strcmp 29470->29472 29471->29462 29471->29470 29472->29453 29472->29462 29473->29462 29474->29442 29479 7ff7a65ab610 29475->29479 29478 7ff7a6550860 InitializeCriticalSectionEx 29478->29260 29480 7ff7a65ab62a malloc 29479->29480 29481 7ff7a6545ae5 29480->29481 29482 7ff7a65ab61b 29480->29482 29481->29259 29481->29478 29482->29480 29483 7ff7a65ab63a 29482->29483 29484 7ff7a65ab645 29483->29484 29488 7ff7a65ab924 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 29483->29488 29489 7ff7a65ab944 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 29484->29489 29487 7ff7a65ab64b 29489->29487 29490->29271 29528 7ff7a6553d70 29491->29528 29493 7ff7a654c44b 29493->29286 29494 7ff7a6559340 29493->29494 29495 7ff7a6550130 4 API calls 29494->29495 29496 7ff7a6559355 29495->29496 29537 7ff7a6551650 QueryPerformanceFrequency 29496->29537 29498 7ff7a655935a 29501 7ff7a65593fc 29498->29501 29538 7ff7a6551010 29498->29538 29500 7ff7a6559442 29500->29287 29501->29500 29505 7ff7a65594e9 29501->29505 29576 7ff7a6551200 9 API calls 29501->29576 29503 7ff7a6559527 29503->29505 29577 7ff7a6551200 9 API calls 29503->29577 29513 7ff7a6559598 ISource 29505->29513 29552 7ff7a6571560 29505->29552 29507 7ff7a6559634 29508 7ff7a65aac48 _swprintf_c_l 3 API calls 29507->29508 29507->29513 29509 7ff7a655969a 29508->29509 29509->29513 29578 7ff7a6550c50 29509->29578 29511 7ff7a65596bd 29511->29513 29583 7ff7a656fdd0 16 API calls _swprintf_c_l 29511->29583 29513->29287 29515 7ff7a6545732 29514->29515 29516 7ff7a654576d 29515->29516 29684 7ff7a6550700 CreateEventW 29515->29684 29516->29289 29518 7ff7a6545744 29518->29516 29685 7ff7a654ba80 CreateThread 29518->29685 29520 7ff7a6545763 29520->29289 29522 7ff7a654db07 29521->29522 29523 7ff7a654db0f 29522->29523 29524 7ff7a65aac48 _swprintf_c_l 3 API calls 29522->29524 29523->29290 29525 7ff7a654db41 29524->29525 29526 7ff7a654dbd5 ISource 29525->29526 29688 7ff7a65541d0 29525->29688 29526->29290 29533 7ff7a6554aa0 29528->29533 29531 7ff7a6553daf 29531->29493 29534 7ff7a65aac48 _swprintf_c_l 3 API calls 29533->29534 29535 7ff7a6553d98 29534->29535 29535->29531 29536 7ff7a65565d0 malloc RtlPcToFileHeader RaiseException _swprintf_c_l 29535->29536 29536->29531 29537->29498 29539 7ff7a6551048 GetCurrentProcess IsProcessInJob 29538->29539 29540 7ff7a6551045 29538->29540 29541 7ff7a6551079 29539->29541 29542 7ff7a6551120 29539->29542 29540->29539 29541->29542 29545 7ff7a6551083 QueryInformationJobObject 29541->29545 29543 7ff7a6551159 29542->29543 29544 7ff7a6551130 GlobalMemoryStatusEx 29542->29544 29546 7ff7a655116c 29543->29546 29547 7ff7a6551179 GlobalMemoryStatusEx 29543->29547 29544->29543 29545->29542 29548 7ff7a65510a5 29545->29548 29584 7ff7a65aacf0 8 API calls 2 library calls 29546->29584 29547->29546 29548->29542 29549 7ff7a65510e9 GlobalMemoryStatusEx 29548->29549 29549->29542 29551 7ff7a65511bb 29551->29501 29553 7ff7a657157d 29552->29553 29585 7ff7a65516a0 VirtualAlloc 29553->29585 29555 7ff7a65715a3 29556 7ff7a65715f6 29555->29556 29662 7ff7a6551440 InitializeCriticalSection 29555->29662 29588 7ff7a6551440 InitializeCriticalSection 29556->29588 29559 7ff7a6571602 29560 7ff7a6571a28 29559->29560 29589 7ff7a6582260 29559->29589 29560->29507 29562 7ff7a6571631 _swprintf_c_l 29575 7ff7a657186f 29562->29575 29599 7ff7a6571260 29562->29599 29564 7ff7a6571804 29603 7ff7a65517b0 29564->29603 29566 7ff7a657183e 29566->29575 29606 7ff7a6571a50 29566->29606 29568 7ff7a6571860 29569 7ff7a6571864 29568->29569 29571 7ff7a6571893 29568->29571 29663 7ff7a6551790 VirtualFree 29569->29663 29571->29575 29624 7ff7a6584e60 29571->29624 29575->29507 29576->29503 29577->29505 29579 7ff7a65aac48 _swprintf_c_l 3 API calls 29578->29579 29580 7ff7a6550c76 29579->29580 29581 7ff7a6550c7e CreateEventW 29580->29581 29582 7ff7a6550ca0 ISource 29580->29582 29581->29582 29582->29511 29583->29513 29584->29551 29586 7ff7a65516d9 29585->29586 29587 7ff7a65516c1 VirtualFree 29585->29587 29586->29555 29587->29555 29588->29559 29590 7ff7a658228f 29589->29590 29591 7ff7a65822bc 29590->29591 29592 7ff7a65822b2 29590->29592 29597 7ff7a65822e7 29590->29597 29594 7ff7a65517b0 3 API calls 29591->29594 29664 7ff7a6551830 18 API calls 29592->29664 29596 7ff7a65822cd 29594->29596 29595 7ff7a65822ba 29595->29596 29596->29597 29665 7ff7a6551790 VirtualFree 29596->29665 29597->29562 29601 7ff7a657127f 29599->29601 29602 7ff7a657129c 29601->29602 29666 7ff7a6550d10 GetLogicalProcessorInformation GetLastError GetLogicalProcessorInformation ISource 29601->29666 29602->29564 29604 7ff7a65517f4 GetCurrentProcess VirtualAllocExNuma 29603->29604 29605 7ff7a65517d5 VirtualAlloc 29603->29605 29604->29566 29605->29604 29607 7ff7a6571a85 29606->29607 29608 7ff7a6571a89 29607->29608 29612 7ff7a6571aa3 29607->29612 29667 7ff7a65aacf0 8 API calls 2 library calls 29608->29667 29610 7ff7a6571a9b 29610->29568 29611 7ff7a6571ae3 EnterCriticalSection 29611->29612 29613 7ff7a6571b10 LeaveCriticalSection 29611->29613 29612->29611 29612->29613 29616 7ff7a6571c19 LeaveCriticalSection 29612->29616 29618 7ff7a6571bef 29612->29618 29620 7ff7a6571b61 29612->29620 29668 7ff7a65516e0 29612->29668 29613->29612 29621 7ff7a6571c25 29616->29621 29617 7ff7a6571be7 29617->29568 29619 7ff7a6571bf8 EnterCriticalSection 29618->29619 29618->29621 29619->29616 29671 7ff7a65aacf0 8 API calls 2 library calls 29620->29671 29621->29620 29623 7ff7a6571c5d EnterCriticalSection LeaveCriticalSection 29621->29623 29672 7ff7a6551770 VirtualFree 29621->29672 29623->29621 29673 7ff7a6584da0 29624->29673 29627 7ff7a6570c50 29631 7ff7a6570c75 29627->29631 29628 7ff7a6570cdb 29629 7ff7a6571225 29628->29629 29630 7ff7a6571231 29628->29630 29661 7ff7a65711ae 29628->29661 29682 7ff7a6550bb0 CloseHandle 29629->29682 29633 7ff7a657123a 29630->29633 29634 7ff7a6571246 29630->29634 29631->29628 29636 7ff7a6550c50 4 API calls 29631->29636 29683 7ff7a6550bb0 CloseHandle 29633->29683 29634->29575 29637 7ff7a6570d1b 29636->29637 29637->29628 29638 7ff7a6550c50 4 API calls 29637->29638 29639 7ff7a6570d31 _swprintf_c_l 29638->29639 29639->29628 29640 7ff7a6550e30 10 API calls 29639->29640 29641 7ff7a6571050 29640->29641 29642 7ff7a6550c50 4 API calls 29641->29642 29643 7ff7a65710cd 29642->29643 29644 7ff7a657110f 29643->29644 29645 7ff7a6550c50 4 API calls 29643->29645 29644->29628 29646 7ff7a65711dd 29644->29646 29647 7ff7a65711d1 29644->29647 29648 7ff7a65710e3 29645->29648 29650 7ff7a65711e6 29646->29650 29651 7ff7a65711f2 29646->29651 29678 7ff7a6550bb0 CloseHandle 29647->29678 29648->29644 29677 7ff7a6550bd0 4 API calls 2 library calls 29648->29677 29679 7ff7a6550bb0 CloseHandle 29650->29679 29653 7ff7a65711fb 29651->29653 29654 7ff7a6571207 29651->29654 29680 7ff7a6550bb0 CloseHandle 29653->29680 29654->29628 29656 7ff7a6571210 29654->29656 29681 7ff7a6550bb0 CloseHandle 29656->29681 29659 7ff7a65710f9 29659->29644 29660 7ff7a6550c50 4 API calls 29659->29660 29660->29644 29661->29575 29662->29556 29663->29575 29664->29595 29665->29597 29666->29602 29667->29610 29669 7ff7a65516fb VirtualAlloc 29668->29669 29670 7ff7a655171e GetCurrentProcess VirtualAllocExNuma 29668->29670 29669->29612 29670->29612 29671->29617 29672->29621 29674 7ff7a6584db9 29673->29674 29676 7ff7a6571a07 29673->29676 29675 7ff7a6584dd0 GetEnabledXStateFeatures 29674->29675 29674->29676 29675->29676 29676->29627 29677->29659 29678->29646 29679->29651 29680->29654 29681->29628 29682->29630 29683->29634 29684->29518 29686 7ff7a654bab5 SetThreadPriority ResumeThread CloseHandle 29685->29686 29687 7ff7a654baaf 29685->29687 29686->29520 29687->29520 29689 7ff7a6554203 _swprintf_c_l 29688->29689 29692 7ff7a6554229 ISource _swprintf_c_l 29689->29692 29694 7ff7a6555180 29689->29694 29691 7ff7a6554220 29691->29692 29693 7ff7a654c8a0 InitializeCriticalSectionEx 29691->29693 29692->29525 29693->29692 29695 7ff7a65517b0 3 API calls 29694->29695 29696 7ff7a65551a2 29695->29696 29697 7ff7a65551aa 29696->29697 29698 7ff7a65516e0 3 API calls 29696->29698 29697->29691 29699 7ff7a65551c8 29698->29699 29702 7ff7a65551d3 _swprintf_c_l 29699->29702 29703 7ff7a6551790 VirtualFree 29699->29703 29701 7ff7a65552ee 29701->29691 29702->29691 29703->29701 29704->29295 30287 7ff7a6543540 6 API calls 29709 7ff7a65d2f50 29710 7ff7a65d2f94 29709->29710 29711 7ff7a65d2fd6 GetCalendarInfoEx 29710->29711 29712 7ff7a65d2ff5 29711->29712 29714 7ff7a65d301d 29712->29714 29715 7ff7a65c4160 29712->29715 29716 7ff7a65c416b 29715->29716 29717 7ff7a65c41c6 29715->29717 29716->29717 29718 7ff7a65c417b 29716->29718 29719 7ff7a6541fc0 65 API calls 29717->29719 29720 7ff7a65c4180 29718->29720 29721 7ff7a65c4213 29718->29721 29722 7ff7a65c4197 29718->29722 29727 7ff7a65c41f1 29719->29727 29720->29714 29745 7ff7a6541fc0 29721->29745 29723 7ff7a6542080 79 API calls 29722->29723 29725 7ff7a65c41a6 29723->29725 29725->29714 29726 7ff7a65c421f 29729 7ff7a6542540 26 API calls 29726->29729 29728 7ff7a6542540 26 API calls 29727->29728 29728->29721 29731 7ff7a65c4241 29729->29731 29730 7ff7a65c425d 29730->29714 29731->29730 29732 7ff7a65c4323 29731->29732 29733 7ff7a65c43bd 29731->29733 29734 7ff7a6542080 79 API calls 29732->29734 29735 7ff7a6541fc0 65 API calls 29733->29735 29736 7ff7a65c4331 29734->29736 29739 7ff7a65c43c9 29735->29739 29737 7ff7a65c4377 MultiByteToWideChar 29736->29737 29738 7ff7a65c4398 29737->29738 29738->29730 29741 7ff7a6541fc0 65 API calls 29738->29741 29740 7ff7a6542540 26 API calls 29739->29740 29740->29738 29742 7ff7a65c43f0 29741->29742 29743 7ff7a6542540 26 API calls 29742->29743 29744 7ff7a65c440b 29743->29744 29746 7ff7a6541feb 29745->29746 29747 7ff7a6541ff2 29745->29747 29746->29726 29748 7ff7a654c700 65 API calls 29747->29748 29749 7ff7a6542044 29748->29749 29749->29726 30255 7ff7a6542450 26 API calls 30316 7ff7a6545650 GetLastError SetLastError RtlRestoreContext 30317 7ff7a6576e53 40 API calls _swprintf_c_l 30226 7ff7a6583f50 9 API calls 30319 7ff7a655de1b 23 API calls 29797 7ff7a658031b 29798 7ff7a658032c 29797->29798 29799 7ff7a658035a 29798->29799 29801 7ff7a6558808 29798->29801 29802 7ff7a655880d 29801->29802 29821 7ff7a656ad30 29802->29821 29806 7ff7a655884d 29825 7ff7a6551630 QueryPerformanceCounter 29806->29825 29808 7ff7a655886e 29826 7ff7a654c650 29808->29826 29810 7ff7a65588be 29811 7ff7a657e8c0 52 API calls 29810->29811 29813 7ff7a65588c3 29811->29813 29812 7ff7a656ad30 SwitchToThread 29814 7ff7a6558a55 29812->29814 29815 7ff7a6551630 QueryPerformanceCounter 29813->29815 29816 7ff7a65589cd 29813->29816 29817 7ff7a6551680 SetEvent 29814->29817 29818 7ff7a6558a78 29814->29818 29815->29816 29816->29812 29817->29818 29819 7ff7a654be60 SetEvent 29818->29819 29820 7ff7a6558aa9 29819->29820 29820->29799 29822 7ff7a655882f 29821->29822 29823 7ff7a656ad4f 29821->29823 29822->29806 29830 7ff7a6551670 ResetEvent 29822->29830 29823->29822 29824 7ff7a656ad91 SwitchToThread 29823->29824 29824->29823 29825->29808 29827 7ff7a654c65d 29826->29827 29831 7ff7a6543260 15 API calls 29827->29831 29829 7ff7a654c6c4 29831->29829 29842 7ff7a65fe620 29855 7ff7a65454e0 29842->29855 29844 7ff7a65fe640 29871 7ff7a6544340 malloc RtlPcToFileHeader RaiseException _swprintf_c_l 29844->29871 29846 7ff7a65fe648 29872 7ff7a65fe7e0 79 API calls 29846->29872 29848 7ff7a65fe666 29873 7ff7a65420e0 79 API calls 29848->29873 29850 7ff7a65fe69b 29875 7ff7a65f2fa0 79 API calls 29850->29875 29853 7ff7a65fe678 29853->29850 29874 7ff7a65fe990 79 API calls 29853->29874 29854 7ff7a65fe6a8 29856 7ff7a6545548 29855->29856 29857 7ff7a654550f 29855->29857 29856->29844 29857->29856 29858 7ff7a65455df 29857->29858 29861 7ff7a65455c6 29857->29861 29866 7ff7a6545588 29857->29866 29867 7ff7a65455a7 29857->29867 29859 7ff7a65455ff 29858->29859 29860 7ff7a65455e6 29858->29860 29864 7ff7a654562f 29859->29864 29883 7ff7a6545370 GetLastError SetLastError 29859->29883 29882 7ff7a654b980 GetStdHandle WriteFile 29860->29882 29876 7ff7a6542ce0 29861->29876 29864->29844 29865 7ff7a65455f2 RaiseFailFastException 29865->29859 29869 7ff7a6545590 Sleep 29866->29869 29867->29861 29870 7ff7a65455b9 RaiseFailFastException 29867->29870 29869->29867 29869->29869 29870->29861 29871->29846 29872->29848 29873->29853 29874->29853 29875->29854 29877 7ff7a6542d06 29876->29877 29878 7ff7a654b4e0 3 API calls 29877->29878 29881 7ff7a6542d24 29877->29881 29879 7ff7a6542d1c 29878->29879 29884 7ff7a6544930 29879->29884 29881->29858 29882->29865 29893 7ff7a654b6a0 GetCurrentThreadId 29884->29893 29886 7ff7a654495f 29894 7ff7a654ca20 VirtualQuery 29886->29894 29888 7ff7a65449aa 29889 7ff7a65449ae RaiseFailFastException 29888->29889 29890 7ff7a65449bb 29888->29890 29889->29890 29895 7ff7a654fdd0 GetCurrentThreadId malloc RtlPcToFileHeader RaiseException 29890->29895 29892 7ff7a65449c3 29892->29881 29893->29886 29894->29888 29895->29892 30228 7ff7a6544720 6 API calls 30230 7ff7a6557f20 GetCurrentThreadId malloc RtlPcToFileHeader RaiseException 30256 7ff7a6556820 SleepEx SwitchToThread 30288 7ff7a654a520 9 API calls 30321 7ff7a6556a20 SleepEx WaitForSingleObject SwitchToThread SwitchToThread SwitchToThread 30289 7ff7a655d8c7 53 API calls 30120 7ff7a656d233 30121 7ff7a656d23d 30120->30121 30123 7ff7a656d242 30121->30123 30193 7ff7a6563b10 DebugBreak 30121->30193 30124 7ff7a656d2bd 30123->30124 30125 7ff7a656d3f2 30123->30125 30194 7ff7a6551630 QueryPerformanceCounter 30124->30194 30130 7ff7a656d2c9 30125->30130 30160 7ff7a6566190 30125->30160 30128 7ff7a656d66a 30195 7ff7a6563910 39 API calls 30128->30195 30129 7ff7a656d675 30133 7ff7a656d673 30129->30133 30196 7ff7a6551670 ResetEvent 30129->30196 30130->30128 30130->30129 30130->30133 30132 7ff7a6567e30 4 API calls 30134 7ff7a656d746 30132->30134 30133->30132 30133->30133 30173 7ff7a65820b0 30134->30173 30139 7ff7a656da41 30181 7ff7a6568830 30139->30181 30141 7ff7a656d8ff 30142 7ff7a654c650 15 API calls 30141->30142 30144 7ff7a656d909 30142->30144 30146 7ff7a656d95f _swprintf_c_l 30144->30146 30199 7ff7a6581200 28 API calls _swprintf_c_l 30144->30199 30145 7ff7a656dcf1 30147 7ff7a656dda5 30145->30147 30149 7ff7a656a330 13 API calls 30145->30149 30146->30139 30146->30145 30200 7ff7a657d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30146->30200 30149->30147 30150 7ff7a656d883 SwitchToThread 30154 7ff7a656d74b 30150->30154 30151 7ff7a656d8af SwitchToThread 30151->30154 30154->30141 30154->30144 30154->30146 30154->30150 30154->30151 30155 7ff7a656d877 SwitchToThread 30154->30155 30197 7ff7a6551690 SleepEx 30154->30197 30198 7ff7a65825f0 WaitForSingleObject 30154->30198 30155->30154 30157 7ff7a656da4d 30201 7ff7a6551630 QueryPerformanceCounter 30157->30201 30158 7ff7a656dbad 30202 7ff7a6569a50 15 API calls 2 library calls 30158->30202 30163 7ff7a65661c8 30160->30163 30161 7ff7a6566486 30165 7ff7a6568200 10 API calls 30161->30165 30162 7ff7a6566306 30203 7ff7a6568200 30162->30203 30163->30161 30163->30162 30172 7ff7a65662ea 30163->30172 30165->30172 30166 7ff7a656632d 30168 7ff7a6568200 10 API calls 30166->30168 30166->30172 30167 7ff7a65665e6 30167->30125 30170 7ff7a6566356 30168->30170 30169 7ff7a6568200 10 API calls 30169->30172 30171 7ff7a6550e30 10 API calls 30170->30171 30170->30172 30171->30172 30172->30167 30172->30169 30176 7ff7a65820b9 30173->30176 30174 7ff7a658224d 30174->30154 30175 7ff7a6582137 DebugBreak 30178 7ff7a6582146 30175->30178 30176->30174 30176->30175 30176->30178 30177 7ff7a65821b7 DebugBreak 30180 7ff7a65821c6 30177->30180 30178->30177 30178->30180 30179 7ff7a658223a DebugBreak 30179->30174 30180->30174 30180->30179 30182 7ff7a656885a 30181->30182 30183 7ff7a6568888 30182->30183 30190 7ff7a6568a76 30182->30190 30184 7ff7a6567a30 5 API calls 30183->30184 30188 7ff7a656891b 30183->30188 30184->30183 30186 7ff7a6569954 30186->30157 30187 7ff7a65689e5 EnterCriticalSection LeaveCriticalSection 30187->30188 30188->30187 30192 7ff7a6568a71 30188->30192 30213 7ff7a6551770 VirtualFree 30188->30213 30190->30192 30208 7ff7a6567be0 30190->30208 30214 7ff7a65aacf0 8 API calls 2 library calls 30192->30214 30193->30123 30194->30130 30195->30133 30197->30154 30198->30154 30199->30146 30200->30146 30201->30158 30202->30145 30204 7ff7a6568238 30203->30204 30206 7ff7a6568258 30203->30206 30204->30166 30205 7ff7a6550e30 10 API calls 30207 7ff7a6568500 30205->30207 30206->30205 30206->30207 30207->30166 30209 7ff7a6567bed 30208->30209 30211 7ff7a6567bf4 30208->30211 30209->30192 30210 7ff7a6567c69 30210->30192 30211->30210 30212 7ff7a6567a30 5 API calls 30211->30212 30212->30211 30213->30188 30214->30186 30259 7ff7a6547430 GetCurrentProcess FlushInstructionCache VirtualProtect 30290 7ff7a6543930 17 API calls 30323 7ff7a6544230 8 API calls 30260 7ff7a6556830 QueryPerformanceCounter 30261 7ff7a65aac2c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 30291 7ff7a65d3a00 90 API calls 30263 7ff7a65ff100 82 API calls 30293 7ff7a6541a08 79 API calls 30328 7ff7a6545710 SetEvent 30329 7ff7a655ab10 DebugBreak DebugBreak 30264 7ff7a6556910 15 API calls 2 library calls 30266 7ff7a6577c37 50 API calls ISource 30237 7ff7a65ffbe0 LocaleNameToLCID 30267 7ff7a6564cd9 VirtualAlloc VirtualUnlock _swprintf_c_l 30238 7ff7a65453e0 WaitForMultipleObjectsEx SetLastError CoWaitForMultipleHandles SetLastError 30332 7ff7a65542e0 GetCurrentThreadId SleepEx malloc RtlPcToFileHeader RaiseException 29939 7ff7a655d8eb 29942 7ff7a657eca0 29939->29942 29947 7ff7a657ecda 29942->29947 29943 7ff7a655d8c7 29944 7ff7a655b250 18 API calls 29946 7ff7a657ee11 29944->29946 29946->29943 29946->29944 29950 7ff7a656f280 38 API calls 29946->29950 29947->29946 29949 7ff7a657ef34 _swprintf_c_l 29947->29949 29951 7ff7a655b750 VirtualAlloc VirtualUnlock DebugBreak _swprintf_c_l 29949->29951 29950->29946 29951->29943 30295 7ff7a655d9ea SleepEx WaitForSingleObject SwitchToThread SwitchToThread 30269 7ff7a655df50 45 API calls 30240 7ff7a655df97 18 API calls 30297 7ff7a65799c3 52 API calls _swprintf_c_l 29705 7ff7a655dfbf 29706 7ff7a6580720 18 API calls 29705->29706 29707 7ff7a655df97 29706->29707 29708 7ff7a6580720 18 API calls 29707->29708 29708->29707 30336 7ff7a6544ec3 25 API calls 30337 7ff7a65792ce 63 API calls 2 library calls 29750 7ff7a65f30d0 29751 7ff7a65f30e1 29750->29751 29753 7ff7a65f30ea 29750->29753 29752 7ff7a65f3105 29753->29752 29755 7ff7a65f3050 29753->29755 29756 7ff7a65f3069 29755->29756 29759 7ff7a65f3160 29756->29759 29758 7ff7a65f3079 29758->29752 29760 7ff7a65f3177 29759->29760 29761 7ff7a65f31ea 29759->29761 29764 7ff7a65f3220 26 API calls 29760->29764 29761->29758 29763 7ff7a65f318b 29763->29758 29764->29763 29787 7ff7a65508d0 29788 7ff7a65508ea 29787->29788 29789 7ff7a65508f5 29787->29789 29790 7ff7a6550922 VirtualAlloc 29789->29790 29795 7ff7a655096e 29789->29795 29791 7ff7a6550955 29790->29791 29790->29795 29792 7ff7a65aac48 _swprintf_c_l 3 API calls 29791->29792 29793 7ff7a6550966 29792->29793 29794 7ff7a65509c1 VirtualFree 29793->29794 29793->29795 29794->29795 30273 7ff7a65580d0 15 API calls 30339 7ff7a65832d0 16 API calls 30343 7ff7a65d6aa0 92 API calls 29896 7ff7a65456a0 29897 7ff7a6542ce0 9 API calls 29896->29897 29898 7ff7a65456b2 29897->29898 29899 7ff7a65456ee SetEvent 29898->29899 29902 7ff7a65f3840 29899->29902 29903 7ff7a65454e0 16 API calls 29902->29903 29904 7ff7a65f3861 29903->29904 29909 7ff7a65e27c0 29904->29909 29906 7ff7a65f3866 29914 7ff7a6545800 WaitForSingleObjectEx 29906->29914 29915 7ff7a65457d0 SetEvent 29906->29915 29916 7ff7a65e2890 29909->29916 29913 7ff7a65e27d4 29913->29906 29914->29906 29915->29906 29917 7ff7a65417fc 79 API calls 29916->29917 29919 7ff7a65e28af 29917->29919 29918 7ff7a65e27cf 29933 7ff7a65417fc 29918->29933 29919->29918 29920 7ff7a65e28db CoInitializeEx 29919->29920 29921 7ff7a65e28f2 29920->29921 29922 7ff7a65e2900 29921->29922 29924 7ff7a65e28f6 29921->29924 29922->29918 29937 7ff7a65e2970 79 API calls 29922->29937 29924->29918 29925 7ff7a65e294a 29924->29925 29926 7ff7a6541fc0 65 API calls 29924->29926 29927 7ff7a6541fc0 65 API calls 29925->29927 29928 7ff7a65e2937 29926->29928 29929 7ff7a65e2956 29927->29929 29930 7ff7a6542540 26 API calls 29928->29930 29931 7ff7a6542540 26 API calls 29929->29931 29930->29925 29932 7ff7a65e2969 29931->29932 29934 7ff7a6541812 29933->29934 29934->29913 29936 7ff7a65f736d 29934->29936 29938 7ff7a65fd620 79 API calls 29934->29938 29936->29913 29937->29918 29938->29936 30242 7ff7a6543fa0 28 API calls _swprintf_c_l 30244 7ff7a655a7a0 SleepEx SwitchToThread SwitchToThread 29952 7ff7a65d8fb0 29953 7ff7a65d8fea 29952->29953 29954 7ff7a65d9017 GetLocaleInfoEx 29953->29954 29955 7ff7a65d9036 29954->29955 29957 7ff7a65d9048 29955->29957 29958 7ff7a65c40f0 79 API calls 29955->29958 29958->29957 30300 7ff7a65d31b0 85 API calls 29960 7ff7a65418b2 29961 7ff7a65418c8 29960->29961 29963 7ff7a65f736d 29961->29963 29964 7ff7a65fd620 79 API calls 29961->29964 29964->29963 29965 7ff7a656c9b6 29966 7ff7a656c9bf 29965->29966 29969 7ff7a656c9da ISource 29965->29969 30079 7ff7a6580c30 QueryPerformanceCounter 29966->30079 29968 7ff7a656c9ce 29970 7ff7a656d127 29968->29970 30083 7ff7a655bdb0 46 API calls 29968->30083 29971 7ff7a656ca3e 29969->29971 30080 7ff7a65667f0 VirtualFree 29969->30080 30008 7ff7a657adb0 29971->30008 29977 7ff7a656cab5 30020 7ff7a656dfd0 29977->30020 29979 7ff7a656ca48 _swprintf_c_l 29979->29977 30081 7ff7a657d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 29979->30081 29980 7ff7a656cad4 30035 7ff7a6572370 29980->30035 29982 7ff7a656caff 29984 7ff7a6550130 4 API calls 29982->29984 29985 7ff7a656cb25 29982->29985 29984->29985 30039 7ff7a656a330 29985->30039 29989 7ff7a656cc2b 29990 7ff7a656cc3d EnterCriticalSection 29989->29990 30004 7ff7a656d0c5 29989->30004 29992 7ff7a656ccbd 29990->29992 29993 7ff7a656cd1e LeaveCriticalSection 29990->29993 29991 7ff7a656cc10 29991->29989 30082 7ff7a6581200 28 API calls _swprintf_c_l 29991->30082 29992->29993 30057 7ff7a654bc10 29992->30057 30001 7ff7a656cd03 29993->30001 29995 7ff7a656d0cc GetTickCount64 29995->29968 29997 7ff7a656ccdf 29997->29993 29998 7ff7a656ccec LeaveCriticalSection 29997->29998 29998->30001 29999 7ff7a656cf64 29999->29995 29999->30004 30069 7ff7a6569980 29999->30069 30000 7ff7a656cf19 30000->29999 30007 7ff7a6569980 4 API calls 30000->30007 30001->29999 30003 7ff7a6564020 7 API calls 30001->30003 30005 7ff7a656ce69 30001->30005 30003->30001 30004->29995 30005->30000 30006 7ff7a656a330 13 API calls 30005->30006 30006->30000 30007->29999 30009 7ff7a657adc2 _swprintf_c_l 30008->30009 30011 7ff7a656ca43 30008->30011 30009->30011 30084 7ff7a657d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30009->30084 30012 7ff7a655e5f0 30011->30012 30013 7ff7a655e614 _swprintf_c_l 30012->30013 30014 7ff7a655e6e0 _swprintf_c_l 30013->30014 30085 7ff7a657d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30013->30085 30086 7ff7a6580e70 DebugBreak DebugBreak DebugBreak DebugBreak 30013->30086 30015 7ff7a655e7d0 30014->30015 30087 7ff7a657d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30014->30087 30088 7ff7a6580e70 DebugBreak DebugBreak DebugBreak DebugBreak 30014->30088 30015->29979 30021 7ff7a656e084 30020->30021 30023 7ff7a656e1ea 30021->30023 30089 7ff7a6551630 QueryPerformanceCounter 30021->30089 30031 7ff7a656e38d 30023->30031 30090 7ff7a655d390 24 API calls 30023->30090 30025 7ff7a656e356 30026 7ff7a656e414 30025->30026 30025->30031 30091 7ff7a6564120 7 API calls 30025->30091 30099 7ff7a657d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30026->30099 30029 7ff7a6550e30 10 API calls 30034 7ff7a656e408 30029->30034 30030 7ff7a656e378 30030->30026 30032 7ff7a656e380 30030->30032 30031->30029 30031->30034 30092 7ff7a6567a30 30032->30092 30034->29980 30036 7ff7a65723ad 30035->30036 30038 7ff7a65723d7 30035->30038 30037 7ff7a6550e30 10 API calls 30036->30037 30037->30038 30038->29982 30040 7ff7a656a37a 30039->30040 30041 7ff7a656a33f 30039->30041 30110 7ff7a6556ee0 QueryPerformanceCounter 30040->30110 30042 7ff7a6550130 4 API calls 30041->30042 30042->30040 30044 7ff7a656a3cb 30111 7ff7a656c0c0 8 API calls ISource 30044->30111 30046 7ff7a656a3d0 30047 7ff7a6567e30 30046->30047 30048 7ff7a6567f54 30047->30048 30049 7ff7a6567e41 30047->30049 30048->29991 30050 7ff7a6550130 4 API calls 30049->30050 30053 7ff7a6567e5c 30050->30053 30051 7ff7a6567eb4 30052 7ff7a6567f04 30051->30052 30055 7ff7a6550130 4 API calls 30051->30055 30052->30048 30056 7ff7a6550130 4 API calls 30052->30056 30053->30051 30054 7ff7a6550130 4 API calls 30053->30054 30054->30053 30055->30051 30056->30052 30058 7ff7a654bc2f 30057->30058 30059 7ff7a654bc52 30058->30059 30112 7ff7a654ba40 CreateThread 30058->30112 30059->29997 30061 7ff7a654bc44 30062 7ff7a654bc4d 30061->30062 30063 7ff7a654bc59 30061->30063 30115 7ff7a65506a0 CloseHandle 30062->30115 30116 7ff7a6550780 WaitForMultipleObjectsEx SetLastError CoWaitForMultipleHandles SetLastError 30063->30116 30066 7ff7a654bc69 30117 7ff7a65506a0 CloseHandle 30066->30117 30068 7ff7a654bc73 30068->29997 30070 7ff7a656999b 30069->30070 30076 7ff7a65699cf 30070->30076 30118 7ff7a6551630 QueryPerformanceCounter 30070->30118 30119 7ff7a65519f0 WaitForSingleObject 30076->30119 30079->29968 30080->29971 30081->29979 30082->29989 30083->29970 30084->30009 30085->30013 30086->30013 30087->30014 30088->30014 30089->30023 30090->30025 30091->30030 30100 7ff7a6582480 30092->30100 30094 7ff7a6567a69 _swprintf_c_l 30095 7ff7a6567b69 30094->30095 30108 7ff7a6551770 VirtualFree 30094->30108 30095->30031 30095->30095 30097 7ff7a6567b2e 30097->30095 30098 7ff7a6567b3c EnterCriticalSection LeaveCriticalSection 30097->30098 30098->30095 30099->30031 30101 7ff7a658249a 30100->30101 30103 7ff7a65824a3 30101->30103 30109 7ff7a6551770 VirtualFree 30101->30109 30104 7ff7a65824f3 30103->30104 30105 7ff7a65824bd EnterCriticalSection 30103->30105 30104->30094 30106 7ff7a65824e7 LeaveCriticalSection 30105->30106 30107 7ff7a65824e0 30105->30107 30106->30104 30107->30106 30108->30097 30109->30103 30110->30044 30111->30046 30113 7ff7a654ba69 CloseHandle 30112->30113 30114 7ff7a654ba64 30112->30114 30113->30061 30114->30061 30115->30059 30116->30066 30117->30068 30118->30076 30276 7ff7a655dcb5 6 API calls 30345 7ff7a65582b0 SetEvent SleepEx SwitchToThread SwitchToThread 30247 7ff7a6556fb0 WaitForSingleObject 30248 7ff7a657a7b0 39 API calls

                          Control-flow Graph

                          APIs
                          • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A655146F
                          • GetNumaHighestNodeNumber.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A65514AD
                          • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A65514D9
                          • GetProcessGroupAffinity.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A65514EA
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A65514F9
                          • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A6551590
                          • GetProcessAffinityMask.KERNEL32 ref: 00007FF7A65515A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Process$AffinityCurrent$ErrorGroupHighestInfoLastMaskNodeNumaNumberSystem
                          • String ID:
                          • API String ID: 580471860-0
                          • Opcode ID: 03dbf51e9477a4b2f0782d4ffae03c46400fccc10c807166d3160a18ce5dc755
                          • Instruction ID: 120c59eee221866beeeff92864cb516d2a26cb805b78186ff02e97e637812900
                          • Opcode Fuzzy Hash: 03dbf51e9477a4b2f0782d4ffae03c46400fccc10c807166d3160a18ce5dc755
                          • Instruction Fuzzy Hash: A7515171E1AB4686EB60AF15EC4417AABA2EB44F84FC95035E94E47778DF3CE444CB20
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakDebug
                          • String ID: END
                          • API String ID: 456121617-2522575163
                          • Opcode ID: 38e0c489ae895d9936cc8f933a868ccb106945ed1c986c164ac1257dd7aff2c4
                          • Instruction ID: 91c2a31a51a401aee0c3573a9f4deda84a510afa4c67a30560b5489643a658e4
                          • Opcode Fuzzy Hash: 38e0c489ae895d9936cc8f933a868ccb106945ed1c986c164ac1257dd7aff2c4
                          • Instruction Fuzzy Hash: DD829B35E0BB4685EB50AF29EC50276B3A2EF45F44F9A6636D90D426B0DE3CE441CF21
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: 6f93bc1d4941456f45dda91854c7f695a82bcce70b9b063c41ad38af2987899c
                          • Instruction ID: 7bf3343ba88aa6ceaf67cbf8b7622e76ce75dbd338db7ab79f6d28df63735f14
                          • Opcode Fuzzy Hash: 6f93bc1d4941456f45dda91854c7f695a82bcce70b9b063c41ad38af2987899c
                          • Instruction Fuzzy Hash: 47B25776A0AF4685EB04AB14EC4027AB3A5FB49F84F9A6635CA4C03774DF3CE461C721

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1042 7ff7a6559340-7ff7a655936a call 7ff7a6550130 call 7ff7a6551650 1047 7ff7a655936c-7ff7a6559371 1042->1047 1048 7ff7a6559373-7ff7a6559384 1042->1048 1049 7ff7a6559388-7ff7a65593a2 1047->1049 1048->1049 1050 7ff7a65593ab-7ff7a65593bc 1049->1050 1051 7ff7a65593a4-7ff7a65593a9 1049->1051 1052 7ff7a65593c0-7ff7a65593fa call 7ff7a654c190 call 7ff7a65511e0 call 7ff7a65526a0 1050->1052 1051->1052 1059 7ff7a655940c-7ff7a6559413 call 7ff7a6551010 1052->1059 1060 7ff7a65593fc-7ff7a655940a 1052->1060 1063 7ff7a6559418 1059->1063 1061 7ff7a655941f-7ff7a6559440 call 7ff7a6565d00 1060->1061 1066 7ff7a655944c-7ff7a655946d call 7ff7a6552720 call 7ff7a6553440 1061->1066 1067 7ff7a6559442-7ff7a655944b 1061->1067 1063->1061 1072 7ff7a6559476-7ff7a65594a4 call 7ff7a6565f00 1066->1072 1073 7ff7a655946f 1066->1073 1076 7ff7a65594b9-7ff7a65594d7 call 7ff7a6553410 call 7ff7a6552670 1072->1076 1077 7ff7a65594a6-7ff7a65594a8 1072->1077 1073->1072 1083 7ff7a655955d-7ff7a6559596 call 7ff7a6553420 call 7ff7a6553430 call 7ff7a6552560 call 7ff7a6552680 1076->1083 1084 7ff7a65594dd-7ff7a65594e7 1076->1084 1077->1076 1078 7ff7a65594aa-7ff7a65594b8 1077->1078 1105 7ff7a6559598-7ff7a65595b0 1083->1105 1106 7ff7a65595b1-7ff7a65595c0 1083->1106 1085 7ff7a65594e9-7ff7a65594f0 1084->1085 1086 7ff7a6559506-7ff7a655952d call 7ff7a6551200 1084->1086 1088 7ff7a655954a-7ff7a6559556 1085->1088 1089 7ff7a65594f2-7ff7a65594f9 1085->1089 1097 7ff7a6559539-7ff7a6559546 1086->1097 1098 7ff7a655952f-7ff7a6559537 call 7ff7a6551200 1086->1098 1088->1083 1093 7ff7a65594fb-7ff7a65594fe 1089->1093 1094 7ff7a6559500-7ff7a6559504 1089->1094 1093->1088 1094->1088 1097->1088 1098->1088 1107 7ff7a65595c2-7ff7a65595d3 1106->1107 1108 7ff7a65595f1-7ff7a65595f8 1106->1108 1109 7ff7a65595dc-7ff7a65595ef 1107->1109 1110 7ff7a65595d5-7ff7a65595da 1107->1110 1111 7ff7a65595fe-7ff7a6559609 1108->1111 1112 7ff7a6559724 1108->1112 1109->1111 1110->1111 1111->1112 1114 7ff7a655960f-7ff7a655962f call 7ff7a6571560 1111->1114 1113 7ff7a6559729-7ff7a6559741 1112->1113 1116 7ff7a6559634-7ff7a6559668 call 7ff7a65533d0 call 7ff7a6553400 call 7ff7a65533e0 call 7ff7a65533f0 1114->1116 1125 7ff7a655966e-7ff7a655969d call 7ff7a6552660 call 7ff7a65aac48 1116->1125 1126 7ff7a6559719-7ff7a655971b 1116->1126 1131 7ff7a655971d 1125->1131 1132 7ff7a655969f-7ff7a65596b1 call 7ff7a6550b90 1125->1132 1126->1113 1131->1112 1132->1112 1135 7ff7a65596b3-7ff7a65596bf call 7ff7a6550c50 1132->1135 1138 7ff7a65596d4-7ff7a65596ff call 7ff7a656fdd0 1135->1138 1139 7ff7a65596c1-7ff7a65596d2 call 7ff7a6542c80 1135->1139 1144 7ff7a6559706-7ff7a6559708 1138->1144 1145 7ff7a6559701 call 7ff7a65aac40 1138->1145 1139->1113 1144->1126 1147 7ff7a655970a-7ff7a6559714 call 7ff7a6584840 call 7ff7a6542c80 1144->1147 1145->1144 1147->1126
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: GlobalMemoryProcessQueryStatus$CurrentFrequencyInformationObjectPerformance
                          • String ID: Creation of WaitForGCEvent failed$TraceGC is not turned on
                          • API String ID: 133006248-518909315
                          • Opcode ID: 3f99d9c4068ce16fac88113a0baf40306a504a41c0001bff05d2c2920de71d5b
                          • Instruction ID: 099869341d14acdfe67b80a110e0675fe144fc8730d7b56de42669ff9a3547a2
                          • Opcode Fuzzy Hash: 3f99d9c4068ce16fac88113a0baf40306a504a41c0001bff05d2c2920de71d5b
                          • Instruction Fuzzy Hash: CAB15F21E0FB8281EB11BB24EC5527BE292AF45F84FC65135E54E067BADF2CF4518B20
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: ecc120c17447902b84dd65978579eb4ee08e6082c242e837b02859beb14b59ee
                          • Instruction ID: 2385ea471c804ca70c79e50ee642b8ee42c5d4fc9044d81cb2cb8445249955f1
                          • Opcode Fuzzy Hash: ecc120c17447902b84dd65978579eb4ee08e6082c242e837b02859beb14b59ee
                          • Instruction Fuzzy Hash: 8C219F33A06A91DAD724EF61EC505EA77A4FB44B98F910135FE4D83AA9DF38D481C350
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID: HB
                          • API String ID: 0-654769311
                          • Opcode ID: 8baaf20ad30f8a11e83a1753a6f0dac9e1f205e362e9e02b02714d8a0f111955
                          • Instruction ID: d86a47d8b3231abb9604c32b78ca07fb662fadadf2b89579bbb5c61fba10e50d
                          • Opcode Fuzzy Hash: 8baaf20ad30f8a11e83a1753a6f0dac9e1f205e362e9e02b02714d8a0f111955
                          • Instruction Fuzzy Hash: 50D1BD76A0AB4286EB50AF05EC4436AB7A5FF04F94F9A5235DA4D03BA0DF3CE451C721
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 097b62bcefa2e15c075ed7cd1fc2a7246b24135ed2dc7981fe42efd19a6c3ad6
                          • Instruction ID: d9d1f8ead17fafcad318e4d45643565f8d5cd12d8bb12991b3e970b06fd51cf1
                          • Opcode Fuzzy Hash: 097b62bcefa2e15c075ed7cd1fc2a7246b24135ed2dc7981fe42efd19a6c3ad6
                          • Instruction Fuzzy Hash: 6662D475A1FA4685EB65AB26EC44337F392BF44F84F9A9135E90D53270DF3CA840CA21
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 43a4ce6d3edcbc3c7c6dd526977bf27065133be5ff1af8be5729591fa77bad5d
                          • Instruction ID: 2fe4fbc54be47174fe63f6840f9472f7e82d41fcba68d6b5fe85f4916abd1bf7
                          • Opcode Fuzzy Hash: 43a4ce6d3edcbc3c7c6dd526977bf27065133be5ff1af8be5729591fa77bad5d
                          • Instruction Fuzzy Hash: 90F15C21D1BF8285F711FB24ED51277E292AFA5B40FC6A335E44D112B2EF2CB591CA20

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 7ff7a656c9b6-7ff7a656c9bd 1 7ff7a656c9da-7ff7a656ca10 call 7ff7a65709b0 0->1 2 7ff7a656c9bf-7ff7a656c9d5 call 7ff7a6580c30 0->2 8 7ff7a656ca25-7ff7a656ca37 1->8 9 7ff7a656ca12-7ff7a656ca23 call 7ff7a65aac40 1->9 7 7ff7a656d0fd-7ff7a656d120 2->7 11 7ff7a656d127-7ff7a656d12e 7->11 12 7ff7a656d122 call 7ff7a655bdb0 7->12 13 7ff7a656ca3e-7ff7a656ca50 call 7ff7a657adb0 call 7ff7a655e5f0 8->13 14 7ff7a656ca39 call 7ff7a65667f0 8->14 9->8 12->11 22 7ff7a656cabc-7ff7a656cb0c call 7ff7a656dfd0 call 7ff7a6572370 13->22 23 7ff7a656ca52-7ff7a656ca5c 13->23 14->13 35 7ff7a656cb0e-7ff7a656cb25 call 7ff7a6550130 22->35 36 7ff7a656cb2b-7ff7a656cb38 22->36 24 7ff7a656ca5e 23->24 25 7ff7a656cab5 23->25 27 7ff7a656ca60-7ff7a656ca6d 24->27 25->22 29 7ff7a656caa5-7ff7a656cab3 call 7ff7a657d0e0 27->29 30 7ff7a656ca6f-7ff7a656caa0 call 7ff7a65af5b0 27->30 29->25 29->27 30->29 35->36 39 7ff7a656cb3a-7ff7a656cb44 36->39 40 7ff7a656cb57-7ff7a656cb5a 36->40 39->40 42 7ff7a656cb46-7ff7a656cb4e 39->42 43 7ff7a656cb5c 40->43 44 7ff7a656cb63-7ff7a656cb79 call 7ff7a6542c80 40->44 42->40 45 7ff7a656cb50 42->45 43->44 48 7ff7a656cb7b-7ff7a656cb83 44->48 49 7ff7a656cbe6-7ff7a656cc18 call 7ff7a654c0a0 call 7ff7a656a330 call 7ff7a6567e30 call 7ff7a65526e0 44->49 45->40 48->49 51 7ff7a656cb85-7ff7a656cb8c 48->51 62 7ff7a656cc2b-7ff7a656cc37 call 7ff7a65526e0 49->62 63 7ff7a656cc1a-7ff7a656cc21 call 7ff7a65526e0 49->63 51->49 53 7ff7a656cb8e-7ff7a656cb95 51->53 53->49 54 7ff7a656cb97-7ff7a656cba4 53->54 54->49 56 7ff7a656cba6-7ff7a656cbdf 54->56 56->49 68 7ff7a656cc3d-7ff7a656ccbb EnterCriticalSection 62->68 69 7ff7a656d0c7 call 7ff7a656d130 62->69 63->62 70 7ff7a656cc23-7ff7a656cc26 call 7ff7a6581200 63->70 71 7ff7a656ccbd-7ff7a656ccc4 68->71 72 7ff7a656cd1e-7ff7a656cd25 LeaveCriticalSection 68->72 77 7ff7a656d0cc-7ff7a656d0f6 GetTickCount64 69->77 70->62 71->72 76 7ff7a656ccc6-7ff7a656ccda call 7ff7a654bc10 71->76 75 7ff7a656cd2a-7ff7a656cd4c 72->75 78 7ff7a656cf66-7ff7a656cf77 75->78 79 7ff7a656cd52-7ff7a656cd59 75->79 82 7ff7a656ccdf-7ff7a656ccea 76->82 77->7 83 7ff7a656cf7d-7ff7a656cf8c 78->83 81 7ff7a656cd60-7ff7a656cd66 79->81 85 7ff7a656cd6c-7ff7a656cd76 81->85 86 7ff7a656ce59-7ff7a656ce63 81->86 82->72 87 7ff7a656ccec-7ff7a656cd01 LeaveCriticalSection 82->87 83->69 84 7ff7a656cf92-7ff7a656cf99 83->84 88 7ff7a656cfa0-7ff7a656cff0 84->88 89 7ff7a656cd99-7ff7a656cd9c 85->89 90 7ff7a656cd78 85->90 86->81 92 7ff7a656ce69-7ff7a656cee5 call 7ff7a654c570 86->92 87->75 91 7ff7a656cd03-7ff7a656cd0c 87->91 88->88 93 7ff7a656cff2-7ff7a656d02f 88->93 89->86 95 7ff7a656cda2-7ff7a656cda8 89->95 94 7ff7a656cd80-7ff7a656cd87 90->94 91->75 96 7ff7a656cd0e-7ff7a656cd1c call 7ff7a654bf70 91->96 104 7ff7a656cf0d-7ff7a656cf17 92->104 105 7ff7a656cee7-7ff7a656ceea 92->105 93->77 99 7ff7a656d035-7ff7a656d0c5 call 7ff7a656d130 call 7ff7a6569980 93->99 94->86 100 7ff7a656cd8d-7ff7a656cd97 94->100 101 7ff7a656cdae-7ff7a656cdb5 95->101 102 7ff7a656ce4c-7ff7a656ce53 95->102 96->75 99->77 100->89 100->94 107 7ff7a656cdb7-7ff7a656cdc8 101->107 108 7ff7a656ce1f-7ff7a656ce31 call 7ff7a6564020 101->108 102->86 102->95 111 7ff7a656cf19-7ff7a656cf24 104->111 112 7ff7a656cf26-7ff7a656cf51 call 7ff7a6570950 call 7ff7a656a330 104->112 110 7ff7a656cef1-7ff7a656cef4 105->110 115 7ff7a656cdca-7ff7a656cdd1 107->115 116 7ff7a656cdf3 107->116 108->78 129 7ff7a656ce37-7ff7a656ce3d 108->129 110->104 118 7ff7a656cef6-7ff7a656cf0b 110->118 119 7ff7a656cf56-7ff7a656cf5d 111->119 112->119 123 7ff7a656cdee-7ff7a656cdf1 115->123 124 7ff7a656cdd3-7ff7a656cde1 call 7ff7a6564020 115->124 117 7ff7a656cdf6-7ff7a656ce0f call 7ff7a6564020 116->117 117->78 138 7ff7a656ce15-7ff7a656ce1d 117->138 118->104 118->110 119->83 130 7ff7a656cf5f-7ff7a656cf64 call 7ff7a6569980 119->130 123->116 123->117 124->78 140 7ff7a656cde7-7ff7a656cdec 124->140 134 7ff7a656ce44-7ff7a656ce48 129->134 135 7ff7a656ce3f 129->135 130->83 134->102 135->134 138->102 140->102
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID: .NET BGC$BEGIN$condemned generation num: %d$m$qX
                          • API String ID: 0-2393834873
                          • Opcode ID: b4573e5521eb2daec4fdc1dac7b857241a61d624bfb449cc36c2373dcde47909
                          • Instruction ID: 9d39a660b458abf3cb8a7796db7d216b375af5405b53b7ba18796edd704ca883
                          • Opcode Fuzzy Hash: b4573e5521eb2daec4fdc1dac7b857241a61d624bfb449cc36c2373dcde47909
                          • Instruction Fuzzy Hash: BA225B65D0AA8285F711AF29EC402B6F3A2FF55F44F8A6235DA4C52671DF3CB481CB21

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: GlobalMemoryStatus$Process$CurrentInformationObjectQuery
                          • String ID: @$@$@
                          • API String ID: 2645093340-1177533131
                          • Opcode ID: 5dd9200fce8176dff0c68b0307820b989f4da3af5f934f64af2f0f02580b9126
                          • Instruction ID: 77df304877a4287c21e196e8b6dd5fe5b9f7753cafb1be53ce281d02405a6329
                          • Opcode Fuzzy Hash: 5dd9200fce8176dff0c68b0307820b989f4da3af5f934f64af2f0f02580b9126
                          • Instruction Fuzzy Hash: 9B418431B09AC185EB71DF12E9443AAB7A0FB48F90F854235DA9E47BA8CF3CD4458B10

                          Control-flow Graph

                          APIs
                          • FlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,00007FF7A654474F,?,?,?,?,?,?,00007FF7A6541EA0), ref: 00007FF7A654B82B
                            • Part of subcall function 00007FF7A6551460: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A655146F
                            • Part of subcall function 00007FF7A6551460: GetNumaHighestNodeNumber.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A65514AD
                            • Part of subcall function 00007FF7A6551460: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A65514D9
                            • Part of subcall function 00007FF7A6551460: GetProcessGroupAffinity.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A65514EA
                            • Part of subcall function 00007FF7A6551460: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A654B84A), ref: 00007FF7A65514F9
                          • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,00007FF7A654474F,?,?,?,?,?,?,00007FF7A6541EA0), ref: 00007FF7A654B89D
                          • GetProcessAffinityMask.KERNEL32 ref: 00007FF7A654B8B0
                          • QueryInformationJobObject.KERNEL32 ref: 00007FF7A654B8FE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Process$AffinityCurrent$AllocErrorGroupHighestInfoInformationLastMaskNodeNumaNumberObjectQuerySystem
                          • String ID: PROCESSOR_COUNT
                          • API String ID: 1701933505-4048346908
                          • Opcode ID: 1798012f5346184bb27c1ec9873b0fd67c426a3d4d250c8375ff5738cd3cdd6f
                          • Instruction ID: 1af0affd52b8248e8cdd1d825ed49296660d909672b1be95e2e18b593d6a0e43
                          • Opcode Fuzzy Hash: 1798012f5346184bb27c1ec9873b0fd67c426a3d4d250c8375ff5738cd3cdd6f
                          • Instruction Fuzzy Hash: 1E319371A0AA4382EB54BB51DC883BFE7A2EF44B84FD61071D64E436B5DE2DE509C720

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00007FF7A654B820: FlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,00007FF7A654474F,?,?,?,?,?,?,00007FF7A6541EA0), ref: 00007FF7A654B82B
                            • Part of subcall function 00007FF7A654B820: QueryInformationJobObject.KERNEL32 ref: 00007FF7A654B8FE
                            • Part of subcall function 00007FF7A654B6C0: GetModuleHandleExW.KERNEL32(?,?,?,?,00007FF7A6544778,?,?,?,?,?,?,00007FF7A6541EA0), ref: 00007FF7A654B6D1
                          • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00007FF7A6541EA0), ref: 00007FF7A65448BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: AllocExceptionFailFastHandleInformationModuleObjectQueryRaise
                          • String ID: The required instruction sets are not supported by the current CPU.$StressLogLevel$TotalStressLogSize
                          • API String ID: 3403879507-2841289747
                          • Opcode ID: 82d5e33e1a75b53c9fbb5bab012175d66cbb518565e50815a25de26a1c9dfd7f
                          • Instruction ID: 66eb770c760e1c4eb9c5ebebc8660d175fe0334e632f07166af0226b8a4a7caa
                          • Opcode Fuzzy Hash: 82d5e33e1a75b53c9fbb5bab012175d66cbb518565e50815a25de26a1c9dfd7f
                          • Instruction Fuzzy Hash: 3F415D32E0A64285E601BB61EC062BBA392EF51F44FE650B1E94E176F6CE2CE405C760

                          Control-flow Graph

                          APIs
                          Strings
                          • Fatal error. Invalid Program: attempted to call a UnmanagedCallersOnly method from managed code., xrefs: 00007FF7A65455E6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: ExceptionFailFastRaise$Sleep
                          • String ID: Fatal error. Invalid Program: attempted to call a UnmanagedCallersOnly method from managed code.
                          • API String ID: 3706814929-926682358
                          • Opcode ID: ac0d77211ca4eaf3dba703a6dcfce26e9bb0a2d5ca19c56c45e61c24b7b6bea8
                          • Instruction ID: 24be6a503540523dd4488b481e2957fe63db61c216683eeb9381caeefbe95a8f
                          • Opcode Fuzzy Hash: ac0d77211ca4eaf3dba703a6dcfce26e9bb0a2d5ca19c56c45e61c24b7b6bea8
                          • Instruction Fuzzy Hash: 6E414F3291AA4282EB91AB1AEC443BBB3A2EB54F84F955035DA4D423B0DF3DE455C760

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Thread$CloseCreateHandlePriorityResume
                          • String ID:
                          • API String ID: 3633986771-0
                          • Opcode ID: 2473f1295a42763cfd341b8cfd7a40992b87c44e5d7ed509368ee88b1d319611
                          • Instruction ID: e5d8b8d9340fd522597d8e3b676f94a44640137fa76f0efbb5bb87b7565c1d0d
                          • Opcode Fuzzy Hash: 2473f1295a42763cfd341b8cfd7a40992b87c44e5d7ed509368ee88b1d319611
                          • Instruction Fuzzy Hash: 2BE09BA5E1670242FB14AB22BC1A336A752FF99F95F8D5034CD5E47374EF3C91858A10

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 578 7ff7a6550e30-7ff7a6550e61 579 7ff7a6550e67-7ff7a6550e82 GetCurrentProcess call 7ff7a65aa95e 578->579 580 7ff7a6550f1f-7ff7a6550f3c GlobalMemoryStatusEx 578->580 579->580 591 7ff7a6550e88-7ff7a6550e90 579->591 582 7ff7a6550fc2-7ff7a6550fc5 580->582 583 7ff7a6550f42-7ff7a6550f45 580->583 587 7ff7a6550fce-7ff7a6550fd1 582->587 588 7ff7a6550fc7-7ff7a6550fcb 582->588 585 7ff7a6550f47-7ff7a6550f52 583->585 586 7ff7a6550fb1-7ff7a6550fb4 583->586 592 7ff7a6550f5b-7ff7a6550f6c 585->592 593 7ff7a6550f54-7ff7a6550f59 585->593 594 7ff7a6550fb9-7ff7a6550fbc 586->594 595 7ff7a6550fb6 586->595 589 7ff7a6550fdb-7ff7a6550fde 587->589 590 7ff7a6550fd3-7ff7a6550fd8 587->590 588->587 596 7ff7a6550fe8-7ff7a655100b call 7ff7a65aacf0 589->596 597 7ff7a6550fe0 589->597 590->589 598 7ff7a6550efa-7ff7a6550eff 591->598 599 7ff7a6550e92-7ff7a6550e98 591->599 600 7ff7a6550f70-7ff7a6550f81 592->600 593->600 594->596 601 7ff7a6550fbe-7ff7a6550fc0 594->601 595->594 602 7ff7a6550fe5 597->602 608 7ff7a6550f11-7ff7a6550f14 598->608 609 7ff7a6550f01-7ff7a6550f04 598->609 603 7ff7a6550e9a-7ff7a6550e9f 599->603 604 7ff7a6550ea1-7ff7a6550eb5 599->604 606 7ff7a6550f8a-7ff7a6550f9e 600->606 607 7ff7a6550f83-7ff7a6550f88 600->607 601->602 602->596 610 7ff7a6550eb9-7ff7a6550eca 603->610 604->610 612 7ff7a6550fa2-7ff7a6550fae 606->612 607->612 608->596 615 7ff7a6550f1a 608->615 613 7ff7a6550f0b-7ff7a6550f0e 609->613 614 7ff7a6550f06-7ff7a6550f09 609->614 616 7ff7a6550ecc-7ff7a6550ed1 610->616 617 7ff7a6550ed3-7ff7a6550ee7 610->617 612->586 613->608 614->608 615->602 618 7ff7a6550eeb-7ff7a6550ef7 616->618 617->618 618->598
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CurrentGlobalMemoryProcessStatus
                          • String ID: @
                          • API String ID: 3261791682-2766056989
                          • Opcode ID: c50f9f1349a2f10861f7ecfcf3d9fa8d7e1c5a7709ec8babca00959837fe57fa
                          • Instruction ID: 59ebc3378630a93672c3ed7f92a0ebe2de0ce3a444823f659aec1e4786e1b5bf
                          • Opcode Fuzzy Hash: c50f9f1349a2f10861f7ecfcf3d9fa8d7e1c5a7709ec8babca00959837fe57fa
                          • Instruction Fuzzy Hash: BC410A21B0AB4641E956DB36D91533AD2D2AF55FC0F59C231FD1E22768FF3CE4818A10

                          Control-flow Graph

                          APIs
                          • EnterCriticalSection.KERNEL32(?,00000000,00000001,00007FF7A656F9D9,?,?,?,?,?,00007FF7A657E9FF,?,?,?,00007FF7A65588C3), ref: 00007FF7A6582360
                          • LeaveCriticalSection.KERNEL32(?,00000000,00000001,00007FF7A656F9D9,?,?,?,?,?,00007FF7A657E9FF,?,?,?,00007FF7A65588C3), ref: 00007FF7A65823D6
                          • EnterCriticalSection.KERNEL32(?,00000000,00000001,00007FF7A656F9D9,?,?,?,?,?,00007FF7A657E9FF,?,?,?,00007FF7A65588C3), ref: 00007FF7A658242B
                          • LeaveCriticalSection.KERNEL32(?,00000000,00000001,00007FF7A656F9D9,?,?,?,?,?,00007FF7A657E9FF,?,?,?,00007FF7A65588C3), ref: 00007FF7A6582451
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: 2f26acfbe39efda905e31c116d58f05a84f1c8e613b3a673d8beab4140165067
                          • Instruction ID: 84c6d14c6aa1262e1ad00db342309d26d77ef372ac8b36914774e791b996e8f0
                          • Opcode Fuzzy Hash: 2f26acfbe39efda905e31c116d58f05a84f1c8e613b3a673d8beab4140165067
                          • Instruction Fuzzy Hash: 21314F21D0EA1281EA20BF05EC50377BA51AF64F41FD65036E98D46AB1DE7CE98197B0

                          Control-flow Graph

                          APIs
                          • VirtualAlloc.KERNELBASE(?,?,?,?,00000000,00007FF7A65551C8,?,?,0000000A,00007FF7A6554220,?,?,00000000,00007FF7A654DBB1), ref: 00007FF7A6551707
                          • GetCurrentProcess.KERNEL32(?,?,?,?,00000000,00007FF7A65551C8,?,?,0000000A,00007FF7A6554220,?,?,00000000,00007FF7A654DBB1), ref: 00007FF7A6551727
                          • VirtualAllocExNuma.KERNEL32 ref: 00007FF7A6551748
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: AllocVirtual$CurrentNumaProcess
                          • String ID:
                          • API String ID: 647533253-0
                          • Opcode ID: 50d61e69d9914c3b35ffaae00cb017ff4e997f9ad39ea175855d1aa7930a3df2
                          • Instruction ID: a934821a35e4c27d51d93b4d1550bfffb56467237c574ddf22b27528b5b4c77d
                          • Opcode Fuzzy Hash: 50d61e69d9914c3b35ffaae00cb017ff4e997f9ad39ea175855d1aa7930a3df2
                          • Instruction Fuzzy Hash: 53F0AF71B086D182EB209B06F80522AAB61EB49FD4F894138EF8C17B6CCF3DD5818B10

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Count64Tick
                          • String ID:
                          • API String ID: 1927824332-0
                          • Opcode ID: 31575397fae93a463ead22a751a09a553ed39c8a533930d3ab52363c48fe06c9
                          • Instruction ID: d0a612946ae1563742ab621a6229a5b0d4416ca38e280138af276af050232d2e
                          • Opcode Fuzzy Hash: 31575397fae93a463ead22a751a09a553ed39c8a533930d3ab52363c48fe06c9
                          • Instruction Fuzzy Hash: AA416421E0BB4285EB65BB15DE4827BE291EF00F84F975432E94D036B9CE3DF4418A30

                          Control-flow Graph

                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7A65AAC51,?,?,?,?,00007FF7A654FCD1,?,?,?,00007FF7A6550254,00000000,00000020,?), ref: 00007FF7A65AB62A
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7A65AB640
                            • Part of subcall function 00007FF7A65AB924: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF7A65AB92D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_taskmallocstd::bad_alloc::bad_alloc
                          • String ID:
                          • API String ID: 205171174-0
                          • Opcode ID: a8f8c83a7ed87ce2d3b6738c234a410da243a5fab35cdf610d6bdacd798f5f2b
                          • Instruction ID: df8a85ef731fbe75ce09989eb93aef0998a837cd64cfb4eabb670a99b4ef009d
                          • Opcode Fuzzy Hash: a8f8c83a7ed87ce2d3b6738c234a410da243a5fab35cdf610d6bdacd798f5f2b
                          • Instruction Fuzzy Hash: 8DE0EC80E0B10705FD5931629E6E0B781804F78F70EDE1B30DA3E063E2ED1DE45681B0

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CloseCreateHandleThread
                          • String ID:
                          • API String ID: 3032276028-0
                          • Opcode ID: afbd848b2ecd7790fe80cbff50474ccea25c37df90b3e86a6a037c059f69191f
                          • Instruction ID: 419b1d51639fe6e8acf9bb945131049bd892dca3943dee9beb423968ce150a57
                          • Opcode Fuzzy Hash: afbd848b2ecd7790fe80cbff50474ccea25c37df90b3e86a6a037c059f69191f
                          • Instruction Fuzzy Hash: DCD012A5E0A74182DA14EB616C051266BD2BF9CF44FD54038D94DC3334FE3C92158910
                          APIs
                            • Part of subcall function 00007FF7A6582480: EnterCriticalSection.KERNEL32(?,?,?,00007FF7A6567A69), ref: 00007FF7A65824C4
                            • Part of subcall function 00007FF7A6582480: LeaveCriticalSection.KERNEL32(?,?,?,00007FF7A6567A69), ref: 00007FF7A65824EE
                          • EnterCriticalSection.KERNEL32 ref: 00007FF7A6567B43
                          • LeaveCriticalSection.KERNEL32 ref: 00007FF7A6567B64
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: f2b6e7524cfd3a7049b78d530cb028a5667da698e63c4b036217a325343ed2f5
                          • Instruction ID: b708f55047e0f51c36e30584866ba02cbbe157ab2ea0d7daa4adf57a81cb3e87
                          • Opcode Fuzzy Hash: f2b6e7524cfd3a7049b78d530cb028a5667da698e63c4b036217a325343ed2f5
                          • Instruction Fuzzy Hash: 5341D061A1AA4241EB11AB25DD40276A3A2EF05FF4F9A5335D97C476F8DF2CE081C760
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 54d16fb7520780bd85eec3c4bf88bb714ed96ad8374a8c3859c77b8b9086a31d
                          • Instruction ID: f977d7fafe71108959f752b246369e64a737be4f95985bc44fd9ee746f911fe2
                          • Opcode Fuzzy Hash: 54d16fb7520780bd85eec3c4bf88bb714ed96ad8374a8c3859c77b8b9086a31d
                          • Instruction Fuzzy Hash: BA31E432A06B5181EA14EB16D80416BA3E4FB45FD0F858135EF5C17BA8DF38E5628350
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: 2bbfaa70841822840f390fb10a6491ea87be68f299496f59d245e6c0d776f768
                          • Instruction ID: d81c02f626e91abf1bf4447aa73e4ec75fab54ece4058a3df7c0d4223ab6c2b3
                          • Opcode Fuzzy Hash: 2bbfaa70841822840f390fb10a6491ea87be68f299496f59d245e6c0d776f768
                          • Instruction Fuzzy Hash: 6B018031D0EA5250F720BB14FC842BBBB91AB90FA0FD75031E49D429B58E2CE881D7B0
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Virtual$AllocFree
                          • String ID:
                          • API String ID: 2087232378-0
                          • Opcode ID: c142b665c17b9829f30997f3f45fa6cc62ef321f650404eeabfbf3fa27cb0e2d
                          • Instruction ID: 3a01d7faead93546314c0bc9644514ea056c071c3fe1ed2933ba028d67bf7a94
                          • Opcode Fuzzy Hash: c142b665c17b9829f30997f3f45fa6cc62ef321f650404eeabfbf3fa27cb0e2d
                          • Instruction Fuzzy Hash: 39E0C234F1761186EB28A713AC466266653BF4AF00FC5D038C40E47374DE2DA51B8F20
                          APIs
                          • CoInitializeEx.OLE32(?,?,?,?,00000030,?,?,?,?,?,?,?,00007FF7A65E27CF,?,?,00000030), ref: 00007FF7A65E28E2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Initialize
                          • String ID:
                          • API String ID: 2538663250-0
                          • Opcode ID: 803ee097a5861c941b8cfd7976f9223188b032406d6128dfb8400f5b6217b5c5
                          • Instruction ID: 5fbcfbbb7120204652fd0591317dffce2220251f5f83179ee5377e5d3fcc9f59
                          • Opcode Fuzzy Hash: 803ee097a5861c941b8cfd7976f9223188b032406d6128dfb8400f5b6217b5c5
                          • Instruction Fuzzy Hash: E8219D16F4E20294FB14F662DC515FFA2906F54F54FA65035EE0D566ABDE3CE4828320
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakDebug
                          • String ID:
                          • API String ID: 456121617-0
                          • Opcode ID: 3b1958921fa04c35c2a701cc9646c22b7e924147385864a8d091c62de11b65c9
                          • Instruction ID: a226b890460ced27cb27d94c1114989007415d061d4b2f910dd74c07e38541eb
                          • Opcode Fuzzy Hash: 3b1958921fa04c35c2a701cc9646c22b7e924147385864a8d091c62de11b65c9
                          • Instruction Fuzzy Hash: 5E110563F1974182E6419A21D8046B69390EB89BB0F9A1331FEBC437DAEF2CE4428750
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CurrentExceptionFailFastQueryRaiseThreadVirtual
                          • String ID:
                          • API String ID: 2131581837-0
                          • Opcode ID: d896b62f651088d1b42081c4ab7746b0ce5873f34015609dc32dcd43e3b187cf
                          • Instruction ID: 3dca281b3dfd69ccf82c745be8640e2c0b42e6790dc914e80e5f4b9522aca3d0
                          • Opcode Fuzzy Hash: d896b62f651088d1b42081c4ab7746b0ce5873f34015609dc32dcd43e3b187cf
                          • Instruction Fuzzy Hash: 6C111F7250978242D624AF25F80919BF361FB45BB0F544335E6BE077E6DF38D1468700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Event
                          • String ID:
                          • API String ID: 4201588131-0
                          • Opcode ID: e76a9a7bbbb96f3115f810c60743dc72ad2f91abc5fa222d7a1e73d8144a1f29
                          • Instruction ID: 052d86b2853f8dcc28b43fc4b607e1517f49cbbe87273fcf8b502a48931cf755
                          • Opcode Fuzzy Hash: e76a9a7bbbb96f3115f810c60743dc72ad2f91abc5fa222d7a1e73d8144a1f29
                          • Instruction Fuzzy Hash: BAF08225F1AA8242E6007B21FE862BF93529F49FA0F965130EA1D077A7CE3CD0818B50
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b2df50b22f88e90d383fbc999c0b4c68a7662b2a9291df2bb10142457fbc865c
                          • Instruction ID: 4295f8570ee75b5c3f77d98b2afad051f12f4146aa3280cfffea63ac8adf9047
                          • Opcode Fuzzy Hash: b2df50b22f88e90d383fbc999c0b4c68a7662b2a9291df2bb10142457fbc865c
                          • Instruction Fuzzy Hash: 3861B321F0A20249EB14FB66EC516FBA3626F94B84FD64035DE0D57BAADE3CD442C720
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: FreeVirtual
                          • String ID:
                          • API String ID: 1263568516-0
                          • Opcode ID: e0e6f915b3e62b249a019bbc0d8d3fcc09be6c9d174bfcd050118d8529439d8d
                          • Instruction ID: 5b23663ace4b5cbc679018fb1407349c00f0be1591b8a3766dedc53672727489
                          • Opcode Fuzzy Hash: e0e6f915b3e62b249a019bbc0d8d3fcc09be6c9d174bfcd050118d8529439d8d
                          • Instruction Fuzzy Hash: F4B01200F17441C2E3043723BC4330901167B06F02FC15064D608E1264CD1C85A50F10
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID: BGCFLEnableFF$BGCFLEnableKd$BGCFLEnableKi$BGCFLEnableSmooth$BGCFLEnableTBH$BGCFLGradualD$BGCFLSmoothFactor$BGCFLSweepGoal$BGCFLSweepGoalLOH$BGCFLTuningEnabled$BGCFLff$BGCFLkd$BGCFLki$BGCFLkp$BGCG2RatioStep$BGCMLki$BGCMLkp$BGCMemGoal$BGCMemGoalSlack$BGCSpin$BGCSpinCount$BreakOnOOM$CompactRatio$ConcurrentGC$ConfigLogEnabled$ConfigLogFile$ConservativeGC$ForceCompact$GCConfigLogFile$GCConserveMem$GCCpuGroup$GCDynamicAdaptationMode$GCEnableSpecialRegions$GCEnabledInstructionSets$GCGen0MaxBudget$GCGen1MaxBudget$GCHeapAffinitizeMask$GCHeapAffinitizeRanges$GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent$GCHighMemPercent$GCLargePages$GCLogFile$GCLowSkipRatio$GCName$GCNumaAware$GCProvModeStress$GCRegionRange$GCRegionSize$GCSpinCountUnit$GCTotalPhysicalMemory$Gen0Size$HeapCount$HeapVerifyLevel$LOHCompactionMode$LOHThreshold$LatencyLevel$LatencyMode$LogEnabled$LogFile$LogFileSize$MaxHeapCount$NoAffinitize$RetainVM$SegmentSize$ServerGC$System.GC.Concurrent$System.GC.ConserveMemory$System.GC.CpuGroup$System.GC.DynamicAdaptationMode$System.GC.HeapAffinitizeMask$System.GC.HeapAffinitizeRanges$System.GC.HeapCount$System.GC.HeapHardLimit$System.GC.HeapHardLimitLOH$System.GC.HeapHardLimitLOHPercent$System.GC.HeapHardLimitPOH$System.GC.HeapHardLimitPOHPercent$System.GC.HeapHardLimitPercent$System.GC.HeapHardLimitSOH$System.GC.HeapHardLimitSOHPercent$System.GC.HighMemoryPercent$System.GC.LargePages$System.GC.MaxHeapCount$System.GC.Name$System.GC.NoAffinitize$System.GC.RetainVM$System.GC.Server
                          • API String ID: 0-799405152
                          • Opcode ID: 1ebbd9bada395e0ae796c2d8dd3961aa3f840e2442c0f16195dfd22ce20a116f
                          • Instruction ID: 825cd39bec586149b13578a0fac4cfbf033657d283437e489071a2f630576807
                          • Opcode Fuzzy Hash: 1ebbd9bada395e0ae796c2d8dd3961aa3f840e2442c0f16195dfd22ce20a116f
                          • Instruction Fuzzy Hash: 6D424F75609A9641EB60AB55FC10AAAE766FF55FC8FC26132D98C07B34DF3CD2018B14
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: strcmp
                          • String ID: BGCFLEnableFF$BGCFLEnableKd$BGCFLEnableKi$BGCFLEnableSmooth$BGCFLEnableTBH$BGCFLGradualD$BGCFLSmoothFactor$BGCFLSweepGoal$BGCFLSweepGoalLOH$BGCFLTuningEnabled$BGCFLff$BGCFLkd$BGCFLki$BGCFLkp$BGCG2RatioStep$BGCMLki$BGCMLkp$BGCMemGoal$BGCMemGoalSlack$BGCSpin$BGCSpinCount$GCBreakOnOOM$GCCompactRatio$GCConfigLogEnabled$GCConserveMemory$GCCpuGroup$GCDynamicAdaptationMode$GCEnableSpecialRegions$GCEnabledInstructionSets$GCGen0MaxBudget$GCGen1MaxBudget$GCHeapAffinitizeMask$GCHeapCount$GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent$GCHighMemPercent$GCLOHCompact$GCLOHThreshold$GCLargePages$GCLatencyLevel$GCLatencyMode$GCLogEnabled$GCLogFileSize$GCLowSkipRatio$GCMaxHeapCount$GCNoAffinitize$GCNumaAware$GCProvModeStress$GCRegionRange$GCRegionSize$GCRetainVM$GCSegmentSize$GCSpinCountUnit$GCTotalPhysicalMemory$GCWriteBarrier$GCgen0size$HeapVerify$System.GC.Concurrent$System.GC.ConserveMemory$System.GC.CpuGroup$System.GC.DynamicAdaptationMode$System.GC.HeapAffinitizeMask$System.GC.HeapCount$System.GC.HeapHardLimit$System.GC.HeapHardLimitLOH$System.GC.HeapHardLimitLOHPercent$System.GC.HeapHardLimitPOH$System.GC.HeapHardLimitPOHPercent$System.GC.HeapHardLimitPercent$System.GC.HeapHardLimitSOH$System.GC.HeapHardLimitSOHPercent$System.GC.HighMemoryPercent$System.GC.LargePages$System.GC.MaxHeapCount$System.GC.NoAffinitize$System.GC.RetainVM$System.GC.Server$gcConcurrent$gcConservative$gcForceCompact$gcServer
                          • API String ID: 1004003707-1294421646
                          • Opcode ID: 8dd0dd815cfb6f9141113c6627f02b0dffcd85473cd5b48b1167f53c38f69273
                          • Instruction ID: bf3fb726c49d9202fbdbd71e179c306daf34a7364be6d6e360a3a5a021bfaa0f
                          • Opcode Fuzzy Hash: 8dd0dd815cfb6f9141113c6627f02b0dffcd85473cd5b48b1167f53c38f69273
                          • Instruction Fuzzy Hash: 6162C764D1BF4794EB90FB56AC440B3EB62AF55B44BCA607AC04D47272EE3CE1198B70
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakDebug
                          • String ID:
                          • API String ID: 456121617-0
                          • Opcode ID: f3eca593082eef418b28c3d3d3ba6008102fd1d88324591edaa9422849b7c77f
                          • Instruction ID: 93da1530bca784306a3f98a5ad44335bf3e8006427fad4cfd438010abf5e4406
                          • Opcode Fuzzy Hash: f3eca593082eef418b28c3d3d3ba6008102fd1d88324591edaa9422849b7c77f
                          • Instruction Fuzzy Hash: 0072B022E0AA4342EB60AB15D8403BAE7A1FF45F95F8A5135CE5D07BB5DF2CE440D7A0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Process$AllocCurrentTokenVirtual$AdjustCloseErrorHandleLargeLastLookupMinimumNumaOpenPagePrivilegePrivilegesValue
                          • String ID: SeLockMemoryPrivilege
                          • API String ID: 1752251271-475654710
                          • Opcode ID: a64ce78d6ed104d2b6db937a96794cdf395e2d8bd2e23d037bc090c5da09f6ca
                          • Instruction ID: b5e3097f3126458713a5c4c7b0f4fe5de796796ce905d1acad10d24a001d609c
                          • Opcode Fuzzy Hash: a64ce78d6ed104d2b6db937a96794cdf395e2d8bd2e23d037bc090c5da09f6ca
                          • Instruction Fuzzy Hash: DF31B831A1EB4285F760AB61FC0937BABA2EF44F84F815035E94E07768DE3CD4488B60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: SwitchThread$BreakCounterDebugPerformanceQuery
                          • String ID: GCHeap::Promote: Promote GC Root *%p = %p MT = %pT$Concurrent GC: Restarting EE
                          • API String ID: 30421299-2108734148
                          • Opcode ID: 6615c7b4db84cdefcc6dfb6fb544c900babefb5ec8c8e420ffc49294f2f83981
                          • Instruction ID: dd33ff57edf0f996ba91611891e4b20cff0e039d2e3b9607678b27d304f794b8
                          • Opcode Fuzzy Hash: 6615c7b4db84cdefcc6dfb6fb544c900babefb5ec8c8e420ffc49294f2f83981
                          • Instruction Fuzzy Hash: 57C2D061A0BB4281FB51AB65ED48377A3A2AF44F84F9A5235E94D037B5DF3CE441CB20
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: SwitchThread$BreakDebug
                          • String ID:
                          • API String ID: 223621376-0
                          • Opcode ID: beb2e0b6b3b2c051ba7bb93b1c7d8e203ffb364ae3d9539f13bd58a074cd23d5
                          • Instruction ID: 547d45af7220ee3a76d34ce0a81ca7bdd7a3ac0244c1774fa6c4f80c44c9530a
                          • Opcode Fuzzy Hash: beb2e0b6b3b2c051ba7bb93b1c7d8e203ffb364ae3d9539f13bd58a074cd23d5
                          • Instruction Fuzzy Hash: 23B29C35E0AA4285EB60AB29DC40376E7A2AF45F94F9A1235D95D437B0DF3CE840C721
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakDebug$CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3888577265-0
                          • Opcode ID: d86f80d7bffd3d43e5ca74b6d9e1eaf02e16cc952f2289a23396a127ac85969b
                          • Instruction ID: bcfc75f624905953eb768d85000a49230a1a3db486b776ba29dd9259493c7e76
                          • Opcode Fuzzy Hash: d86f80d7bffd3d43e5ca74b6d9e1eaf02e16cc952f2289a23396a127ac85969b
                          • Instruction Fuzzy Hash: BC129C22A1BB4681EB50EB91E84037BE3A1BF84F84F965935D94D037B5DF3CE540CA20
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakDebug$CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3888577265-0
                          • Opcode ID: c44e6f749cf51194d18055909887b503eb6a2aff37391a8996bb50217290c366
                          • Instruction ID: acd858f7ce8484a9e4bf3aa46e826682b449a405cbcd4f46bfeb8f77daaabeb9
                          • Opcode Fuzzy Hash: c44e6f749cf51194d18055909887b503eb6a2aff37391a8996bb50217290c366
                          • Instruction Fuzzy Hash: 5F02AF72A0AB8286EB51AF25D84027AB7A1FF44F84F865535CA4D037B1DF3CE591CB20
                          APIs
                          • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF7A65473A0), ref: 00007FF7A6546B07
                          • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF7A65473A0), ref: 00007FF7A6546C51
                          • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF7A65473A0), ref: 00007FF7A6546D33
                          • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF7A65473A0), ref: 00007FF7A6546D49
                          • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF7A65473A0), ref: 00007FF7A6546DBE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: ExceptionFailFastRaise
                          • String ID: [ KeepUnwinding ]
                          • API String ID: 2546344036-400895726
                          • Opcode ID: 37b542edfd6e6a04d6d6af4a5e84d7cb03416debfb2b6644f32ce5e3f49ff12d
                          • Instruction ID: d0f54a9fc08243989b430b6d23d7fdea35ba7077012cbcb59736ff3274a9a7df
                          • Opcode Fuzzy Hash: 37b542edfd6e6a04d6d6af4a5e84d7cb03416debfb2b6644f32ce5e3f49ff12d
                          • Instruction Fuzzy Hash: 04B1843260AB4285EB949F25D8493AA73A6FF44F48FA94176CE4D073A8CF39E455C320
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 41e4741397a1d2276859ccb546066f9b7c88a4a65b19eb4148268b3bcac57992
                          • Instruction ID: 4b6ac3c1f31112f5bc7a2f84ebc1d202effc4f0e4df83fa6cd849d31664bcc2b
                          • Opcode Fuzzy Hash: 41e4741397a1d2276859ccb546066f9b7c88a4a65b19eb4148268b3bcac57992
                          • Instruction Fuzzy Hash: 79119A22B15F018AEB00DF61EC552B973A4FB19B18F811E31EEAD827A8DF38D1548750
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: SwitchThread
                          • String ID:
                          • API String ID: 115865932-0
                          • Opcode ID: ddf5a7c59728b91961856a1f3de8d77b860fc2794b24d806c874d2325e124f05
                          • Instruction ID: bdf643a40eaf903aaed4867f5bfa9de2e1e519aae281a301c86777fbd9fad69f
                          • Opcode Fuzzy Hash: ddf5a7c59728b91961856a1f3de8d77b860fc2794b24d806c874d2325e124f05
                          • Instruction Fuzzy Hash: 45D1B332A0AA8585DB60AB15D84077BF3A1FB84F94F864A31DA9D437A4DF7CE540CF20
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakDebug
                          • String ID:
                          • API String ID: 456121617-0
                          • Opcode ID: 24780f21546bd015505d40b07dff922e5db3dc92a0b137180c1451863a2d226f
                          • Instruction ID: 76333c5e4ddf967de9d162f8d3083d0c73062f02e68d8115abb451bc2c04b6ad
                          • Opcode Fuzzy Hash: 24780f21546bd015505d40b07dff922e5db3dc92a0b137180c1451863a2d226f
                          • Instruction Fuzzy Hash: B7E1E276A0AB4686EB10AF19DC4427AB7A6FB00F94F9A1235D91D037B4DF3CE491C720
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BuffersFlushProcessWrite
                          • String ID:
                          • API String ID: 2982998374-0
                          • Opcode ID: 79d0f43756a16d64338861bbba21ee80fd32cc7b8ee7bde5ac8cae3f237e486d
                          • Instruction ID: d9281b7f3bb2a388eb460e800d587bc74816bc5c12b912b0ec6ab8eeeadb6b51
                          • Opcode Fuzzy Hash: 79d0f43756a16d64338861bbba21ee80fd32cc7b8ee7bde5ac8cae3f237e486d
                          • Instruction Fuzzy Hash: FB51FC92B067C142EE61AA74E8003BBDA95EB51FC1F9A8131DE5D47FE2DE3CD9449310
                          APIs
                          • GetEnabledXStateFeatures.KERNEL32(?,?,?,?,?,00007FF7A6544896,?,?,?,?,?,?,00007FF7A6541EA0), ref: 00007FF7A6550531
                          • GetEnabledXStateFeatures.KERNEL32(?,?,?,?,?,00007FF7A6544896,?,?,?,?,?,?,00007FF7A6541EA0), ref: 00007FF7A6550590
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: EnabledFeaturesState
                          • String ID:
                          • API String ID: 1557480591-0
                          • Opcode ID: 6a010aaf3d9dfb2ad17c8b6f662b67376a88e00fe7fb95adbc059e65881bfa60
                          • Instruction ID: 4743ff9b7ef7d1944b7990863d5d849b7d4f7e57fd98db529cf5b264710ed307
                          • Opcode Fuzzy Hash: 6a010aaf3d9dfb2ad17c8b6f662b67376a88e00fe7fb95adbc059e65881bfa60
                          • Instruction Fuzzy Hash: 4F51CF32E0A31706FF685499D89D33B82C39BD5B54FC74538E96E532E9CD7ED8824224
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: 6e82094639824c14ab4293de4ec13a988e764ae228435d9a0dabbc53190a5c10
                          • Instruction ID: 3f1aca660ba15cf224bb04a13fdb1835bf788af7c9fadb9b58ad86ec09da1825
                          • Opcode Fuzzy Hash: 6e82094639824c14ab4293de4ec13a988e764ae228435d9a0dabbc53190a5c10
                          • Instruction Fuzzy Hash: 2E62C6B3A16B0587E70C9F29C85976E76A2FB94F88F568136CA1D43798DF38D910C780
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakCounterCreateDebugEventPerformanceQuery
                          • String ID:
                          • API String ID: 4239280443-0
                          • Opcode ID: 5491d3f8da2e797241490e3cda2db23de3b51a53647b4561e21f0ad4d068944b
                          • Instruction ID: 3ea0d635c79f00d5aa84a33ebd0420f9a40cb52ca13976c29a6f6affa115c90f
                          • Opcode Fuzzy Hash: 5491d3f8da2e797241490e3cda2db23de3b51a53647b4561e21f0ad4d068944b
                          • Instruction Fuzzy Hash: 7E422971D0AF8285E700AB25FC94276B3A6FF58B44F926239D98C12775DF3CA190DB60
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Count64Tick
                          • String ID:
                          • API String ID: 1927824332-0
                          • Opcode ID: d7ae4015b6747c4f2a88c3bcd0e3919ab44728c05b91e0697f58cdc10b5d3ecf
                          • Instruction ID: 348ce34b9239d0ff2d255d1d83b854ab73ed6fedb4dfa67df5a07d4c8b908c07
                          • Opcode Fuzzy Hash: d7ae4015b6747c4f2a88c3bcd0e3919ab44728c05b91e0697f58cdc10b5d3ecf
                          • Instruction Fuzzy Hash: FAD1A532E0A64685E715BB21CC446BEA7A2BB40F89F979435DE0D476A1DF3CE841CB60
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID: 0-3916222277
                          • Opcode ID: cd09ef96d8f17e625544f5d09aacbfbf5b704350f56f2afae0a11c1b875b7772
                          • Instruction ID: fa7f08c4b5e261a660f74c7e911161d53f4a3c2d7e09d13fe47b6be873f55847
                          • Opcode Fuzzy Hash: cd09ef96d8f17e625544f5d09aacbfbf5b704350f56f2afae0a11c1b875b7772
                          • Instruction Fuzzy Hash: E242A572A1AE8686EB10AB15EC4067AB761FF14FA0F865635C96D537B0CF3CE550CB20
                          Strings
                          • ========== ENDGC %d (gen = %lu, collect_classes = %lu) ===========}, xrefs: 00007FF7A656A256
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID: ========== ENDGC %d (gen = %lu, collect_classes = %lu) ===========}
                          • API String ID: 0-2256439813
                          • Opcode ID: 7bd6a443cfe3054721747132375e6f82add6f116c3b8a460bf02874ed9b0fa60
                          • Instruction ID: e091d32f280ec2a2bd8d0d3005b0008d1aa577d13ea154987d2b7973e54cff77
                          • Opcode Fuzzy Hash: 7bd6a443cfe3054721747132375e6f82add6f116c3b8a460bf02874ed9b0fa60
                          • Instruction Fuzzy Hash: 12428D31A0AE828AEB15AB19DC5036AB3A2FF45F44F9A5135CA4D03771DF3DE452CB60
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID: ?
                          • API String ID: 0-1684325040
                          • Opcode ID: c36884137a1fbdc5629651c62ab30761a03d17dd0682946ebc7bc0764feb72a2
                          • Instruction ID: cfb5f59533e577ae6fed82037c70f8c913a85b077e38a85db3dbedcfa366e740
                          • Opcode Fuzzy Hash: c36884137a1fbdc5629651c62ab30761a03d17dd0682946ebc7bc0764feb72a2
                          • Instruction Fuzzy Hash: 8F12C632A1AA4282EB10EB16E84877BF365FB45F94F964235EA5D437A8DF3CE441C710
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CounterPerformanceQuery
                          • String ID:
                          • API String ID: 2783962273-3916222277
                          • Opcode ID: 0f497518f3011c90386f56ae0dd19987edc3a4fef3325d72aee3a22fc2e24883
                          • Instruction ID: 56ac9a5464050496293f1123ebfc7633aaaeae0eaa186c76bbeda913d493dc50
                          • Opcode Fuzzy Hash: 0f497518f3011c90386f56ae0dd19987edc3a4fef3325d72aee3a22fc2e24883
                          • Instruction Fuzzy Hash: A7D1E765A0AA4181EB10AB15E85027BF395FB41FA4F998331DA6D137F4EF3CE451C760
                          APIs
                          • GetLocaleInfoEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF7A65D90F0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: 631e051c7e85c708eee405e58e5ac8c33c0e023327227dff62814852cabaa958
                          • Instruction ID: fc2962ee150f8da669bb7324569f999e147f3a590b4569c6ca9028f7f39e12e9
                          • Opcode Fuzzy Hash: 631e051c7e85c708eee405e58e5ac8c33c0e023327227dff62814852cabaa958
                          • Instruction Fuzzy Hash: DD015A33F016609DF720EBA1EC40AEE77B5BB4875CFA1402ADE0CA2A58DF349496C710
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID: HB
                          • API String ID: 0-654769311
                          • Opcode ID: 98840326572346ce62672058949bdb619bd28472bb45fe13b568a26b56bb2989
                          • Instruction ID: 0061eec9c09b9f00b02498958593c8b30fb1d4b2f1f30077e506ca4b5f992656
                          • Opcode Fuzzy Hash: 98840326572346ce62672058949bdb619bd28472bb45fe13b568a26b56bb2989
                          • Instruction Fuzzy Hash: 55C15B32A0BA8692E760AF14EC482BBA3E1FF45B48F961535E94E47675DF3CE440C720
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3fa54e4b404b83b64a3ef684d3fa7d9e7b579a293c5d3786dac23140140fd01d
                          • Instruction ID: afa0294864241fac21778e50051f6d2543211f9bb39768cf04014e83ade2244d
                          • Opcode Fuzzy Hash: 3fa54e4b404b83b64a3ef684d3fa7d9e7b579a293c5d3786dac23140140fd01d
                          • Instruction Fuzzy Hash: BA8203B2B0978187EB149B15D9853AEB7A2FB84B80F658135DB4E03BA4DF3DE560C740
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c44773253abac8336c1d72ee043a06f130369fffe4656ea49cf70b632554c591
                          • Instruction ID: 9e9fd0ef3a3ad128ae4bfb0f36b023477a2f399601c605e83f5cc288d6f1a5aa
                          • Opcode Fuzzy Hash: c44773253abac8336c1d72ee043a06f130369fffe4656ea49cf70b632554c591
                          • Instruction Fuzzy Hash: 6792FE61A1BA4685EB00AF25EC106B6E392BF45FC4FCA5636D90E537B0DF3CE5418B20
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f1e24ba0ba6bef78217b93cc1824f39f4ffccc09ca148982d560d43c4ab6c4d9
                          • Instruction ID: a7fa61d84ec15558a98bd0550d0e9d89f16b8fc0699535e5298572041fa62122
                          • Opcode Fuzzy Hash: f1e24ba0ba6bef78217b93cc1824f39f4ffccc09ca148982d560d43c4ab6c4d9
                          • Instruction Fuzzy Hash: CA82CF71A0AA4289EB10AF25EC4427AA3A6FF44F84F965636D90D037B0DF3DE551CB70
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f905b1f908e65b5aba95cf85111788d4451240a2511b24a2e32d8eb1b4069d57
                          • Instruction ID: a4a129a40bdbee25e5d6b50c12c5f887fade6911f7c1eef4580d3628df637d92
                          • Opcode Fuzzy Hash: f905b1f908e65b5aba95cf85111788d4451240a2511b24a2e32d8eb1b4069d57
                          • Instruction Fuzzy Hash: 5482EF32B0AB8186EB10AF65E84427AB7A5FB44F98F960535DE4D53BA4CF3CE541CB10
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bf5feb339442a0b79f58c974cad3d97fda4eb93d98ba6868e8e29d5f65b0f64f
                          • Instruction ID: 8a048f1be871237c1db1a25c9da328bf1528524d1a8d2d70e1b72f8fc9cbccd1
                          • Opcode Fuzzy Hash: bf5feb339442a0b79f58c974cad3d97fda4eb93d98ba6868e8e29d5f65b0f64f
                          • Instruction Fuzzy Hash: 2A5283B6A57B9681EE659B18C84437AA7A0FF14FA4F999235CF6C033E0DF6CD490C211
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b492ad88cf215fc62258aba1709844d5f27e408f569c58da072858a9a9ad3981
                          • Instruction ID: 85e00888fa6bee475017d0fda71e00efd4c365aa8ae89fcd336230e6210c388d
                          • Opcode Fuzzy Hash: b492ad88cf215fc62258aba1709844d5f27e408f569c58da072858a9a9ad3981
                          • Instruction Fuzzy Hash: 6342B072B1AB4586EB109F65E84016EB3A1FB44F98F851931DF4E17BA8CE3CE551CB20
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e52f450864030abe068b2e943946e6a8f68a43271c38fbddae6a16a12d04da61
                          • Instruction ID: df891dc529ea8ef274733ffbedc7885b413cb25c14cde2402ef078d373de82b2
                          • Opcode Fuzzy Hash: e52f450864030abe068b2e943946e6a8f68a43271c38fbddae6a16a12d04da61
                          • Instruction Fuzzy Hash: 7242D872F0AB4589EB10DF65D8001BEA3A2FF04F88B854936DE0D277A4DE38E555C760
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 456757d216aacf14f41c1d1ac0cd8049a835610a21c3933073f91090c7e01898
                          • Instruction ID: ba327baf22d90d062d80d5610c6810bad2246dd131b35898bd0cdbfa961d7a49
                          • Opcode Fuzzy Hash: 456757d216aacf14f41c1d1ac0cd8049a835610a21c3933073f91090c7e01898
                          • Instruction Fuzzy Hash: 3142E362B0AA5A86EB50EF08EC4066AB761FB41FD0FC65535DA4D477A8CF3CE544CB10
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 58ab2ea6ff0a684350a52622f01339377179222e3f8cb1db98c70cb3a0ab0f85
                          • Instruction ID: 3efba234c09e8ae78be735f6ca6d9f84231e73bd7f180ee5fb96301aca4be2e1
                          • Opcode Fuzzy Hash: 58ab2ea6ff0a684350a52622f01339377179222e3f8cb1db98c70cb3a0ab0f85
                          • Instruction Fuzzy Hash: BF221422A1AFC549D607AB35E8413B6E395AF56BC4F999332ED4F22771DF2DA042C310
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e10a91a420f83ef269157d36f9a2c016ddaa9393997882352c17c1d84d133b48
                          • Instruction ID: de5e9053e8c60c83e899192ac0263f67f9062f86b34f2ef11ed77f534fbb0800
                          • Opcode Fuzzy Hash: e10a91a420f83ef269157d36f9a2c016ddaa9393997882352c17c1d84d133b48
                          • Instruction Fuzzy Hash: 6002BE72B05A518AEB10EF25D8806AD7371FB98F98F52A122DE5D53B65CF34D8C1CB40
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CounterPerformanceQuery
                          • String ID:
                          • API String ID: 2783962273-0
                          • Opcode ID: af019d92b74d7be67137a52f9c77fda3c993f8b49f31bc8590fea9e3453cb08d
                          • Instruction ID: 036a595636469f2ac81d907f3ee3fbacc932494a7202a0525aa62cc324b92475
                          • Opcode Fuzzy Hash: af019d92b74d7be67137a52f9c77fda3c993f8b49f31bc8590fea9e3453cb08d
                          • Instruction Fuzzy Hash: B40215A2B06A4586EB10AF19E8003BAF7A1FB45FA4F865635D92D477E4DF3CE141CB10
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b68f8225f78dbd7e70b131091e98211d99f4f2d9e2b5582c38477461e06b5bdc
                          • Instruction ID: cdf571808749a8a2ea1430e3d80d3ec38f2e3398f011b45b4e2924cd643411da
                          • Opcode Fuzzy Hash: b68f8225f78dbd7e70b131091e98211d99f4f2d9e2b5582c38477461e06b5bdc
                          • Instruction Fuzzy Hash: 0802E376A16A4586EB50EF19D94467AB3A1EB40FA4F8A5331CA7D437F0CE3CE441C721
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 02ac5e8acc702e800c044c972fee63d3d4d5d63e4fdd02a0179034e1d588b70a
                          • Instruction ID: 9fc1ef909641905e7564d0c737038178ec49c1c46fc69e828bcdc9aca4cfcdd2
                          • Opcode Fuzzy Hash: 02ac5e8acc702e800c044c972fee63d3d4d5d63e4fdd02a0179034e1d588b70a
                          • Instruction Fuzzy Hash: 23F15C21F2AB4D41E916963799013B6D6426F6ABC4E5DDB32E94D32770EF3CB081C721
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CurrentProcess
                          • String ID:
                          • API String ID: 2050909247-0
                          • Opcode ID: bdf8833cee21c139ef57a5bee3b8c50e71db7ac1327d835877ec4aba224b51aa
                          • Instruction ID: 8597065f752853103a7cf6e214d1c52c81f66ee95c9ee5d09ccf908595f3925e
                          • Opcode Fuzzy Hash: bdf8833cee21c139ef57a5bee3b8c50e71db7ac1327d835877ec4aba224b51aa
                          • Instruction Fuzzy Hash: 0202B571E0EA4686F715AB29EC40237E6A3AF55F40F965A36C44D13A70DF3CB681CE20
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 323b4a52389b31af78a198108c136ecd75e8293e50210e2468e6e8b2983b1f89
                          • Instruction ID: d16b431237bc80995460f6acf11dfcfa8cf50a4aeaec2ccfa525c161ccf3a7d9
                          • Opcode Fuzzy Hash: 323b4a52389b31af78a198108c136ecd75e8293e50210e2468e6e8b2983b1f89
                          • Instruction Fuzzy Hash: 54E11872A0A64586EB11AB25EC4867BB7A6FB45F94F964631CD1E037B0CF3CE541CB20
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d78bf327fc7d401db98ee101711161cfb4b90b568116cb42030e1b04918fb35b
                          • Instruction ID: 0c6194331088df0b4cc1c7b064cb87947b4186f057bb501af7f4b6f0f2fc110e
                          • Opcode Fuzzy Hash: d78bf327fc7d401db98ee101711161cfb4b90b568116cb42030e1b04918fb35b
                          • Instruction Fuzzy Hash: 39D1E566B1AB8681EB109F25D84427AA361FB55FA4F8A9331CA6D077E4DF3CE441C311
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b12337283fe58a1ae982f19855bdc68314bb18f96eaedbf97d3c33e1d47e9e1d
                          • Instruction ID: 55bd32d2dccc9aeaf9fbd2700cc83fc4a48a9ff20632d1773a2b99108a665068
                          • Opcode Fuzzy Hash: b12337283fe58a1ae982f19855bdc68314bb18f96eaedbf97d3c33e1d47e9e1d
                          • Instruction Fuzzy Hash: 8FD1DF61A0AA4289EB00AF25DC442BAA3A2FF44F94F865636CD1D077B4DF3DE551CB70
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c2b67d53944cb5c55e2bb92377965104f8c7736282132103d9110c3b3426bf77
                          • Instruction ID: 5f85c341a314bc846523de4e2794b065836797e391e10e69848545f3ccb08872
                          • Opcode Fuzzy Hash: c2b67d53944cb5c55e2bb92377965104f8c7736282132103d9110c3b3426bf77
                          • Instruction Fuzzy Hash: 73E17F7AA0AE4681EB10AF15D84437AA3A1FF04F98F8A1635DA5C077B8DF3CE450C761
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 20d7dac9d533b3180a345ae923d8f6c9575024258e8af4de554390141a09baf3
                          • Instruction ID: bbd066c7b20499297bd2c7bb66984092e5af87f8f0918ca5d4aded76604616ed
                          • Opcode Fuzzy Hash: 20d7dac9d533b3180a345ae923d8f6c9575024258e8af4de554390141a09baf3
                          • Instruction Fuzzy Hash: 5EC1E332A0AB4686EB16AB25EC4857BB7A6FB44F84F964536C90D13770DF3CE541CB20
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3795db95c44060b19ab420451e6778c024f51e6a69577f27822aa931ae8f4db8
                          • Instruction ID: b2630196f698c6cbf15bc152a07ca60a1ebffe75ed258358bdcc04ce9d6fcc85
                          • Opcode Fuzzy Hash: 3795db95c44060b19ab420451e6778c024f51e6a69577f27822aa931ae8f4db8
                          • Instruction Fuzzy Hash: EDC1A435A0AA4682EB40AB09EC4453AF7A6FF44FA4F8A5235C96D437B4CF3CE451D721
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: eed20e039dcc1a7adb761facd62eb612643325d2ef7b125a1d3c58e3026f862f
                          • Instruction ID: 38e476c9f6e97d358f26e761a290f9ebf6711ea9d9c32899f08459c8e8bb6f56
                          • Opcode Fuzzy Hash: eed20e039dcc1a7adb761facd62eb612643325d2ef7b125a1d3c58e3026f862f
                          • Instruction Fuzzy Hash: 7AA19363A0E25185F759AB12ED1037BE791EB80F95F824031EE8E077A4EB7CE481DB50
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6f495caaedb7263532d1806f88f0ff8ac8a82c62e595ec08781830e007608e81
                          • Instruction ID: 871855b38e48cf7e667365bb31afcdf31bf70c514279ae9d0300f025b84390ed
                          • Opcode Fuzzy Hash: 6f495caaedb7263532d1806f88f0ff8ac8a82c62e595ec08781830e007608e81
                          • Instruction Fuzzy Hash: 2EC17131A1AE4682E740AB09EC4017AB7A6FB45FA0F865635D96D477F0CF3CE560CB20
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e8839e0e3ad3752fbee51db35c45455f694ce765d77fd982f1e164920b5e77ec
                          • Instruction ID: b532919676aadd75bab01998b209c36901d2e33eaac8f3eb350ba4bc184f2408
                          • Opcode Fuzzy Hash: e8839e0e3ad3752fbee51db35c45455f694ce765d77fd982f1e164920b5e77ec
                          • Instruction Fuzzy Hash: 84B1E16271AA9182EB00DF15E94437AB3A5FB44FA4F868635DA6D477E4DF3CE040DB20
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 96fea93f446af114b9064da49687705947baa9860f6c7a3c23dd91d3fd028b50
                          • Instruction ID: 99040c8810181b2fb1be42c61fe54535665ff1849dd1a581c685e3b22e859c79
                          • Opcode Fuzzy Hash: 96fea93f446af114b9064da49687705947baa9860f6c7a3c23dd91d3fd028b50
                          • Instruction Fuzzy Hash: 4891B611E2AF8A89E707E736AC41176D2567F66FC1B96D731D80F32671EF2C71828920
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2a85621e283accacced8221b17d10a49faa8c26bd841f71e3662727ff5320864
                          • Instruction ID: 972b378c5a4ee340cdc382d94d7ff433717fe3d451ae3c9f38e50e84e88f53c1
                          • Opcode Fuzzy Hash: 2a85621e283accacced8221b17d10a49faa8c26bd841f71e3662727ff5320864
                          • Instruction Fuzzy Hash: 9291DAA2A07A5586EB14EF05DC4027EB7A2FB40F94F865635CA5E477B4CE3CD581CB10
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 79e7110b9251933381237f45dafbe83c08329d0dfb3fdd3f62539a26e3327acb
                          • Instruction ID: e566433f556ae396d41b47b137a5f764769450232a79f9071520f1c14bcba456
                          • Opcode Fuzzy Hash: 79e7110b9251933381237f45dafbe83c08329d0dfb3fdd3f62539a26e3327acb
                          • Instruction Fuzzy Hash: 8081F6B2B06A5A82EB00DF09D84467AB7A5FB44FA0F864A35DE2D473E4DE3CE541C710
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2a0a653bd8412369acd8b18e9d6f980586c5921261b9fc202eb3e07ecbb7d49b
                          • Instruction ID: dff7d6f8459b21001362357a905d51caffc3e892bccc759933236c360940e663
                          • Opcode Fuzzy Hash: 2a0a653bd8412369acd8b18e9d6f980586c5921261b9fc202eb3e07ecbb7d49b
                          • Instruction Fuzzy Hash: 2DA17B32E0AA4686E720AF25EC552BEA7A2FB54F84F921131DD4E07774DE3CE044CB60
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 52f6d5e490fbb126a6ff7b1701bbe82b2d86a503b07016c15d5eb3855ba6564f
                          • Instruction ID: e48fc5e21a59f349fc0fed5cb12a4c565a56f30f2b317d233b05a9175dabba68
                          • Opcode Fuzzy Hash: 52f6d5e490fbb126a6ff7b1701bbe82b2d86a503b07016c15d5eb3855ba6564f
                          • Instruction Fuzzy Hash: E68139B3B11A4587EB49DF29C8847AA7366EB48F84F958035CB0D47BA8DF38D681C750
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 09f86d7bf020a1616741af4184dcfb5ba4b8671fe15046aec6e24d3f199e6ae6
                          • Instruction ID: fd65db80e7e6a4eda73732a3eec56d0f9feef43351a90ea28f94f11ee46a08d4
                          • Opcode Fuzzy Hash: 09f86d7bf020a1616741af4184dcfb5ba4b8671fe15046aec6e24d3f199e6ae6
                          • Instruction Fuzzy Hash: EF61D277B12B4147D70C9F28C85966E76A2FBE4F88BA68136CA1D43798DF38D511C780
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8b7f31b7dde57376d23b91118050d515ff30093a1b7f5c396985b31bb123e795
                          • Instruction ID: ccf5ab01669886e2e50d7ed49b972a259fab919d14b8009d0fc445c0be9cbad4
                          • Opcode Fuzzy Hash: 8b7f31b7dde57376d23b91118050d515ff30093a1b7f5c396985b31bb123e795
                          • Instruction Fuzzy Hash: CE512B36F1774E01E906937A950167AE152AF5ABC4E9EDB32D90E327A0EF3DF081D610
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 24f9807a77ec1231628a5fee68b55ea91a59b695855e809c40b27073d2b7f48a
                          • Instruction ID: 6b3cd8bb0d3ab30f40346abcaf332a4a3b2a46cce8783f3b3def34740533cc24
                          • Opcode Fuzzy Hash: 24f9807a77ec1231628a5fee68b55ea91a59b695855e809c40b27073d2b7f48a
                          • Instruction Fuzzy Hash: F5512092E3D17243D73887189412A3FF293EB91B41F81A335E59E46EE1E72DD1419F10
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c1d6c5c74579766a181c76732d0e982c6beea5bccfddb835f43d11907d24d000
                          • Instruction ID: 50003d3a770fc24ade97909d1cf8b2b452e509551092dd3c1088a0d7f7001466
                          • Opcode Fuzzy Hash: c1d6c5c74579766a181c76732d0e982c6beea5bccfddb835f43d11907d24d000
                          • Instruction Fuzzy Hash: 17611526E2AF4549DA06DBB4D45026AD256BF56FC0F598732ED0F33760EF3DA182C210
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3c5e064a75470d3b12434700b37e535a9a449cf43c98d28f8e1c4881788e2503
                          • Instruction ID: 17dd75387c4f05d34cc21c7f0203e9de0ef0a36c5b90eb4b51e1166ce5315e4b
                          • Opcode Fuzzy Hash: 3c5e064a75470d3b12434700b37e535a9a449cf43c98d28f8e1c4881788e2503
                          • Instruction Fuzzy Hash: B1511922A066819AD714EF26DC455BAB7A2EF58F84F859135FE4C83761EF38D441C710
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 037180d382d50411797ef5447beba6102d2d9aae5c3127ec27b5573139ad0381
                          • Instruction ID: 9f5407292851b0948a83190b6896fda76ebca9def9e6fe60aa067688b8d8fd0b
                          • Opcode Fuzzy Hash: 037180d382d50411797ef5447beba6102d2d9aae5c3127ec27b5573139ad0381
                          • Instruction Fuzzy Hash: 50613832A16FC185D716DB24D84197AE29AFF81BC4BD9A331ED4F62260DF3CA192C710
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 096d27cd634f33b2b39273a113a3bfa11cc36e2ee31c477455c3f03cc6ef90c3
                          • Instruction ID: 872b681584520dfe4bc800049f49a94e57f565b4f0307655edcc505e583976cc
                          • Opcode Fuzzy Hash: 096d27cd634f33b2b39273a113a3bfa11cc36e2ee31c477455c3f03cc6ef90c3
                          • Instruction Fuzzy Hash: D761E572B06A5586DB00EF09D8042AAB7A1FB45FE0F8A5635DE6E477A4CF7CE540C710
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 13c3f70d5fe85c86b58ccce79dd20537651d5941e22fc2a909815bcf02fae0a2
                          • Instruction ID: f3502dc03138b64a2171f1587f1c01ac5ba78bd9f880e1b23250094c4a142c1f
                          • Opcode Fuzzy Hash: 13c3f70d5fe85c86b58ccce79dd20537651d5941e22fc2a909815bcf02fae0a2
                          • Instruction Fuzzy Hash: 39516062B0A50282FF68BF26DC5127FA751AF95FC0F965031DA0E877B5DE2CD8418720
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 28531a6797bb50e98dfc9a6ae1b5f79929bc6386de9e3fae4bdb5bd213b841f6
                          • Instruction ID: d1e0dd681ab70f5658403a6796fb3b43839aeff08e80e6b94d87a4b3b86ac87a
                          • Opcode Fuzzy Hash: 28531a6797bb50e98dfc9a6ae1b5f79929bc6386de9e3fae4bdb5bd213b841f6
                          • Instruction Fuzzy Hash: ED414B61E1AF1941ED09A776AD45136D1529F5ABD0EA9D732E82E263F4EF2C70804610
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9f371b7c663320aac0712d55089f2ff7daf330af024b6290ddde3f6ee4752e1a
                          • Instruction ID: 54eb58929066b02a14a9449ee57dad6eb8ae32e719f57b812479ed36ed21256f
                          • Opcode Fuzzy Hash: 9f371b7c663320aac0712d55089f2ff7daf330af024b6290ddde3f6ee4752e1a
                          • Instruction Fuzzy Hash: 1141A26AB15A8A86EE00DF06E8441AAA372FB54FC0FCA6032DE1E57725DF3CE551C711
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8c3a55e49a23a19c6e99d4e2879a1303fdaddfc18d9bca4d098764dac0d00ba1
                          • Instruction ID: 3939146c066d2708cae77eb685671c74a3299766069b022b63f237a6a66ff3e9
                          • Opcode Fuzzy Hash: 8c3a55e49a23a19c6e99d4e2879a1303fdaddfc18d9bca4d098764dac0d00ba1
                          • Instruction Fuzzy Hash: 9531B562F0A10246EB14BB26DC4017B9653AB84FC4FD66434ED1E577F6DE2CE8418760
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ed14c80dd863059f2dff2c32daa8a57b105c1426a02afba91e4b980da70f0663
                          • Instruction ID: b0d180a4e02b48d50b4012c490965260bd150a99ccf79caacb5254b452b16a6c
                          • Opcode Fuzzy Hash: ed14c80dd863059f2dff2c32daa8a57b105c1426a02afba91e4b980da70f0663
                          • Instruction Fuzzy Hash: 56418B32B04BA489E715CBB5E8406EE77B5FB58748F65812AEE4C97A18DF34C592C700
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: 84561d1d573fde311a2d707e79fc372032f8b9738f604961ab49bf565c1bdabe
                          • Instruction ID: 2d18c336702280df6960984defabcfa4f57c3c7b3227d67a515452a490c1dbc8
                          • Opcode Fuzzy Hash: 84561d1d573fde311a2d707e79fc372032f8b9738f604961ab49bf565c1bdabe
                          • Instruction Fuzzy Hash: 5321FB26F2814202EBB4AB39F69567F5361EB85B80F892030DE0D02E65ED18D6818E10
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 221cf158b9a98e13d59b20ce11f85cd83d7d464265b0073024cff9ca69588a45
                          • Instruction ID: d59aa3f96f7289a41371d21b44e3914ddd2fe2bdd28ccbb9713634dada7d3030
                          • Opcode Fuzzy Hash: 221cf158b9a98e13d59b20ce11f85cd83d7d464265b0073024cff9ca69588a45
                          • Instruction Fuzzy Hash: 60110463B0A24285E715BF22EC845BAE712AF85FD1F959471DF0C0BBA6CE3CC4818310
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fd73dc21319d55d5cd51ae119c2cd724b2eedb2a74dd1c6a194b4a6c8a9077be
                          • Instruction ID: 0933f0dac278ee2a52d16ada3d4c768abe0283d42e48c65d65bb5d725d1cd999
                          • Opcode Fuzzy Hash: fd73dc21319d55d5cd51ae119c2cd724b2eedb2a74dd1c6a194b4a6c8a9077be
                          • Instruction Fuzzy Hash: E6F0D004E0B01646F90CBA229C5A2FFD2620F97F80FA56874EA1E1F7A7DD1C94525364
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bb870c6da8980ab108728cb2512e603d96d3e36e6137f51798ee13c9ceab7c4e
                          • Instruction ID: 904738b1618e152ebcb9cd6f98d110127c6fd433be520e548bec8daf8e1c579f
                          • Opcode Fuzzy Hash: bb870c6da8980ab108728cb2512e603d96d3e36e6137f51798ee13c9ceab7c4e
                          • Instruction Fuzzy Hash: 3AE04804E1710645E91CFA619C653FBD1621F96F40FA51430EA1E1B7B7DD1C94015330
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 334c71db2373eca22ed1fe030cc8b17200d83776fff50a61cfaf6ec7c3de23df
                          • Instruction ID: edcb83aaf1748f4efa498414e88e582dc532ca3db9335880106cb63c1be1fe7d
                          • Opcode Fuzzy Hash: 334c71db2373eca22ed1fe030cc8b17200d83776fff50a61cfaf6ec7c3de23df
                          • Instruction Fuzzy Hash: 38D05E44E2601A40EC087A238C190B7C2611F56FC0DE52070EC0E2BB669D0C94034324
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: _stricmp
                          • String ID: buddhist$calendar$dangi$gregorian$hebrew$islamic$islamic-umalqura$japanese$persian$roc
                          • API String ID: 2884411883-3649728362
                          • Opcode ID: 5c4252158990072a2c8dbf7d618486f637b8a275c6e4f6a82dc01d2d222f2064
                          • Instruction ID: ca307c4d172753cbb9ad027f9c53be30ef7c5ed636999a6a96a17ad16cad6cd7
                          • Opcode Fuzzy Hash: 5c4252158990072a2c8dbf7d618486f637b8a275c6e4f6a82dc01d2d222f2064
                          • Instruction Fuzzy Hash: 4D514E25A1E65351EA10AB16EC183B7E395EFA4F84FC26031DC0E466B5EF6DE405C760
                          APIs
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A6552967,?,?,?,?,00007FF7A654B845), ref: 00007FF7A654C1DE
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A6552967,?,?,?,?,00007FF7A654B845), ref: 00007FF7A654C206
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A6552967,?,?,?,?,00007FF7A654B845), ref: 00007FF7A654C226
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A6552967,?,?,?,?,00007FF7A654B845), ref: 00007FF7A654C246
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A6552967,?,?,?,?,00007FF7A654B845), ref: 00007FF7A654C266
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A6552967,?,?,?,?,00007FF7A654B845), ref: 00007FF7A654C28A
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A6552967,?,?,?,?,00007FF7A654B845), ref: 00007FF7A654C2AE
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7A6552967,?,?,?,?,00007FF7A654B845), ref: 00007FF7A654C2D2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: strcmp
                          • String ID: GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent
                          • API String ID: 1004003707-945519297
                          • Opcode ID: bd652d5be0480d2eb31566d04321b99b92d141b06253939b4d1c7caa1d773059
                          • Instruction ID: 63045ab9d755121d54774fb4ef4233a1feb2ddfc68ffc609ff8354a6898444b8
                          • Opcode Fuzzy Hash: bd652d5be0480d2eb31566d04321b99b92d141b06253939b4d1c7caa1d773059
                          • Instruction Fuzzy Hash: 6A415E20A0EA4244EA40BB16DD041B7D352AF96FF4FDA23B1D97D576F5EF1CE8028660
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: ContextInitialize$AddressEnabledErrorFeaturesHandleLastModuleProcState
                          • String ID: InitializeContext2$kernel32.dll
                          • API String ID: 4102459504-3117029998
                          • Opcode ID: bf7d35e48df714c612ab66266faaa2ff6652ce620ea3f11c073d427a00be551f
                          • Instruction ID: 41f7dc40ef1276fc590d58aed59e098ebb980846ab20ef4234d7304cf7ee4d2c
                          • Opcode Fuzzy Hash: bf7d35e48df714c612ab66266faaa2ff6652ce620ea3f11c073d427a00be551f
                          • Instruction Fuzzy Hash: 86317071A0AB4682EA01AB55E844277E3A2EF44FD4F9A1431DD8D42774DF7CE486CB20
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Thread$AddressContextErrorLastLibraryLoadProcResumeSuspend
                          • String ID: QueueUserAPC2$kernel32
                          • API String ID: 3714266957-4022151419
                          • Opcode ID: bc70cecf5c74af7520f56920f6343e2be3003b4f5f30e659a0aacf61ab6d3dce
                          • Instruction ID: 7c3d09a8119ea47718f1eaf09c838dcdc5c3cd36dd1052233e35983fca2f219e
                          • Opcode Fuzzy Hash: bc70cecf5c74af7520f56920f6343e2be3003b4f5f30e659a0aacf61ab6d3dce
                          • Instruction Fuzzy Hash: 7131A870A0EA4241EA54FB16EC4837BA392EF45FA4FD51230C96D46AF4DF2CE4058720
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fe6e69181591d6301f79addf1851dae84baba91a0e20fc1957c0ed45eea2809c
                          • Instruction ID: f5629e700c42fa5f1217057d2c16486a97e8242b634aeab0fc3ed6165c758d8d
                          • Opcode Fuzzy Hash: fe6e69181591d6301f79addf1851dae84baba91a0e20fc1957c0ed45eea2809c
                          • Instruction Fuzzy Hash: 6F71AFA5A0BA4242EB10BB11DD4027BE3A6BF54F94F9E5035DA1D07AB9CF3CE460C761
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakDebug
                          • String ID:
                          • API String ID: 456121617-0
                          • Opcode ID: 5d73b6675c1853df630bb6c88506b6e80ad5f9561737fbd2e3aae4c93d19f0ff
                          • Instruction ID: cbdc61f96d63751568db3c7718948cb83de84525eae2d5debe3e039cf05828bd
                          • Opcode Fuzzy Hash: 5d73b6675c1853df630bb6c88506b6e80ad5f9561737fbd2e3aae4c93d19f0ff
                          • Instruction Fuzzy Hash: A551A522E0AA4396EA25BB51CC441BEE3A1FB84F95FC74135CA1D037A1DE3CE491D3A0
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CriticalSectionSwitchThread$Leave$Enter
                          • String ID:
                          • API String ID: 1765607624-0
                          • Opcode ID: faad790ec28286bda2ef36a915e46beff94c7fcad6aaa131053e1d9cfa2025f0
                          • Instruction ID: 1ede4e05a6ffce4269a8dd875254afb74e6745cfc13afa0721968c79d75e5812
                          • Opcode Fuzzy Hash: faad790ec28286bda2ef36a915e46beff94c7fcad6aaa131053e1d9cfa2025f0
                          • Instruction Fuzzy Hash: 60515D34D0BA0386F760BB29EC45577E292AF41F54FDA1235E52D826F2CE2CA841DA71
                          APIs
                          • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF7A6581FB1,?,?,000002AAAB6F1490,00007FF7A65814E2), ref: 00007FF7A6581E89
                          • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF7A6581FB1,?,?,000002AAAB6F1490,00007FF7A65814E2), ref: 00007FF7A6581EA1
                          • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF7A6581FB1,?,?,000002AAAB6F1490,00007FF7A65814E2), ref: 00007FF7A6581EB9
                          • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF7A6581FB1,?,?,000002AAAB6F1490,00007FF7A65814E2), ref: 00007FF7A6581ED7
                          • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF7A6581FB1,?,?,000002AAAB6F1490,00007FF7A65814E2), ref: 00007FF7A6581EFC
                          • DebugBreak.KERNEL32 ref: 00007FF7A6581F30
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakDebug
                          • String ID:
                          • API String ID: 456121617-0
                          • Opcode ID: eb5a1da3c55d9acfe23894c72031d4decde521b88f1bcb182cc320728f4e60f2
                          • Instruction ID: 3c08b9531eba47a5800e99de93078bc39ebdb7ebf86b8d8c50a86310e61d9480
                          • Opcode Fuzzy Hash: eb5a1da3c55d9acfe23894c72031d4decde521b88f1bcb182cc320728f4e60f2
                          • Instruction Fuzzy Hash: 55419622A0A69342E7617B61D80017FEB91AF45F95F9A0034EE4D16EA6CF3CD440C7B1
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: Current$Thread$DuplicateExceptionFailFastHandleProcessQueryRaiseVirtual
                          • String ID:
                          • API String ID: 510365852-3916222277
                          • Opcode ID: 9ced71184ac91c8616e97de7930c93111042d63eeb25a1540481694c845d8b19
                          • Instruction ID: 8f97b219546f674847b3ebbb0b4412f53edb3d4494ce49c8a782384cd1535d8a
                          • Opcode Fuzzy Hash: 9ced71184ac91c8616e97de7930c93111042d63eeb25a1540481694c845d8b19
                          • Instruction Fuzzy Hash: D6118E72609B818AD764EF25F84419BB361FB45BB4F544334E6BD0B6EACF78D0428700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: 30c2a865ca8bebd16377ec9e55b12350cbbdee7e357ec5e7fec82702041c0912
                          • Instruction ID: 92663a6ea4aa3ba0321492b855157cca9ecac4b65987315f055d716fd5e12ec9
                          • Opcode Fuzzy Hash: 30c2a865ca8bebd16377ec9e55b12350cbbdee7e357ec5e7fec82702041c0912
                          • Instruction Fuzzy Hash: 61615821E0AF4284EB50AF15EC843B7E3A1AF85F90F9A5436D98D43675DF3CE5818B60
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: 7f292bd782e5db76287a58f2738b6682abde35b80ac547e9518716b401c7d407
                          • Instruction ID: 217460e706c10f8aa6ba76e285e6460c036692801db3a305403fdeb2839b4307
                          • Opcode Fuzzy Hash: 7f292bd782e5db76287a58f2738b6682abde35b80ac547e9518716b401c7d407
                          • Instruction Fuzzy Hash: 48512A31D0AF4281EB60AF14EC403B6F3A5EB84F80F9A5436D98D43675EE3CE5558B60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: ExceptionFailFastRaise
                          • String ID: Process is terminating due to StackOverflowException.
                          • API String ID: 2546344036-2200901744
                          • Opcode ID: 8c7f27cb811299753a952a27045d38bbe572bc9dae65ba32a05ed8a71e85e72f
                          • Instruction ID: db2eb4268bcab843e3594b1424c75aefb704bdd920f3e82ffaab25edd35fb544
                          • Opcode Fuzzy Hash: 8c7f27cb811299753a952a27045d38bbe572bc9dae65ba32a05ed8a71e85e72f
                          • Instruction Fuzzy Hash: 1D51B431A1AA4280EF54AB16DC4437AA392EF48F84FE65172DA5E477B0DF6CE4558310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: SwitchThread
                          • String ID:
                          • API String ID: 115865932-0
                          • Opcode ID: 43a0589b976ba65fc858849c45dd8cb8d0f1c6ed62617d059feff9e61ea92c26
                          • Instruction ID: 79046e828966daaf4afa42954c47bc22b4ca4683f042e81b2ef9171aa86c432c
                          • Opcode Fuzzy Hash: 43a0589b976ba65fc858849c45dd8cb8d0f1c6ed62617d059feff9e61ea92c26
                          • Instruction Fuzzy Hash: A341B732B0A74585FB606E26D84063BB2D0EB41F95F959139C66E46FA5DE3CE480A720
                          APIs
                          • DebugBreak.KERNEL32(?,00000000,?,00007FF7A655E7B5,?,?,00000001,00007FF7A656CA48), ref: 00007FF7A6580F49
                          • DebugBreak.KERNEL32(?,00000000,?,00007FF7A655E7B5,?,?,00000001,00007FF7A656CA48), ref: 00007FF7A6580F66
                          • DebugBreak.KERNEL32(?,00000000,?,00007FF7A655E7B5,?,?,00000001,00007FF7A656CA48), ref: 00007FF7A6580F81
                          • DebugBreak.KERNEL32(?,00000000,?,00007FF7A655E7B5,?,?,00000001,00007FF7A656CA48), ref: 00007FF7A6580F9A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakDebug
                          • String ID:
                          • API String ID: 456121617-0
                          • Opcode ID: 1c7403b06a8287785738a1b79607cbfa0b74b256696118e6c96bd0e0f9b3bca9
                          • Instruction ID: 3d352d5e83a78b7bd96fc03001117aafade5b0f2146003ba7cecfa9a76a9a7d6
                          • Opcode Fuzzy Hash: 1c7403b06a8287785738a1b79607cbfa0b74b256696118e6c96bd0e0f9b3bca9
                          • Instruction Fuzzy Hash: 3F41F421A0B65282EA61AB10D84037BE7E0EF14F59F9B4034DEAC07BA5CF7CE481D360
                          APIs
                          • DebugBreak.KERNEL32(?,?,00000000,?,00007FF7A656B16E,?,?,-8000000000000000,00007FF7A657E9AE,?,?,?,00007FF7A65588C3), ref: 00007FF7A656F339
                          • DebugBreak.KERNEL32(?,?,00000000,?,00007FF7A656B16E,?,?,-8000000000000000,00007FF7A657E9AE,?,?,?,00007FF7A65588C3), ref: 00007FF7A656F356
                          • DebugBreak.KERNEL32(?,?,00000000,?,00007FF7A656B16E,?,?,-8000000000000000,00007FF7A657E9AE,?,?,?,00007FF7A65588C3), ref: 00007FF7A656F376
                          • DebugBreak.KERNEL32(?,?,00000000,?,00007FF7A656B16E,?,?,-8000000000000000,00007FF7A657E9AE,?,?,?,00007FF7A65588C3), ref: 00007FF7A656F399
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: BreakDebug
                          • String ID:
                          • API String ID: 456121617-0
                          • Opcode ID: fadf0de926549372bb38a711b3a869a02a71d20e7acaacbe5fadbf81d570d035
                          • Instruction ID: 19efddb8d9ad1c6790bcbcb9d4371bd25cf1d4441f627f4e9697445fdfa189c7
                          • Opcode Fuzzy Hash: fadf0de926549372bb38a711b3a869a02a71d20e7acaacbe5fadbf81d570d035
                          • Instruction Fuzzy Hash: E831E226A0A78282EA60BF95E80027AF2A5FF44F84F9E0434DA4D036A5CF3CD440C372
                          APIs
                          • WaitForMultipleObjectsEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7A65453F1), ref: 00007FF7A654B554
                          • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7A65453F1), ref: 00007FF7A654B55E
                          • CoWaitForMultipleHandles.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7A65453F1), ref: 00007FF7A654B57D
                          • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7A65453F1), ref: 00007FF7A654B591
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: ErrorLastMultipleWait$HandlesObjects
                          • String ID:
                          • API String ID: 2817213684-0
                          • Opcode ID: fb3803eab1f8f5efa5fb27e8f20969c784412db916d2e9a85c31db86b57d2910
                          • Instruction ID: 176345fd506d20bcfd21d99a21ea99d90e84ea9c176fff28cd5cc1f70eff2a17
                          • Opcode Fuzzy Hash: fb3803eab1f8f5efa5fb27e8f20969c784412db916d2e9a85c31db86b57d2910
                          • Instruction Fuzzy Hash: 0C118271A1D65586D7245B2AF80516BF2A2FB88F94FA50139FA8E43BB8DF3CD400CB50
                          APIs
                          • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A65AB963), ref: 00007FF7A65AC6A8
                          • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7A65AB963), ref: 00007FF7A65AC6E9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 29c9d3c2ced156e708d0624c64ac5506fb70f8574287197aa5be238856b2bc0e
                          • Instruction ID: b2d8f07aa734fae5ffbc3ec3ac215994c3022b439c377dff341e2bc7aa810869
                          • Opcode Fuzzy Hash: 29c9d3c2ced156e708d0624c64ac5506fb70f8574287197aa5be238856b2bc0e
                          • Instruction Fuzzy Hash: 29112E32619B8182EB21DF19F84426AB7E5FB98F84F595231DE8D0B768DF3CD5518B00
                          APIs
                          • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,HeapVerify,00007FF7A654C313,?,?,?,00007FF7A6552967,?,?,?,?,00007FF7A654B845), ref: 00007FF7A654D08B
                          • strtoull.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,HeapVerify,00007FF7A654C313,?,?,?,00007FF7A6552967,?,?,?,?,00007FF7A654B845), ref: 00007FF7A654D0C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: _stricmpstrtoull
                          • String ID: HeapVerify
                          • API String ID: 4031153986-2674988305
                          • Opcode ID: 3a336707b4a45596346e9791d434987ae1de577f78f4eb99a8291cf3e8841bd7
                          • Instruction ID: 6dae08cb7e79a875baff636cd11752a2ab229a16eb1c84e6d8bafa34e2c57177
                          • Opcode Fuzzy Hash: 3a336707b4a45596346e9791d434987ae1de577f78f4eb99a8291cf3e8841bd7
                          • Instruction Fuzzy Hash: D7019671A0A641D9DB10BF21ED8407AF3A1FB68F80F965171D64D03729DF3CD445CA50
                          APIs
                          • EnterCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF7A655D6BF,01FFF001,00000000,00000000,00007FF7A656BD4F), ref: 00007FF7A65732ED
                          • LeaveCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF7A655D6BF,01FFF001,00000000,00000000,00007FF7A656BD4F), ref: 00007FF7A657333E
                          • EnterCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF7A655D6BF,01FFF001,00000000,00000000,00007FF7A656BD4F), ref: 00007FF7A6573374
                          • LeaveCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF7A655D6BF,01FFF001,00000000,00000000,00007FF7A656BD4F), ref: 00007FF7A657338F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: e743cea26d5aa4e05b231aa46b4469101279d7ee653fa58b53f11e4b04d877f5
                          • Instruction ID: 34d282ea7a690154e69ccafb465205a1d87f21155e00bc2e2ffa752f97adbbb1
                          • Opcode Fuzzy Hash: e743cea26d5aa4e05b231aa46b4469101279d7ee653fa58b53f11e4b04d877f5
                          • Instruction Fuzzy Hash: FF41AF31A0DA4281EB20AF11EC4437AF391AB44FA4F954531E95D57AB5CF3CE644CB60
                          APIs
                          • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF7A656419F,?,?,?,00007FF7A6571E7B), ref: 00007FF7A656406A
                          • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF7A656419F,?,?,?,00007FF7A6571E7B), ref: 00007FF7A65640AC
                          • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF7A656419F,?,?,?,00007FF7A6571E7B), ref: 00007FF7A65640D7
                          • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF7A656419F,?,?,?,00007FF7A6571E7B), ref: 00007FF7A65640F8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1503019707.00007FF7A6541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A6540000, based on PE: true
                          • Associated: 00000000.00000002.1503005487.00007FF7A6540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503076573.00007FF7A6629000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503102507.00007FF7A665A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503139739.00007FF7A66CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1503184858.00007FF7A66CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff7a6540000_Payment-Order #24560274 for 8,380 USD.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: fad017503d982359f6b350fff991fd565ce6d91fee4a39b5e2a1188cb59f1a07
                          • Instruction ID: 92fed243a530e9f6eb796e387065925f26f9dcafa0774b1ac623dd5640c62d4d
                          • Opcode Fuzzy Hash: fad017503d982359f6b350fff991fd565ce6d91fee4a39b5e2a1188cb59f1a07
                          • Instruction Fuzzy Hash: 34216D21E0AE0281EB10AF14EC843B6A351EF10FA4FDA9236D42D466F5DF2CE595C761
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7b16f4821c9fc042e89594736f13fcc12a98ab01150187efeecb8ec4ba3741f8
                          • Instruction ID: ab28dc3ece853df23a61697b1ebb8535a7d2fa2357da7866f5567a9234717b13
                          • Opcode Fuzzy Hash: 7b16f4821c9fc042e89594736f13fcc12a98ab01150187efeecb8ec4ba3741f8
                          • Instruction Fuzzy Hash: F2B13F70E10209CFDF14CFA9D88579DBBF3AF89315F188529E826EB254EB749845CB81
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 023f8da28182f5fc035ec262901dfc73387c33481417cbecec51d070d09e4060
                          • Instruction ID: 7113733b9cd24b4f7bfa34ae2cd01ac25ed3d7fb81ae68dcdae95df19b37c0e0
                          • Opcode Fuzzy Hash: 023f8da28182f5fc035ec262901dfc73387c33481417cbecec51d070d09e4060
                          • Instruction Fuzzy Hash: D7B16F71E00209CFDB14CFA9D88579EFBF3AF49710F188529E826EB254EB759845CB81
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID: |
                          • API String ID: 0-2343686810
                          • Opcode ID: bdd8baffbb113b107842478a07ca0de06ce7dde5a97279c894316f647afa68ff
                          • Instruction ID: 3fe70d96568c0864657e146a590c2e71b02ef2c6a8cab634bd39be0da88e0218
                          • Opcode Fuzzy Hash: bdd8baffbb113b107842478a07ca0de06ce7dde5a97279c894316f647afa68ff
                          • Instruction Fuzzy Hash: 28214D75B00214CFDB64DFB89854BADB7F1AF4C600F144469E95AEB360DB759D018B90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fd7550cd97d59e50c559c66a148800a9a4be3815e1a2c6853cac2c6b90602df2
                          • Instruction ID: 931ea6a547af77b786a8ab4b02d3c7bc3ad92f553a42fa8de0b22ee0031f8add
                          • Opcode Fuzzy Hash: fd7550cd97d59e50c559c66a148800a9a4be3815e1a2c6853cac2c6b90602df2
                          • Instruction Fuzzy Hash: EC519E31700240DFD715DB79D858B99BBF2AF8A710F1981AAE411DB3A2DB759C05CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 167578993ee0bc4eb340092faea015fc8521bed5a668c5d5d70bc391d3278580
                          • Instruction ID: 9b0462849569b7418cf8e29943ff03a055d4f3c095a64ac9892bb7ab2f4e70fa
                          • Opcode Fuzzy Hash: 167578993ee0bc4eb340092faea015fc8521bed5a668c5d5d70bc391d3278580
                          • Instruction Fuzzy Hash: 66B13D70E10209DFDF10CFA9D8857DEBBF2AF49315F188129E826EB254EB759845CB81
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 19dd72493701d30aea1a5251d4162d486342b6662f79f644e84fff22d36259c6
                          • Instruction ID: fd92083050e1421e84906be3002f9d802f365e222980604d149b2d1e9305b49e
                          • Opcode Fuzzy Hash: 19dd72493701d30aea1a5251d4162d486342b6662f79f644e84fff22d36259c6
                          • Instruction Fuzzy Hash: 01B16D71E00209CFDB10CFA9D8857DEFBF2AF49714F188529E826EB254EB759845CB81
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3cc67fdee076a9995b9ffde22b42404c78c5379d802e073b356ce9eac6ef54a4
                          • Instruction ID: edf93b3a5d2af4c37f64cb2d58db119478d5409d93866d38f4ca9a252c7b33f8
                          • Opcode Fuzzy Hash: 3cc67fdee076a9995b9ffde22b42404c78c5379d802e073b356ce9eac6ef54a4
                          • Instruction Fuzzy Hash: 3361AC307002058FDB25EF78E858A6E7BB2FFC9710B114969D416EB3A9DF349C049B91
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1194be54947dd8041de8dac4264bb4de6fd1b345c849970f61ff9d1d1ca85de8
                          • Instruction ID: 4f8efd8200150f10fdf4e7242b01b8c11227eb87dc9b276b627ae695c7567750
                          • Opcode Fuzzy Hash: 1194be54947dd8041de8dac4264bb4de6fd1b345c849970f61ff9d1d1ca85de8
                          • Instruction Fuzzy Hash: 78715070E00209DFDF14CFA9C88579EFBF2AF89310F188129E825A7254EB749845CB91
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: baf64e71ad0c904a23079ff7fda73dc17c7f3c4f5f5c267ba5ce2d0bfc5f171b
                          • Instruction ID: e92880a7bde42dbe26e1480973c5c6a28ffb667267a3953babdd4f8c7bb707ab
                          • Opcode Fuzzy Hash: baf64e71ad0c904a23079ff7fda73dc17c7f3c4f5f5c267ba5ce2d0bfc5f171b
                          • Instruction Fuzzy Hash: 13715D71E00209DFDF14CFA9C8857DEFBF2AF89710F188129E826AB254E7759845CB91
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 57d02b7b72efce888e675d66dc589dc2f724c6eedd2fe2cabe8224d30437c061
                          • Instruction ID: 98b3ec7792a7c8bd7f085f54485acb6431b2d40db6dad90b44bf9b60aa07b061
                          • Opcode Fuzzy Hash: 57d02b7b72efce888e675d66dc589dc2f724c6eedd2fe2cabe8224d30437c061
                          • Instruction Fuzzy Hash: F5512271340214DBEB58EB68E81876E77AFFB8C641F20846DD40AD77A4CE799C019BA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d8193a551347cab34e9edce1b54181b962dabd2dcc292b469b1e6de8840f77c2
                          • Instruction ID: 3526672dc927a8f4e8933eb9c06d5cd270e2b8e91caf90b82624190da5d4a9b6
                          • Opcode Fuzzy Hash: d8193a551347cab34e9edce1b54181b962dabd2dcc292b469b1e6de8840f77c2
                          • Instruction Fuzzy Hash: 0B512071340214DBEB58EB68E81872E77AFEBCC641F20802DE40A977A4CE759C019BA5
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d0141b61cc1120a8b6a6bb8fa455c78bfe008269689cdad6a18bff364d4ec3e8
                          • Instruction ID: 70ee8900ff693f55c5d92f9eb063c72a3b6d55e9c6b63c926a6a0183293a02b9
                          • Opcode Fuzzy Hash: d0141b61cc1120a8b6a6bb8fa455c78bfe008269689cdad6a18bff364d4ec3e8
                          • Instruction Fuzzy Hash: 66517B707003059FE714EFB8D45876A7BA2FB99710F20456CD816AF3A5DF799C068B90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d7e4f3748ca336067792581152149278e39694d7771a3956cc4cdf3e27a44939
                          • Instruction ID: 1643a8155f98dfe13f0ad8d2b422aba2d81545a74c019d1e17a38e235da845e7
                          • Opcode Fuzzy Hash: d7e4f3748ca336067792581152149278e39694d7771a3956cc4cdf3e27a44939
                          • Instruction Fuzzy Hash: 48516971E00208DFDB04DFA8C990BDDBBF6BF88300F14806AE815AB255DB759D09CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 30f42d5cc04b366375a9f8bb6e570e15adf47e37190de965ccc787eaecbc2a3f
                          • Instruction ID: ecb4309a73a292717cc4f6e24d49032762fdbad7595e5f5cfb8dcf8fa5dfdfb2
                          • Opcode Fuzzy Hash: 30f42d5cc04b366375a9f8bb6e570e15adf47e37190de965ccc787eaecbc2a3f
                          • Instruction Fuzzy Hash: 99515931B00204DFDB14DB69D859B6DBBF2AF89710F158169E811EB3A1CB71DC04CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fd4b6b04c555173ac9f7b644b80b77f75be443ff1bd5ed6fa66a026c30538f6e
                          • Instruction ID: 2cbcbee85302febffbc31a58a543ceca86ee5fd0b7dd9a7780d256e1e6f15d11
                          • Opcode Fuzzy Hash: fd4b6b04c555173ac9f7b644b80b77f75be443ff1bd5ed6fa66a026c30538f6e
                          • Instruction Fuzzy Hash: 5241BF31A043088FDB14EB79D4547AEBBF6EFC9214F14882DD51AAB380DF799C068B95
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 78a7198026991a9bc350804be8a96878e47b7f474d3ecc5725aa6bc0464420b9
                          • Instruction ID: 4ba6ca3238afee40dd2909875ba35e848ca5d20a34da1dce4da84d47bcaa1ee1
                          • Opcode Fuzzy Hash: 78a7198026991a9bc350804be8a96878e47b7f474d3ecc5725aa6bc0464420b9
                          • Instruction Fuzzy Hash: 0641C171A04345CFD700DF69E88869AFFF5FF49310F1981AAD818EB252E735A944CBA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4013f8dfd50a3f54d15d1e642b57a0536d04b68606af449b15a4becfb8da9530
                          • Instruction ID: 0dbe1652b8e92d16919ca532c80aa0976d6825c8560873975e867bc3de58ae82
                          • Opcode Fuzzy Hash: 4013f8dfd50a3f54d15d1e642b57a0536d04b68606af449b15a4becfb8da9530
                          • Instruction Fuzzy Hash: E641F2B5D00248EFCB14CFA9C984BDDBBF2AF48300F14802AE815AB255CB75A945CF90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 20d9d97448202cd8a64fd5aa48219614d37671d52c1c0ceca6ae4efa9ffd2f97
                          • Instruction ID: d1feca68b2c2eb57aa244387b2d242a47f8b46fa765ca7ccbe56789921d331c0
                          • Opcode Fuzzy Hash: 20d9d97448202cd8a64fd5aa48219614d37671d52c1c0ceca6ae4efa9ffd2f97
                          • Instruction Fuzzy Hash: 3D4100B5D00258EFCF14DFA9C984BDDBBF6BF48300F14802AE815AB255DB75A949CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7e3d8e69746e7c6f6889cecde041a3fc45928ed2b2ae2c29d4c577accec43585
                          • Instruction ID: fe3455be7e29c9db5eac72fc849ddc1cfb02ab88cd1fb896a0c98f42bb3e279b
                          • Opcode Fuzzy Hash: 7e3d8e69746e7c6f6889cecde041a3fc45928ed2b2ae2c29d4c577accec43585
                          • Instruction Fuzzy Hash: 4E316C717003058FDB24EF78F89C5AE7BA2FB8E3403014528D826AB6A9DF349D058F81
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a1b1fa8f4bd1c207889fdd01f6c2c4ede3442a03913bfaecee1670a6a7957e5b
                          • Instruction ID: c2bb10473dec1d61e4098466f67a86dad656d9f459a7db58a77deb10ab9bb216
                          • Opcode Fuzzy Hash: a1b1fa8f4bd1c207889fdd01f6c2c4ede3442a03913bfaecee1670a6a7957e5b
                          • Instruction Fuzzy Hash: 1741F0B5D00309DFDB14CFA9C884BDEBBF5BF48310F148529E819AB254DB75A945CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 72ee15cc0cc1a569acb007f1cb45f37846940d0cb7b182acda3aeb82db5d1ad7
                          • Instruction ID: 80f1d321c4e201fda99b82abc9c560dbd0291a9ad2d49c998c22693f41fbf810
                          • Opcode Fuzzy Hash: 72ee15cc0cc1a569acb007f1cb45f37846940d0cb7b182acda3aeb82db5d1ad7
                          • Instruction Fuzzy Hash: 6541EEB5D0034DDFDB14CFA9C884BDEBBB5BF48310F148429E829AB250DB75A945CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 712cb20c82140ce7280d4edc498e49bb2febd20ea9a46b571475c7a1b3a19f7c
                          • Instruction ID: 96cd8c8ccce84dc402da96a07616a074400c8162e9c76574ea88108deb63a476
                          • Opcode Fuzzy Hash: 712cb20c82140ce7280d4edc498e49bb2febd20ea9a46b571475c7a1b3a19f7c
                          • Instruction Fuzzy Hash: 2131AC347002058FDB44DB69D894B6E7BF2BFC8B10F2584A9E505EF3A5CA719C009B90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 61b8f16d0caf6a3fb4905e7829af566d878e8612fd4ce9b3532184674a0b694f
                          • Instruction ID: 9e505f5b4eeb3347998007f01e01aa3945e1c7810e8bb3b5076f3f4b58e73c91
                          • Opcode Fuzzy Hash: 61b8f16d0caf6a3fb4905e7829af566d878e8612fd4ce9b3532184674a0b694f
                          • Instruction Fuzzy Hash: 4C318431B00219CFDB19EB74D4646AEB7B2EB8C600F54906CE912AB3A4DF359C41CB91
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4a19359368e67a78d9378eb19493b5f8443bb1f476aded4f0790a41e51279f9d
                          • Instruction ID: 092d39bded5c6b135d57af39aaa7c772ce7bbc5b71a3e7c613a9ebf1b0f4cde9
                          • Opcode Fuzzy Hash: 4a19359368e67a78d9378eb19493b5f8443bb1f476aded4f0790a41e51279f9d
                          • Instruction Fuzzy Hash: 1D218371B402059FDB54EBF998543AEBAEAFFCC260B14843DD50BE7354DE34890147A1
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 72a6d468db9e9856123a0271b465131b0ac5be58ba5c803fad3d6fe7bb56064f
                          • Instruction ID: 5fdde1d563b758f443c632331cc5a2e7a85d870d2d3fd83de36a34d0f723116a
                          • Opcode Fuzzy Hash: 72a6d468db9e9856123a0271b465131b0ac5be58ba5c803fad3d6fe7bb56064f
                          • Instruction Fuzzy Hash: 62212131F00218DFDB18DBA4D8547EEBBB6FF8C210F144429E912A7284DB359D46CB65
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640612196.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_151d000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0b83f6c138105ebeafa6886f613dc2fe4de84d80a421818e66def3a8f96c7415
                          • Instruction ID: 92daddd3cbfa3998a2681873e2bd9d50f3d16964819a7fb3c8c58ca46fbae1c9
                          • Opcode Fuzzy Hash: 0b83f6c138105ebeafa6886f613dc2fe4de84d80a421818e66def3a8f96c7415
                          • Instruction Fuzzy Hash: 57210672504240DFEB06DF94D9C4B5ABBB5FB88324F24C569E9250E28AC33AD416CBA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c86b744463e16adfe38136f457109393a26a0f73996f5936bcb36717edb37dc1
                          • Instruction ID: 55faa6f7a6b02e496b644991a3eb162a19e0bea272c7f580d3b5299767ad5e9b
                          • Opcode Fuzzy Hash: c86b744463e16adfe38136f457109393a26a0f73996f5936bcb36717edb37dc1
                          • Instruction Fuzzy Hash: 3A316170A00309DFDB01EFB8E85469DBBB6FF89300F1085A9D416AB254DF35AE45CB91
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c058c5cef08ecbc6692611d18711b31cd7ea64d4df145a4db45c7700f426c3f7
                          • Instruction ID: e1cfb9f9bd644e6e33939b8d65d26fc24e90630c0c766d9b20252bd10f894724
                          • Opcode Fuzzy Hash: c058c5cef08ecbc6692611d18711b31cd7ea64d4df145a4db45c7700f426c3f7
                          • Instruction Fuzzy Hash: 2E116D71B402459FDB44EBFA982836EBAEAFFC9220B148429D54BD7344DE348C0557A1
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5ee74e1426cc42baf20fa59516bab6749167b203c21b0e4a6b640ddc474ccdc5
                          • Instruction ID: 945f3d5c4a9c03aae676be4666cbf977a39d1b51152485889b7e5c3e91c9927d
                          • Opcode Fuzzy Hash: 5ee74e1426cc42baf20fa59516bab6749167b203c21b0e4a6b640ddc474ccdc5
                          • Instruction Fuzzy Hash: 8E213D70A00309EFDB01EBB8E8586ADBBB6FF98200F108569E416A7254DF359E45CB91
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 83c79fd10e90701506b7bab7c398ef870d4ad3251ef0475195999eae42a06681
                          • Instruction ID: 56ccee891535e005667b29bdadcf189b0c88f3a2a4b4a1ebba4c6d8c3c66d9f7
                          • Opcode Fuzzy Hash: 83c79fd10e90701506b7bab7c398ef870d4ad3251ef0475195999eae42a06681
                          • Instruction Fuzzy Hash: 6A211574B00110DFDB19DF69E448A69B7B2FF9CB1071582A9E816EB371DB35AD05CB40
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e4e5a285f2018f6360193327dd9861015f899bf8f75fa17b6aba77661892945d
                          • Instruction ID: c0f4b90c2e54062b17c5c3c32cb2a59f9b1574514147df3ef5ab38629f489f85
                          • Opcode Fuzzy Hash: e4e5a285f2018f6360193327dd9861015f899bf8f75fa17b6aba77661892945d
                          • Instruction Fuzzy Hash: DA11D330740216DFD701DBB8E85835EBBB3FF8C710F28816AD916A72A5DB3A4D528791
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640612196.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_151d000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5dce05a956da371322a9adc0a0d4b4c51a05561a1f56c2dd05ac87206c169886
                          • Instruction ID: 98b4b998e4efd943b35fbf22bcc315785707eaef670ebfe16855b85f8ba96b27
                          • Opcode Fuzzy Hash: 5dce05a956da371322a9adc0a0d4b4c51a05561a1f56c2dd05ac87206c169886
                          • Instruction Fuzzy Hash: 6521DF76504280CFDB06CF44D9C4B5ABF72FB88324F24C6A9D8190F65AC33AD456CBA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9e8e69627800c91139615eec12964b807436ad3c1ef0d35ac8620388f9937219
                          • Instruction ID: da2b6535f210a67f36159725a6b4fdaff9fbef4200642b49c67c5cbb6c07c29b
                          • Opcode Fuzzy Hash: 9e8e69627800c91139615eec12964b807436ad3c1ef0d35ac8620388f9937219
                          • Instruction Fuzzy Hash: B101CC323043088FC726AB3898A466E77E3AFCA114709447DE41ACF391DF359C038742
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4c5e1abc23ab156dbd23d179c1d092f3a139323ba9fe63624eace6715ee37a9e
                          • Instruction ID: 44c2ee89d005d4fb2d8294ac06aa285aad87f9f06e43ffa4865db8096d1860c5
                          • Opcode Fuzzy Hash: 4c5e1abc23ab156dbd23d179c1d092f3a139323ba9fe63624eace6715ee37a9e
                          • Instruction Fuzzy Hash: 15118E72700B048FDA69EBB9951816E77E6BFCA2103418E6DC427AB694DF34DD048B91
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2f83e6303e572fe38616ef6fee40d34602ce212a817b38458d1138325b40f5ec
                          • Instruction ID: baffdc57f7fe957adea8233e4b2b7c020ce5dd3fa978042a30d89bf466ef96e6
                          • Opcode Fuzzy Hash: 2f83e6303e572fe38616ef6fee40d34602ce212a817b38458d1138325b40f5ec
                          • Instruction Fuzzy Hash: B901C436A00215CBEB24DB68E8046EDB3B6AB89210F491135ED25AB294DF359994CB91
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0006712955fd4e991b90712a2c0d0f411980237a53d5f3185b0a4fa4af20c5de
                          • Instruction ID: d8afa56b0eae9a5af257127c00f5939f204d504b33a91842ecddba0ead42a523
                          • Opcode Fuzzy Hash: 0006712955fd4e991b90712a2c0d0f411980237a53d5f3185b0a4fa4af20c5de
                          • Instruction Fuzzy Hash: E5019630B40219DFEB05EBB8E41836E7BB6FB8C710F108129A916972D4DF354D4197D1
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 74e1bc308bc114fe6dc00db2c04e7b0b7aa6711522b0f3f0d04d4c509d53a185
                          • Instruction ID: 775fe071e760f7713ee299ebbff5aa6fecc8c88fb329d0ece47e709b25e65d52
                          • Opcode Fuzzy Hash: 74e1bc308bc114fe6dc00db2c04e7b0b7aa6711522b0f3f0d04d4c509d53a185
                          • Instruction Fuzzy Hash: 7001A771B00205CFC755EBA498127EEF7A6FB48210F048168E859EB280EB715A0087D5
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 56209059ee17683aab302b2ca62e453d1f2033de4f31ad477a1da1128b54b720
                          • Instruction ID: 14b3aafd827530e7099cb9495b8ab67cd59946e3cdfc19b56207dbf41c676adc
                          • Opcode Fuzzy Hash: 56209059ee17683aab302b2ca62e453d1f2033de4f31ad477a1da1128b54b720
                          • Instruction Fuzzy Hash: FB1122B58007488FDB20CF9AC485BDEBBF4EB48310F24841AD859A3250C3396644CFA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 67f24cf980653d5a88a6fdb990f633f04af37edc58b5e2fd6a9da2aad0003e31
                          • Instruction ID: f2504e82bb477a8bcb2bd2ed6a6033cc5f18f45843b3c441bcd740faae82e0c8
                          • Opcode Fuzzy Hash: 67f24cf980653d5a88a6fdb990f633f04af37edc58b5e2fd6a9da2aad0003e31
                          • Instruction Fuzzy Hash: B1018470900209DFEB14EFBDD5546AEBBB6EF89700B014629D852A7244DF359944CBA2
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b842c6bb226ded60edf139f7999997a45f98286a8125f659e573de06bdce0aab
                          • Instruction ID: 59d329e009bed4aca51a82ff497882098c984d5725d588a348b4698d76d47204
                          • Opcode Fuzzy Hash: b842c6bb226ded60edf139f7999997a45f98286a8125f659e573de06bdce0aab
                          • Instruction Fuzzy Hash: 36013235B00210DFDB18DF29E408A18B7A2FF98B1071981A9EC238F3B1CB32AC048B00
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5ece13db2d71b26c4b1ecb0cfd2edb473bfd21bba5858dd0bddd698cbcaa5c31
                          • Instruction ID: cbe8082575f213d10d607ab86158e4740f09c62d06777e84937335492f4631c3
                          • Opcode Fuzzy Hash: 5ece13db2d71b26c4b1ecb0cfd2edb473bfd21bba5858dd0bddd698cbcaa5c31
                          • Instruction Fuzzy Hash: 8F1112B58007498FDB10CF9AC585BDEFBF4EB49314F248459D459A7240D375A544CFA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bb4064f7b004390205025f6aba7b057845da9ad234af997711d5c4e35aceeb98
                          • Instruction ID: c75ae05cdcdea4fd46e4dd5ec67384f3fc111e918fae2e3f0515c0728176a649
                          • Opcode Fuzzy Hash: bb4064f7b004390205025f6aba7b057845da9ad234af997711d5c4e35aceeb98
                          • Instruction Fuzzy Hash: C8F0C83AB00114EFCB04D668E440AEF73F6ABCD650B2045A9E805F7350DF665E058BD0
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a39ae79e682e15a9f963ae9144660a3bde692e4dcb6b38ad6021efb92308529b
                          • Instruction ID: 90e4fec662f57bebcbeb374e37d894293a602cc5c47a854bd259ad1cb7c01eff
                          • Opcode Fuzzy Hash: a39ae79e682e15a9f963ae9144660a3bde692e4dcb6b38ad6021efb92308529b
                          • Instruction Fuzzy Hash: 26F06232B041259BCB10AAB8EC644DF7BB5AFC9710F44056DD506AB760DB2569118BD2
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fa2720a335fb36b08affa3451f6232473dfdc8138ad5bea7fd58d7ef6c33aeb5
                          • Instruction ID: d772c6ab963cf7598384f16f1832915269afbf5a0c676647df1d27b2975ffc10
                          • Opcode Fuzzy Hash: fa2720a335fb36b08affa3451f6232473dfdc8138ad5bea7fd58d7ef6c33aeb5
                          • Instruction Fuzzy Hash: BDF0C2757042109FD725DB74D858A693BF6EF8A220B1641E9E402DF3B6CB289C04CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 59cebe0d14032fc84de7c0bbe319fcf15148a01308c51120c34c97c1f743bb09
                          • Instruction ID: 94423b7bb9eae08fb715a78cf235aa764e749eb185dc0192f63be5f5a39c5213
                          • Opcode Fuzzy Hash: 59cebe0d14032fc84de7c0bbe319fcf15148a01308c51120c34c97c1f743bb09
                          • Instruction Fuzzy Hash: 2101F430904249DFD721EFACC4941AEBFB5EF85300F00462DD8526B244DF319A48CB91
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ee60011c62080a94b3f21a76429c3145c79e6dcbdfdb9cc5b711c53766f00e39
                          • Instruction ID: 4cae3c6d894a58f2c2e3001396785c52332cc774466e00345c4fe7966e73da18
                          • Opcode Fuzzy Hash: ee60011c62080a94b3f21a76429c3145c79e6dcbdfdb9cc5b711c53766f00e39
                          • Instruction Fuzzy Hash: 5EF05E75B00220DFCB19DF64E518158B762EF9871471942B9EC275F3B5DB36AC45CB40
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0c36f27781d2f8b7b497f10bb7e355e2adce9fb25e729a60628d42b7b9ce9f8a
                          • Instruction ID: 1ce128442d90633d636aa5af5cb475104a1e8873530390a022fe0486dc2c7e55
                          • Opcode Fuzzy Hash: 0c36f27781d2f8b7b497f10bb7e355e2adce9fb25e729a60628d42b7b9ce9f8a
                          • Instruction Fuzzy Hash: 42F08275700114DFD724EF74D458A2937E6AF4A620B1544A8E4029B3B5CF64DC44C790
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a7420080757657ba844feaf438e3d234ab58cc7c43bc6094135f529c056e183d
                          • Instruction ID: 263395e373352241f69af1e0cfabadb2a2627c268e711390987a480acb3c729b
                          • Opcode Fuzzy Hash: a7420080757657ba844feaf438e3d234ab58cc7c43bc6094135f529c056e183d
                          • Instruction Fuzzy Hash: 55E04F71D44309DFCB41EFA8E8813DDFBF0AB48200F0442AA881DD7211E77057118BC1
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3d2c7065f90b0a8abd9f9397502f893ee63907d850988729c98546025a1f3ecc
                          • Instruction ID: 459175fb012266c2fc2faecf479162c65d6ea80c8e45882376335bf1b85bcdb9
                          • Opcode Fuzzy Hash: 3d2c7065f90b0a8abd9f9397502f893ee63907d850988729c98546025a1f3ecc
                          • Instruction Fuzzy Hash: 8DC01232500208CBCB24FBB0E8090DC7725EE45321B144775E93A490E49B7219299740
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6f4e2d22ca00fa0b5f8afced3acdb21ffc78943c7b05c388b00332b5dc3496b3
                          • Instruction ID: 936f698852a9479bdff0ade13d0bd5b30777ce10ea493efd7ab15277b49e6438
                          • Opcode Fuzzy Hash: 6f4e2d22ca00fa0b5f8afced3acdb21ffc78943c7b05c388b00332b5dc3496b3
                          • Instruction Fuzzy Hash: 31C0923228E2A54FC31387909C608D97FB0BCC771238E09DA8585DFA97C51CBB299352
                          Memory Dump Source
                          • Source File: 00000003.00000002.3640876498.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_3150000_MSBuild.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a94105be634c4c39a67fe688ed45810982f6bbb2f03047b3f8e74219e616dbf0
                          • Instruction ID: fa79e2c9843cb9ef28a42ad733d2f35b0ceb499a4a4aa90ee714ee12e7de26a0
                          • Opcode Fuzzy Hash: a94105be634c4c39a67fe688ed45810982f6bbb2f03047b3f8e74219e616dbf0
                          • Instruction Fuzzy Hash: B6C04C6140D7C1DFCB138BA0581A6923FB65F4721571A00EBD891CE197D63A045AD726