Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
payment Receipt.exe

Overview

General Information

Sample name:payment Receipt.exe
Analysis ID:1516347
MD5:6157f908ea36740b3b3f220b0693837b
SHA1:098da8290ab14a4ccede6bd025603b30c4aad8d2
SHA256:8256eb73d2244eeb38cfe7d0c592b4017d4a83a9bbe47dc58810b34408f386c7
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected RedLine Stealer
.NET source code contains very large array initializations
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops VBS files to the startup folder
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables security privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • payment Receipt.exe (PID: 7476 cmdline: "C:\Users\user\Desktop\payment Receipt.exe" MD5: 6157F908EA36740B3B3F220B0693837B)
    • name.exe (PID: 7556 cmdline: "C:\Users\user\Desktop\payment Receipt.exe" MD5: 6157F908EA36740B3B3F220B0693837B)
      • RegSvcs.exe (PID: 7608 cmdline: "C:\Users\user\Desktop\payment Receipt.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
        • conhost.exe (PID: 7616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 8096 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • name.exe (PID: 8156 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 6157F908EA36740B3B3F220B0693837B)
      • RegSvcs.exe (PID: 7148 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
        • conhost.exe (PID: 7180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["204.10.160.224:27667"], "Bot Id": "button1"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: RegSvcs.exe PID: 7608JoeSecurity_RedLineYara detected RedLine StealerJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 8096, ProcessName: wscript.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 8096, ProcessName: wscript.exe

    Data Obfuscation

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\directory\name.exe, ProcessId: 7556, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: payment Receipt.exeAvira: detected
    Source: C:\Users\user\AppData\Local\directory\name.exeAvira: detection malicious, Label: HEUR/AGEN.1321671
    Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["204.10.160.224:27667"], "Bot Id": "button1"}
    Source: C:\Users\user\AppData\Local\directory\name.exeReversingLabs: Detection: 28%
    Source: C:\Users\user\AppData\Local\directory\name.exeVirustotal: Detection: 32%Perma Link
    Source: payment Receipt.exeVirustotal: Detection: 32%Perma Link
    Source: payment Receipt.exeReversingLabs: Detection: 28%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
    Source: C:\Users\user\AppData\Local\directory\name.exeJoe Sandbox ML: detected
    Source: payment Receipt.exeJoe Sandbox ML: detected
    Source: payment Receipt.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: Binary string: wntdll.pdbUGP source: name.exe, 00000001.00000003.1812009695.00000000047C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000001.00000003.1810768130.00000000047C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1987172894.0000000003960000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1990820476.00000000048B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb source: name.exe, 00000001.00000003.1812009695.00000000047C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000001.00000003.1810768130.00000000047C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1987172894.0000000003960000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1990820476.00000000048B0000.00000004.00001000.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_00452492
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00442886
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_004788BD
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,1_2_004339B6
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,1_2_0045CAFA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00431A86
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,1_2_0044BD27
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0045DE8F FindFirstFileW,FindClose,1_2_0045DE8F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0044BF8B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,9_2_00452492
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_00442886
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,9_2_004788BD
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,9_2_004339B6
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,9_2_0045CAFA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_00431A86
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,9_2_0044BD27
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0045DE8F FindFirstFileW,FindClose,9_2_0045DE8F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,9_2_0044BF8B
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior

    Networking

    barindex
    Source: Malware configuration extractorURLs: 204.10.160.224:27667
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002BAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.000000000338B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\^q equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002BAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.000000000338B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002BAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.000000000338B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\^q equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 0000000A.00000002.2000875485.000000000338B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldbH equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002BAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.000000000338B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `,^q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002B6A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.000000000334A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
    Source: RegSvcs.exe, 0000000A.00000002.2000875485.000000000334A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
    Source: RegSvcs.exe, 0000000A.00000002.2000875485.00000000033E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_0045A10F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,9_2_0045A10F
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002CF7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_c365e5d9-5
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_0047C81C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,9_2_0047C81C

    System Summary

    barindex
    Source: 1.2.name.exe.3b60000.1.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
    Source: 9.2.name.exe.38d0000.1.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
    Source: initial sampleStatic PE information: Filename: payment Receipt.exe
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,1_2_004333BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,9_2_004333BE
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004096A00_2_004096A0
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0042200C0_2_0042200C
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0041A2170_2_0041A217
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004122160_2_00412216
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0042435D0_2_0042435D
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004033C00_2_004033C0
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0044F4300_2_0044F430
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004125E80_2_004125E8
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0044663B0_2_0044663B
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004138010_2_00413801
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0042096F0_2_0042096F
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004129D00_2_004129D0
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004119E30_2_004119E3
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0041C9AE0_2_0041C9AE
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0047EA6F0_2_0047EA6F
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0040FA100_2_0040FA10
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0044EB590_2_0044EB59
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00423C810_2_00423C81
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00411E780_2_00411E78
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00442E0C0_2_00442E0C
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00420EC00_2_00420EC0
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0044CF170_2_0044CF17
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00444FD20_2_00444FD2
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_041FB2780_2_041FB278
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_041FEA800_2_041FEA80
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004096A01_2_004096A0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0042200C1_2_0042200C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0041A2171_2_0041A217
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004122161_2_00412216
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0042435D1_2_0042435D
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004033C01_2_004033C0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0044F4301_2_0044F430
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004125E81_2_004125E8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0044663B1_2_0044663B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004138011_2_00413801
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0042096F1_2_0042096F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004129D01_2_004129D0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004119E31_2_004119E3
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0041C9AE1_2_0041C9AE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0047EA6F1_2_0047EA6F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0040FA101_2_0040FA10
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0044EB591_2_0044EB59
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00423C811_2_00423C81
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00411E781_2_00411E78
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00442E0C1_2_00442E0C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00420EC01_2_00420EC0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0044CF171_2_0044CF17
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00444FD21_2_00444FD2
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_043126481_2_04312648
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_04315E501_2_04315E50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0101A4372_2_0101A437
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004096A09_2_004096A0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0042200C9_2_0042200C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0041A2179_2_0041A217
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004122169_2_00412216
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0042435D9_2_0042435D
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004033C09_2_004033C0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0044F4309_2_0044F430
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004125E89_2_004125E8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0044663B9_2_0044663B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004138019_2_00413801
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0042096F9_2_0042096F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004129D09_2_004129D0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004119E39_2_004119E3
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0041C9AE9_2_0041C9AE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0047EA6F9_2_0047EA6F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0040FA109_2_0040FA10
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0044EB599_2_0044EB59
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00423C819_2_00423C81
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00411E789_2_00411E78
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00442E0C9_2_00442E0C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00420EC09_2_00420EC0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0044CF179_2_0044CF17
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00444FD29_2_00444FD2
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_044086589_2_04408658
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_018CA43710_2_018CA437
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess token adjusted: SecurityJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: String function: 004115D7 appears 36 times
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: String function: 00416C70 appears 39 times
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: String function: 00445AE0 appears 65 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 0040E710 appears 44 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00401B10 appears 50 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00408F40 appears 38 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 004301F8 appears 36 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 004115D7 appears 72 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00416C70 appears 78 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 004181F2 appears 42 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00445AE0 appears 130 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 0041341F appears 36 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00422240 appears 36 times
    Source: payment Receipt.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: 1.2.name.exe.3b60000.1.raw.unpack, PBE.csCryptographic APIs: 'TransformFinalBlock'
    Source: 1.2.name.exe.3b60000.1.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
    Source: 9.2.name.exe.38d0000.1.raw.unpack, PBE.csCryptographic APIs: 'TransformFinalBlock'
    Source: 9.2.name.exe.38d0000.1.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
    Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@12/4@0/0
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,1_2_004333BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,1_2_00464EAE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,9_2_004333BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,9_2_00464EAE
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0046CB5F OleInitialize,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoInitializeSecurity,_wcslen,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046CB5F
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
    Source: C:\Users\user\Desktop\payment Receipt.exeFile created: C:\Users\user\AppData\Local\directoryJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7616:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7180:120:WilError_03
    Source: C:\Users\user\Desktop\payment Receipt.exeFile created: C:\Users\user\AppData\Local\Temp\meshummadJump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
    Source: payment Receipt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\payment Receipt.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: payment Receipt.exeVirustotal: Detection: 32%
    Source: payment Receipt.exeReversingLabs: Detection: 28%
    Source: C:\Users\user\Desktop\payment Receipt.exeFile read: C:\Users\user\Desktop\payment Receipt.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\payment Receipt.exe "C:\Users\user\Desktop\payment Receipt.exe"
    Source: C:\Users\user\Desktop\payment Receipt.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\payment Receipt.exe"
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\payment Receipt.exe"
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe"
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe"
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\payment Receipt.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\payment Receipt.exe"Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\payment Receipt.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: msdart.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: msdart.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: msdart.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: payment Receipt.exeStatic file information: File size 1496603 > 1048576
    Source: Binary string: wntdll.pdbUGP source: name.exe, 00000001.00000003.1812009695.00000000047C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000001.00000003.1810768130.00000000047C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1987172894.0000000003960000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1990820476.00000000048B0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb source: name.exe, 00000001.00000003.1812009695.00000000047C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000001.00000003.1810768130.00000000047C0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1987172894.0000000003960000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1990820476.00000000048B0000.00000004.00001000.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
    Source: payment Receipt.exeStatic PE information: real checksum: 0xa961f should be: 0x172863
    Source: name.exe.0.drStatic PE information: real checksum: 0xa961f should be: 0x172863
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00462463 push edi; ret 0_2_00462465
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00462463 push edi; ret 1_2_00462465
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00416CB5 push ecx; ret 1_2_00416CC8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00462463 push edi; ret 9_2_00462465
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00416CB5 push ecx; ret 9_2_00416CC8
    Source: C:\Users\user\Desktop\payment Receipt.exeFile created: C:\Users\user\AppData\Local\directory\name.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to dropped file
    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_0047A330
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_00434418
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,9_2_0047A330
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,9_2_00434418
    Source: C:\Users\user\Desktop\payment Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: 4315A74
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: 440827C
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.00000000033E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\^Q
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.00000000033E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,^Q
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.00000000033E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-85630
    Source: C:\Users\user\AppData\Local\directory\name.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
    Source: C:\Users\user\Desktop\payment Receipt.exeAPI coverage: 3.9 %
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 4.1 %
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 4.0 %
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_00452492
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00442886
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_004788BD
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,1_2_004339B6
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,1_2_0045CAFA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00431A86
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,1_2_0044BD27
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0045DE8F FindFirstFileW,FindClose,1_2_0045DE8F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0044BF8B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,9_2_00452492
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_00442886
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,9_2_004788BD
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,9_2_004339B6
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,9_2_0045CAFA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_00431A86
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,9_2_0044BD27
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0045DE8F FindFirstFileW,FindClose,9_2_0045DE8F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,9_2_0044BF8B
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
    Source: wscript.exe, 00000008.00000002.1912334064.00000201BEBD5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.00000000033E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,^q
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.00000000033E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.00000000033E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\^q
    Source: name.exe, 00000009.00000002.1992762485.00000000009F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#4&224f42
    Source: C:\Users\user\Desktop\payment Receipt.exeAPI call chain: ExitProcess graph end nodegraph_0-84757
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_041FB108 mov eax, dword ptr fs:[00000030h]0_2_041FB108
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_041FB168 mov eax, dword ptr fs:[00000030h]0_2_041FB168
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_041FD2D0 mov eax, dword ptr fs:[00000030h]0_2_041FD2D0
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_041FE910 mov eax, dword ptr fs:[00000030h]0_2_041FE910
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_041FE970 mov eax, dword ptr fs:[00000030h]0_2_041FE970
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_043124D8 mov eax, dword ptr fs:[00000030h]1_2_043124D8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_04312538 mov eax, dword ptr fs:[00000030h]1_2_04312538
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_043146A0 mov eax, dword ptr fs:[00000030h]1_2_043146A0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_04315CE0 mov eax, dword ptr fs:[00000030h]1_2_04315CE0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_04315D40 mov eax, dword ptr fs:[00000030h]1_2_04315D40
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_044084E8 mov eax, dword ptr fs:[00000030h]9_2_044084E8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_04408548 mov eax, dword ptr fs:[00000030h]9_2_04408548
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_04406EA8 mov eax, dword ptr fs:[00000030h]9_2_04406EA8
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0041F250 SetUnhandledExceptionFilter,1_2_0041F250
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0041A208
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00417DAA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0041F250 SetUnhandledExceptionFilter,9_2_0041F250
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0041A208
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00417DAA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 9B8008Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1033008Jump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\payment Receipt.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
    Source: name.exeBinary or memory string: Shell_TrayWnd
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002CF7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: payment Receipt.exe, name.exe.0.drBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
    Source: RegSvcs.exe, 00000002.00000002.1828971510.0000000002CF7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.00000000034E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\OFFSYMSB.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
    Source: C:\Users\user\Desktop\payment Receipt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7608, type: MEMORYSTR
    Source: name.exeBinary or memory string: WIN_XP
    Source: name.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
    Source: name.exeBinary or memory string: WIN_XPe
    Source: name.exeBinary or memory string: WIN_VISTA
    Source: name.exeBinary or memory string: WIN_7
    Source: name.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7608, type: MEMORYSTR
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
    Source: C:\Users\user\Desktop\payment Receipt.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,1_2_004652BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_00476619
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 1_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,1_2_0046CEF3
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,9_2_004652BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,9_2_00476619
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,9_2_0046CEF3
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information111
    Scripting
    2
    Valid Accounts
    2
    Native API
    111
    Scripting
    1
    Exploitation for Privilege Escalation
    11
    Disable or Modify Tools
    31
    Input Capture
    2
    System Time Discovery
    Remote Services11
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    DLL Side-Loading
    11
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol31
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt2
    Valid Accounts
    2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCron2
    Registry Run Keys / Startup Folder
    21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS116
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
    Process Injection
    1
    Masquerading
    LSA Secrets321
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
    Registry Run Keys / Startup Folder
    2
    Valid Accounts
    Cached Domain Credentials11
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
    Virtualization/Sandbox Evasion
    DCSync2
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
    Access Token Manipulation
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
    Process Injection
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1516347 Sample: payment Receipt.exe Startdate: 24/09/2024 Architecture: WINDOWS Score: 100 33 Found malware configuration 2->33 35 Antivirus / Scanner detection for submitted sample 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 8 other signatures 2->39 8 payment Receipt.exe 3 2->8         started        11 wscript.exe 1 2->11         started        process3 file4 29 C:\Users\user\AppData\Local\...\name.exe, PE32 8->29 dropped 14 name.exe 1 8->14         started        43 Windows Scripting host queries suspicious COM object (likely to drop second stage) 11->43 18 name.exe 11->18         started        signatures5 process6 file7 31 C:\Users\user\AppData\Roaming\...\name.vbs, data 14->31 dropped 45 Antivirus detection for dropped file 14->45 47 Multi AV Scanner detection for dropped file 14->47 49 Machine Learning detection for dropped file 14->49 55 2 other signatures 14->55 20 RegSvcs.exe 4 14->20         started        51 Writes to foreign memory regions 18->51 53 Maps a DLL or memory area into another process 18->53 23 RegSvcs.exe 3 18->23         started        signatures8 process9 signatures10 41 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 20->41 25 conhost.exe 20->25         started        27 conhost.exe 23->27         started        process11

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    payment Receipt.exe33%VirustotalBrowse
    payment Receipt.exe29%ReversingLabsWin32.Trojan.Generic
    payment Receipt.exe100%AviraHEUR/AGEN.1321671
    payment Receipt.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\directory\name.exe100%AviraHEUR/AGEN.1321671
    C:\Users\user\AppData\Local\directory\name.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\directory\name.exe29%ReversingLabsWin32.Trojan.Generic
    C:\Users\user\AppData\Local\directory\name.exe33%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.fontbureau.com0%URL Reputationsafe
    http://www.fontbureau.com/designersG0%URL Reputationsafe
    http://www.fontbureau.com/designers/?0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.fontbureau.com/designers?0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.fontbureau.com/designers0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.fontbureau.com/designers80%URL Reputationsafe
    http://www.fonts.com0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
    204.10.160.224:276670%Avira URL Cloudsafe
    https://api.ip.sb/ip0%Avira URL Cloudsafe
    https://api.ip.s0%Avira URL Cloudsafe
    http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
    https://api.ip.sb/ip0%VirustotalBrowse
    204.10.160.224:276670%VirustotalBrowse
    https://discord.com/api/v9/users/0%Avira URL Cloudsafe
    https://discord.com/api/v9/users/0%VirustotalBrowse
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    204.10.160.224:27667true
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.apache.org/licenses/LICENSE-2.0RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.fontbureau.comRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.fontbureau.com/designersGRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://api.ip.sb/ipRegSvcs.exe, 0000000A.00000002.2000875485.000000000334A000.00000004.00000800.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.fontbureau.com/designers/?RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.founder.com.cn/cn/bTheRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.fontbureau.com/designers?RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.tiro.comRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://api.ip.sRegSvcs.exe, 00000002.00000002.1828971510.0000000002B6A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.2000875485.000000000334A000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.fontbureau.com/designersRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.goodfont.co.krRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.carterandcone.comlRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.sajatypeworks.comRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.typography.netDRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.fontbureau.com/designers/cabarga.htmlNRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.founder.com.cn/cn/cTheRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.galapagosdesign.com/staff/dennis.htmRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.founder.com.cn/cnRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.fontbureau.com/designers/frere-user.htmlRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.jiyu-kobo.co.jp/RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://discord.com/api/v9/users/RegSvcs.exe, 0000000A.00000002.2000875485.00000000033E1000.00000004.00000800.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.galapagosdesign.com/DPleaseRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.fontbureau.com/designers8RegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.fonts.comRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.sandoll.co.krRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.urwpp.deDPleaseRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.zhongyicts.com.cnRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.sakkal.comRegSvcs.exe, 00000002.00000002.1832207211.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1516347
    Start date and time:2024-09-24 06:46:08 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 8m 32s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:13
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:payment Receipt.exe
    Detection:MAL
    Classification:mal100.troj.expl.evad.winEXE@12/4@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 61
    • Number of non-executed functions: 302
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report creation exceeded maximum time and may have missing disassembly code information.
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    05:47:13AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):1119
    Entropy (8bit):5.345080863654519
    Encrypted:false
    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
    MD5:88593431AEF401417595E7A00FE86E5F
    SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
    SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
    SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
    Process:C:\Users\user\Desktop\payment Receipt.exe
    File Type:data
    Category:dropped
    Size (bytes):550912
    Entropy (8bit):6.746318946767136
    Encrypted:false
    SSDEEP:6144:fzBnNelMBZXTKBD+9i/ung/+TQFC7a/q3MsY/7CEOcypHKvHh5vTkpiRX9H:f2G3UDs5nDTQF7VHbfRX1
    MD5:C82686577E3609EE4EC33F3B06205DD9
    SHA1:89B6F4BD7D51148E37DE63D3AF89F51057B8CED7
    SHA-256:110D1D97A150B5B06F9873A0C6688A0655FEFB46941F0CA9246E861C0E2BD7C0
    SHA-512:D1D1D21D99D5A7D2EE65247E19A9949F6B54ACF191D9ABFF69F7804BA91C7B72383C65B35B405D42D63CDC085C4F5FFA790CB849FA6168632A3EBBED294AE46E
    Malicious:false
    Reputation:low
    Preview:...OR4N7JJQ6..58.HVOQ4N7.JQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6.O58AW.AQ.G.o.Pz.naP&;v?#[)E/'qU3![W;h4*qF;Yn#?...f."'2*.9C=jJQ6RO58..VO.5M7..?.RO58OHVO.4@6EKa6R.78O.SOQ4N7..S6Ro58O.TOQ4.7NjQ6RM58KHVOQ4N7JJQ6RO58O.^OQ6N7NJQ6QOu.OHFOQ$N7NJA6R_58OHVOA4N7NJQ6RO58;.TO.4N7N.S60.08OHVOQ4N7NJQ6RO58O.^O]4N7NJQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NjQ6ZO58OHVOQ4N7FjQ6.O58OHVOQ4N7`>4N&O58..TOQ.N7N.S6RM58OHVOQ4N7NJQ6rO5Xa:%=24N7,.T6R.78O.SOQ.L7NJQ6RO58OHVO.4Nw`84Z=,58CHVOQ.F7NHQ6R)=8OHVOQ4N7NJQ6.O5zOHVOQ4N7NJQ6RO58..TOQ4N7.JQ6PO08..WO..O7GJQ6.L5>C.WO.*N7.jQ6.O58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6RO58OHVOQ4N7NJQ6RO58..(.Q..7.........H.......L*.~...D.(Y1.pM...."f..s.Q...M4Z.....Q.IY.,u....#.t.q.(.....L.s...o'Y...<..P......{...{...0....../)..D.s...e`=T...\......S...L.."#0.......{.%..o.#x...q...<:.M6..t:..>.......Y.n.7..u.E..N,K....y1..0pZ+?..:....M.Zd... .?..W..&.)..j<.u..6.E
    Process:C:\Users\user\Desktop\payment Receipt.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):1496603
    Entropy (8bit):7.604160893915081
    Encrypted:false
    SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCtI8csBhqCIn1tzNJYxtl3q7N9OzRtEXriJDj6mUgML:7JZoQrbTFZY1iaCDcoqCI1VNCD36MyrH
    MD5:6157F908EA36740B3B3F220B0693837B
    SHA1:098DA8290AB14A4CCEDE6BD025603B30C4AAD8D2
    SHA-256:8256EB73D2244EEB38CFE7D0C592B4017D4A83A9BBE47DC58810B34408F386C7
    SHA-512:260B9A1E091E28F53D494478E118A867757969035C4E46817C1E13C3BE5F47C88E2F1916E0E3E1D85D6CC0BD325F52C9ABFCC182265157448D05D357D3DFE904
    Malicious:true
    Antivirus:
    • Antivirus: Avira, Detection: 100%
    • Antivirus: Joe Sandbox ML, Detection: 100%
    • Antivirus: ReversingLabs, Detection: 29%
    • Antivirus: Virustotal, Detection: 33%, Browse
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................1b.....P.)....Q.....y.....i.......}...N......d.....`.....m.....g....Rich............PE..L....%O..........#..................e....... ....@..........................P................@.......@.........................T.......(............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.data...X........h..................@....rsrc...(............T..............@..@........................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\directory\name.exe
    File Type:data
    Category:dropped
    Size (bytes):268
    Entropy (8bit):3.4209455304240626
    Encrypted:false
    SSDEEP:6:DMM8lfm3OOQdUfcloRKUEZ+lX1Al1AE6nriIM8lfQVn:DsO+vNloRKQ1A1z4mA2n
    MD5:D3A871A22DFC23DD6763F6002299B13A
    SHA1:B7934BFD389FE7FBDC08710EDABA4C16D3EED618
    SHA-256:FEA868420602CDAF96C19BE169F6BA44178494DB3B8F6292DCD7B8A8BB194F66
    SHA-512:6166B8A0DED88F7C8F3CC1D92A44A0A112B4CFCBEEB3934005E89B32614C79BB7F7ABDBF8CF84D90D4864C425460673739935562B344AE14FFE1076F5D0F7CA9
    Malicious:true
    Reputation:moderate, very likely benign file
    Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.d.i.r.e.c.t.o.r.y.\.n.a.m.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.604160893915081
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:payment Receipt.exe
    File size:1'496'603 bytes
    MD5:6157f908ea36740b3b3f220b0693837b
    SHA1:098da8290ab14a4ccede6bd025603b30c4aad8d2
    SHA256:8256eb73d2244eeb38cfe7d0c592b4017d4a83a9bbe47dc58810b34408f386c7
    SHA512:260b9a1e091e28f53d494478e118a867757969035c4e46817c1e13c3be5f47c88e2f1916e0e3e1d85d6cc0bd325f52c9abfcc182265157448d05d357d3dfe904
    SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCtI8csBhqCIn1tzNJYxtl3q7N9OzRtEXriJDj6mUgML:7JZoQrbTFZY1iaCDcoqCI1VNCD36MyrH
    TLSH:4065F122F5D68036C1B327B19E7EF769963C79360326D29B27C42D315EA01816B39773
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
    Icon Hash:1733312925935517
    Entrypoint:0x4165c1
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    DLL Characteristics:TERMINAL_SERVER_AWARE
    Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
    Instruction
    call 00007FDCC87FBECBh
    jmp 00007FDCC87F2D3Eh
    int3
    int3
    int3
    int3
    int3
    push ebp
    mov ebp, esp
    push edi
    push esi
    mov esi, dword ptr [ebp+0Ch]
    mov ecx, dword ptr [ebp+10h]
    mov edi, dword ptr [ebp+08h]
    mov eax, ecx
    mov edx, ecx
    add eax, esi
    cmp edi, esi
    jbe 00007FDCC87F2EBAh
    cmp edi, eax
    jc 00007FDCC87F3056h
    cmp ecx, 00000080h
    jc 00007FDCC87F2ECEh
    cmp dword ptr [004A9724h], 00000000h
    je 00007FDCC87F2EC5h
    push edi
    push esi
    and edi, 0Fh
    and esi, 0Fh
    cmp edi, esi
    pop esi
    pop edi
    jne 00007FDCC87F2EB7h
    jmp 00007FDCC87F3292h
    test edi, 00000003h
    jne 00007FDCC87F2EC6h
    shr ecx, 02h
    and edx, 03h
    cmp ecx, 08h
    jc 00007FDCC87F2EDBh
    rep movsd
    jmp dword ptr [00416740h+edx*4]
    mov eax, edi
    mov edx, 00000003h
    sub ecx, 04h
    jc 00007FDCC87F2EBEh
    and eax, 03h
    add ecx, eax
    jmp dword ptr [00416654h+eax*4]
    jmp dword ptr [00416750h+ecx*4]
    nop
    jmp dword ptr [004166D4h+ecx*4]
    nop
    inc cx
    add byte ptr [eax-4BFFBE9Ah], dl
    inc cx
    add byte ptr [ebx], ah
    ror dword ptr [edx-75F877FAh], 1
    inc esi
    add dword ptr [eax+468A0147h], ecx
    add al, cl
    jmp 00007FDCCAC6B6B7h
    add esi, 03h
    add edi, 03h
    cmp ecx, 08h
    jc 00007FDCC87F2E7Eh
    rep movsd
    jmp dword ptr [00000000h+edx*4]
    Programming Language:
    • [ C ] VS2010 SP1 build 40219
    • [C++] VS2010 SP1 build 40219
    • [ C ] VS2008 SP1 build 30729
    • [IMP] VS2008 SP1 build 30729
    • [ASM] VS2010 SP1 build 40219
    • [RES] VS2010 SP1 build 40219
    • [LNK] VS2010 SP1 build 40219
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
    RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
    RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
    RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
    RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
    RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
    RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
    RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
    RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
    RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
    RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
    RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
    RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
    RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
    RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
    RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
    RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
    RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
    RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
    RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
    RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
    RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
    RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
    RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
    RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
    RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
    RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
    DLLImport
    WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
    VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
    COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
    MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
    WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
    PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
    USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
    KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
    USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
    GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
    ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
    SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
    ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
    OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
    Language of compilation systemCountry where language is spokenMap
    EnglishGreat Britain
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:00:46:58
    Start date:24/09/2024
    Path:C:\Users\user\Desktop\payment Receipt.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\payment Receipt.exe"
    Imagebase:0x400000
    File size:1'496'603 bytes
    MD5 hash:6157F908EA36740B3B3F220B0693837B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:1
    Start time:00:47:06
    Start date:24/09/2024
    Path:C:\Users\user\AppData\Local\directory\name.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\payment Receipt.exe"
    Imagebase:0x400000
    File size:1'496'603 bytes
    MD5 hash:6157F908EA36740B3B3F220B0693837B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Antivirus matches:
    • Detection: 100%, Avira
    • Detection: 100%, Joe Sandbox ML
    • Detection: 29%, ReversingLabs
    • Detection: 33%, Virustotal, Browse
    Reputation:low
    Has exited:true

    Target ID:2
    Start time:00:47:12
    Start date:24/09/2024
    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\payment Receipt.exe"
    Imagebase:0x780000
    File size:45'984 bytes
    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:00:47:12
    Start date:24/09/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:00:47:21
    Start date:24/09/2024
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
    Imagebase:0x7ff7dd590000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:9
    Start time:00:47:22
    Start date:24/09/2024
    Path:C:\Users\user\AppData\Local\directory\name.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
    Imagebase:0x400000
    File size:1'496'603 bytes
    MD5 hash:6157F908EA36740B3B3F220B0693837B
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:10
    Start time:00:47:30
    Start date:24/09/2024
    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
    Imagebase:0xf90000
    File size:45'984 bytes
    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:11
    Start time:00:47:30
    Start date:24/09/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:3.4%
      Dynamic/Decrypted Code Coverage:0.4%
      Signature Coverage:9.6%
      Total number of Nodes:2000
      Total number of Limit Nodes:36
      execution_graph 84162 4010e0 84165 401100 84162->84165 84164 4010f8 84166 401113 84165->84166 84167 401184 84166->84167 84168 40114c 84166->84168 84175 401120 84166->84175 84199 401182 84166->84199 84203 401250 84167->84203 84170 401151 84168->84170 84171 40119d 84168->84171 84169 40112c DefWindowProcW 84169->84164 84173 401219 84170->84173 84174 40115d 84170->84174 84177 4011a3 84171->84177 84178 42afb4 84171->84178 84173->84175 84181 401225 84173->84181 84179 401163 84174->84179 84180 42b01d 84174->84180 84175->84169 84224 401000 Shell_NotifyIconW _memcpy_s 84175->84224 84176 401193 84176->84164 84177->84175 84184 4011b6 KillTimer 84177->84184 84185 4011db SetTimer RegisterWindowMessageW 84177->84185 84219 40f190 10 API calls 84178->84219 84186 42afe9 84179->84186 84187 40116c 84179->84187 84180->84169 84223 4370f4 52 API calls 84180->84223 84235 468b0e 74 API calls _memcpy_s 84181->84235 84218 401000 Shell_NotifyIconW _memcpy_s 84184->84218 84185->84176 84191 401204 CreatePopupMenu 84185->84191 84221 40f190 10 API calls 84186->84221 84187->84175 84193 401174 84187->84193 84188 42b04f 84225 40e0c0 84188->84225 84191->84164 84220 45fd57 65 API calls _memcpy_s 84193->84220 84196 42afe4 84196->84176 84197 42b00e 84222 401a50 330 API calls 84197->84222 84198 4011c9 PostQuitMessage 84198->84164 84199->84169 84202 42afdc 84202->84169 84202->84196 84204 401262 _memcpy_s 84203->84204 84205 4012e8 84203->84205 84236 401b80 84204->84236 84205->84176 84207 40128c 84208 4012d1 KillTimer SetTimer 84207->84208 84209 4012bb 84207->84209 84210 4272ec 84207->84210 84208->84205 84213 4012c5 84209->84213 84214 42733f 84209->84214 84211 4272f4 Shell_NotifyIconW 84210->84211 84212 42731a Shell_NotifyIconW 84210->84212 84211->84208 84212->84208 84213->84208 84217 427393 Shell_NotifyIconW 84213->84217 84215 427348 Shell_NotifyIconW 84214->84215 84216 42736e Shell_NotifyIconW 84214->84216 84215->84208 84216->84208 84217->84208 84218->84198 84219->84176 84220->84202 84221->84197 84222->84199 84223->84199 84224->84188 84227 40e0e7 _memcpy_s 84225->84227 84226 40e142 84233 40e184 84226->84233 84334 4341e6 63 API calls __wcsicoll 84226->84334 84227->84226 84228 42729f DestroyIcon 84227->84228 84228->84226 84230 40e1a0 Shell_NotifyIconW 84232 401b80 54 API calls 84230->84232 84231 4272db Shell_NotifyIconW 84234 40e1ba 84232->84234 84233->84230 84233->84231 84234->84199 84235->84196 84237 401b9c 84236->84237 84257 401c7e 84236->84257 84258 4013c0 84237->84258 84240 42722b LoadStringW 84243 427246 84240->84243 84241 401bb9 84263 402160 84241->84263 84277 40e0a0 84243->84277 84244 401bcd 84246 427258 84244->84246 84247 401bda 84244->84247 84281 40d200 52 API calls 2 library calls 84246->84281 84247->84243 84248 401be4 84247->84248 84276 40d200 52 API calls 2 library calls 84248->84276 84251 427267 84252 42727b 84251->84252 84254 401bf3 _memcpy_s _wcscpy _wcsncpy 84251->84254 84282 40d200 52 API calls 2 library calls 84252->84282 84256 401c62 Shell_NotifyIconW 84254->84256 84255 427289 84256->84257 84257->84207 84283 4115d7 84258->84283 84264 426daa 84263->84264 84265 40216b _wcslen 84263->84265 84321 40c600 84264->84321 84268 402180 84265->84268 84269 40219e 84265->84269 84267 426db5 84267->84244 84320 403bd0 52 API calls moneypunct 84268->84320 84270 4013a0 52 API calls 84269->84270 84272 4021a5 84270->84272 84274 426db7 84272->84274 84275 4115d7 52 API calls 84272->84275 84273 402187 _memmove 84273->84244 84275->84273 84276->84254 84278 40e0b2 84277->84278 84279 40e0a8 84277->84279 84278->84254 84333 403c30 52 API calls _memmove 84279->84333 84281->84251 84282->84255 84285 4115e1 _malloc 84283->84285 84286 4013e4 84285->84286 84288 4115fd std::exception::exception 84285->84288 84297 4135bb 84285->84297 84294 4013a0 84286->84294 84292 41163b 84288->84292 84311 41130a 51 API calls __cinit 84288->84311 84289 411645 84313 418105 RaiseException 84289->84313 84312 4180af 46 API calls std::exception::operator= 84292->84312 84293 411656 84295 4115d7 52 API calls 84294->84295 84296 4013a7 84295->84296 84296->84240 84296->84241 84298 413638 _malloc 84297->84298 84306 4135c9 _malloc 84297->84306 84319 417f77 46 API calls __getptd_noexit 84298->84319 84301 4135f7 RtlAllocateHeap 84301->84306 84310 413630 84301->84310 84303 413624 84317 417f77 46 API calls __getptd_noexit 84303->84317 84306->84301 84306->84303 84307 413622 84306->84307 84308 4135d4 84306->84308 84318 417f77 46 API calls __getptd_noexit 84307->84318 84308->84306 84314 418901 46 API calls __NMSG_WRITE 84308->84314 84315 418752 46 API calls 7 library calls 84308->84315 84316 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84308->84316 84310->84285 84311->84292 84312->84289 84313->84293 84314->84308 84315->84308 84317->84307 84318->84310 84319->84310 84320->84273 84322 40c619 84321->84322 84323 40c60a 84321->84323 84322->84267 84323->84322 84326 4026f0 84323->84326 84325 426d7a _memmove 84325->84267 84327 426873 84326->84327 84328 4026ff 84326->84328 84329 4013a0 52 API calls 84327->84329 84328->84325 84330 42687b 84329->84330 84331 4115d7 52 API calls 84330->84331 84332 42689e _memmove 84331->84332 84332->84325 84333->84278 84334->84233 84335 40bd20 84336 428194 84335->84336 84345 40bd2d 84335->84345 84337 40bd43 84336->84337 84339 4281bc 84336->84339 84341 4281b2 84336->84341 84357 45e987 86 API calls moneypunct 84339->84357 84356 40b510 VariantClear 84341->84356 84343 40bd37 84347 40bd50 84343->84347 84345->84343 84358 4531b1 85 API calls 5 library calls 84345->84358 84346 4281ba 84348 426cf1 84347->84348 84349 40bd63 84347->84349 84368 44cde9 52 API calls _memmove 84348->84368 84359 40bd80 84349->84359 84352 426cfc 84354 40e0a0 52 API calls 84352->84354 84353 40bd73 84353->84337 84355 426d02 84354->84355 84356->84346 84357->84345 84358->84343 84360 40bd8e 84359->84360 84361 40bdb7 _memmove 84359->84361 84360->84361 84362 40bded 84360->84362 84363 40bdad 84360->84363 84361->84353 84365 4115d7 52 API calls 84362->84365 84369 402f00 84363->84369 84366 40bdf6 84365->84366 84366->84361 84367 4115d7 52 API calls 84366->84367 84367->84361 84368->84352 84370 402f0c 84369->84370 84371 402f10 84369->84371 84370->84361 84372 4115d7 52 API calls 84371->84372 84373 4268c3 84371->84373 84374 402f51 moneypunct _memmove 84372->84374 84374->84361 84375 425ba2 84380 40e360 84375->84380 84377 425bb4 84396 41130a 51 API calls __cinit 84377->84396 84379 425bbe 84381 4115d7 52 API calls 84380->84381 84382 40e3ec GetModuleFileNameW 84381->84382 84397 413a0e 84382->84397 84384 40e421 _wcsncat 84400 413a9e 84384->84400 84387 4115d7 52 API calls 84388 40e45e _wcscpy 84387->84388 84403 40bc70 84388->84403 84392 40e4a9 84392->84377 84393 401c90 52 API calls 84395 40e4a1 _wcscat _wcslen _wcsncpy 84393->84395 84394 4115d7 52 API calls 84394->84395 84395->84392 84395->84393 84395->84394 84396->84379 84422 413801 84397->84422 84452 419efd 84400->84452 84404 4115d7 52 API calls 84403->84404 84405 40bc98 84404->84405 84406 4115d7 52 API calls 84405->84406 84407 40bca6 84406->84407 84408 40e4c0 84407->84408 84464 403350 84408->84464 84410 40e4cb RegOpenKeyExW 84411 427190 RegQueryValueExW 84410->84411 84412 40e4eb 84410->84412 84413 4271b0 84411->84413 84414 42721a RegCloseKey 84411->84414 84412->84395 84415 4115d7 52 API calls 84413->84415 84414->84395 84416 4271cb 84415->84416 84471 43652f 52 API calls 84416->84471 84418 4271d8 RegQueryValueExW 84419 42720e 84418->84419 84420 4271f7 84418->84420 84419->84414 84421 402160 52 API calls 84420->84421 84421->84419 84423 41389e 84422->84423 84429 41381a 84422->84429 84424 4139e8 84423->84424 84426 413a00 84423->84426 84449 417f77 46 API calls __getptd_noexit 84424->84449 84451 417f77 46 API calls __getptd_noexit 84426->84451 84427 4139ed 84450 417f25 10 API calls __close 84427->84450 84429->84423 84437 41388a 84429->84437 84444 419e30 46 API calls 2 library calls 84429->84444 84432 41396c 84432->84423 84433 413967 84432->84433 84435 41397a 84432->84435 84433->84384 84434 413929 84434->84423 84436 413945 84434->84436 84446 419e30 46 API calls 2 library calls 84434->84446 84448 419e30 46 API calls 2 library calls 84435->84448 84436->84423 84436->84433 84440 41395b 84436->84440 84437->84423 84443 413909 84437->84443 84445 419e30 46 API calls 2 library calls 84437->84445 84447 419e30 46 API calls 2 library calls 84440->84447 84443->84432 84443->84434 84444->84437 84445->84443 84446->84436 84447->84433 84448->84433 84449->84427 84450->84433 84451->84433 84453 419f13 84452->84453 84454 419f0e 84452->84454 84461 417f77 46 API calls __getptd_noexit 84453->84461 84454->84453 84458 419f2b 84454->84458 84456 419f18 84462 417f25 10 API calls __close 84456->84462 84460 40e454 84458->84460 84463 417f77 46 API calls __getptd_noexit 84458->84463 84460->84387 84461->84456 84462->84460 84463->84456 84465 403367 84464->84465 84466 403358 84464->84466 84467 4115d7 52 API calls 84465->84467 84466->84410 84468 403370 84467->84468 84469 4115d7 52 API calls 84468->84469 84470 40339e 84469->84470 84470->84410 84471->84418 84472 437081 VariantClear 84473 416454 84510 416c70 84473->84510 84475 416460 GetStartupInfoW 84476 416474 84475->84476 84511 419d5a HeapCreate 84476->84511 84478 4164cd 84479 4164d8 84478->84479 84595 41642b 46 API calls 3 library calls 84478->84595 84512 417c20 GetModuleHandleW 84479->84512 84482 4164de 84483 4164e9 __RTC_Initialize 84482->84483 84596 41642b 46 API calls 3 library calls 84482->84596 84531 41aaa1 GetStartupInfoW 84483->84531 84487 416503 GetCommandLineW 84544 41f584 GetEnvironmentStringsW 84487->84544 84491 416513 84550 41f4d6 GetModuleFileNameW 84491->84550 84493 41651d 84494 416528 84493->84494 84598 411924 46 API calls 3 library calls 84493->84598 84554 41f2a4 84494->84554 84497 41652e 84498 416539 84497->84498 84599 411924 46 API calls 3 library calls 84497->84599 84568 411703 84498->84568 84501 416541 84503 41654c __wwincmdln 84501->84503 84600 411924 46 API calls 3 library calls 84501->84600 84572 40d6b0 84503->84572 84506 41657c 84602 411906 46 API calls _doexit 84506->84602 84509 416581 __close 84510->84475 84511->84478 84513 417c34 84512->84513 84514 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 84512->84514 84603 4178ff 49 API calls _free 84513->84603 84515 417c87 TlsAlloc 84514->84515 84519 417cd5 TlsSetValue 84515->84519 84520 417d96 84515->84520 84518 417c39 84518->84482 84519->84520 84521 417ce6 __init_pointers 84519->84521 84520->84482 84604 418151 InitializeCriticalSectionAndSpinCount 84521->84604 84523 417d91 84612 4178ff 49 API calls _free 84523->84612 84525 417d2a 84525->84523 84605 416b49 84525->84605 84528 417d76 84611 41793c 46 API calls 4 library calls 84528->84611 84530 417d7e GetCurrentThreadId 84530->84520 84532 416b49 __calloc_crt 46 API calls 84531->84532 84543 41aabf 84532->84543 84533 41ac34 84534 41ac6a GetStdHandle 84533->84534 84536 41acce SetHandleCount 84533->84536 84537 41ac7c GetFileType 84533->84537 84542 41aca2 InitializeCriticalSectionAndSpinCount 84533->84542 84534->84533 84535 416b49 __calloc_crt 46 API calls 84535->84543 84538 4164f7 84536->84538 84537->84533 84538->84487 84597 411924 46 API calls 3 library calls 84538->84597 84539 41abb4 84539->84533 84540 41abe0 GetFileType 84539->84540 84541 41abeb InitializeCriticalSectionAndSpinCount 84539->84541 84540->84539 84540->84541 84541->84538 84541->84539 84542->84533 84542->84538 84543->84533 84543->84535 84543->84538 84543->84539 84543->84543 84545 41f595 84544->84545 84546 41f599 84544->84546 84545->84491 84622 416b04 84546->84622 84548 41f5bb _memmove 84549 41f5c2 FreeEnvironmentStringsW 84548->84549 84549->84491 84551 41f50b _wparse_cmdline 84550->84551 84552 416b04 __malloc_crt 46 API calls 84551->84552 84553 41f54e _wparse_cmdline 84551->84553 84552->84553 84553->84493 84555 41f2bc _wcslen 84554->84555 84559 41f2b4 84554->84559 84556 416b49 __calloc_crt 46 API calls 84555->84556 84561 41f2e0 _wcslen 84556->84561 84557 41f336 84629 413748 84557->84629 84559->84497 84560 416b49 __calloc_crt 46 API calls 84560->84561 84561->84557 84561->84559 84561->84560 84562 41f35c 84561->84562 84565 41f373 84561->84565 84628 41ef12 46 API calls 2 library calls 84561->84628 84563 413748 _free 46 API calls 84562->84563 84563->84559 84635 417ed3 84565->84635 84567 41f37f 84567->84497 84569 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 84568->84569 84571 411750 __IsNonwritableInCurrentImage 84569->84571 84654 41130a 51 API calls __cinit 84569->84654 84571->84501 84573 42e2f3 84572->84573 84574 40d6cc 84572->84574 84655 408f40 84574->84655 84576 40d707 84659 40ebb0 84576->84659 84579 40d737 84662 411951 84579->84662 84584 40d751 84674 40f4e0 SystemParametersInfoW SystemParametersInfoW 84584->84674 84586 40d75f 84675 40d590 GetCurrentDirectoryW 84586->84675 84588 40d767 SystemParametersInfoW 84589 40d794 84588->84589 84590 40d78d FreeLibrary 84588->84590 84591 408f40 VariantClear 84589->84591 84590->84589 84592 40d79d 84591->84592 84593 408f40 VariantClear 84592->84593 84594 40d7a6 84593->84594 84594->84506 84601 4118da 46 API calls _doexit 84594->84601 84595->84479 84596->84483 84601->84506 84602->84509 84603->84518 84604->84525 84606 416b52 84605->84606 84608 416b8f 84606->84608 84609 416b70 Sleep 84606->84609 84613 41f677 84606->84613 84608->84523 84608->84528 84610 416b85 84609->84610 84610->84606 84610->84608 84611->84530 84612->84520 84614 41f683 84613->84614 84615 41f69e _malloc 84613->84615 84614->84615 84616 41f68f 84614->84616 84618 41f6b1 HeapAlloc 84615->84618 84620 41f6d8 84615->84620 84621 417f77 46 API calls __getptd_noexit 84616->84621 84618->84615 84618->84620 84619 41f694 84619->84606 84620->84606 84621->84619 84623 416b0d 84622->84623 84624 4135bb _malloc 45 API calls 84623->84624 84625 416b43 84623->84625 84626 416b24 Sleep 84623->84626 84624->84623 84625->84548 84627 416b39 84626->84627 84627->84623 84627->84625 84628->84561 84630 413753 RtlFreeHeap 84629->84630 84634 41377c __dosmaperr 84629->84634 84631 413768 84630->84631 84630->84634 84638 417f77 46 API calls __getptd_noexit 84631->84638 84633 41376e GetLastError 84633->84634 84634->84559 84639 417daa 84635->84639 84638->84633 84640 417dc9 _memcpy_s __call_reportfault 84639->84640 84641 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 84640->84641 84644 417eb5 __call_reportfault 84641->84644 84643 417ed1 GetCurrentProcess TerminateProcess 84643->84567 84645 41a208 84644->84645 84646 41a210 84645->84646 84647 41a212 IsDebuggerPresent 84645->84647 84646->84643 84653 41fe19 84647->84653 84650 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 84651 421ff0 __call_reportfault 84650->84651 84652 421ff8 GetCurrentProcess TerminateProcess 84650->84652 84651->84652 84652->84643 84653->84650 84654->84571 84656 408f48 moneypunct 84655->84656 84657 4265c7 VariantClear 84656->84657 84658 408f55 moneypunct 84656->84658 84657->84658 84658->84576 84715 40ebd0 84659->84715 84719 4182cb 84662->84719 84664 41195e 84726 4181f2 LeaveCriticalSection 84664->84726 84666 40d748 84667 4119b0 84666->84667 84668 4119d6 84667->84668 84669 4119bc 84667->84669 84668->84584 84669->84668 84761 417f77 46 API calls __getptd_noexit 84669->84761 84671 4119c6 84762 417f25 10 API calls __close 84671->84762 84673 4119d1 84673->84584 84674->84586 84763 401f20 84675->84763 84677 40d5b6 IsDebuggerPresent 84678 40d5c4 84677->84678 84679 42e1bb MessageBoxA 84677->84679 84680 42e1d4 84678->84680 84681 40d5e3 84678->84681 84679->84680 84935 403a50 52 API calls 3 library calls 84680->84935 84833 40f520 84681->84833 84685 40d5fd GetFullPathNameW 84845 401460 84685->84845 84687 40d63b 84688 40d643 84687->84688 84690 42e231 SetCurrentDirectoryW 84687->84690 84689 40d64c 84688->84689 84936 432fee 6 API calls 84688->84936 84860 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 84689->84860 84690->84688 84693 42e252 84693->84689 84695 42e25a GetModuleFileNameW 84693->84695 84697 42e274 84695->84697 84698 42e2cb GetForegroundWindow ShellExecuteW 84695->84698 84937 401b10 84697->84937 84705 40d688 84698->84705 84699 40d656 84701 40d669 84699->84701 84703 40e0c0 74 API calls 84699->84703 84868 4091e0 84701->84868 84703->84701 84708 40d692 SetCurrentDirectoryW 84705->84708 84708->84588 84709 42e28d 84944 40d200 52 API calls 2 library calls 84709->84944 84712 42e299 GetForegroundWindow ShellExecuteW 84713 42e2c6 84712->84713 84713->84705 84714 40ec00 LoadLibraryA GetProcAddress 84714->84579 84716 40d72e 84715->84716 84717 40ebd6 LoadLibraryA 84715->84717 84716->84579 84716->84714 84717->84716 84718 40ebe7 GetProcAddress 84717->84718 84718->84716 84720 4182e0 84719->84720 84721 4182f3 EnterCriticalSection 84719->84721 84727 418209 84720->84727 84721->84664 84723 4182e6 84723->84721 84754 411924 46 API calls 3 library calls 84723->84754 84726->84666 84728 418215 __close 84727->84728 84729 418225 84728->84729 84730 41823d 84728->84730 84755 418901 46 API calls __NMSG_WRITE 84729->84755 84732 416b04 __malloc_crt 45 API calls 84730->84732 84738 41824b __close 84730->84738 84734 418256 84732->84734 84733 41822a 84756 418752 46 API calls 7 library calls 84733->84756 84736 41825d 84734->84736 84737 41826c 84734->84737 84758 417f77 46 API calls __getptd_noexit 84736->84758 84741 4182cb __lock 45 API calls 84737->84741 84738->84723 84739 418231 84757 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 84739->84757 84743 418273 84741->84743 84745 4182a6 84743->84745 84746 41827b InitializeCriticalSectionAndSpinCount 84743->84746 84747 413748 _free 45 API calls 84745->84747 84748 418297 84746->84748 84749 41828b 84746->84749 84747->84748 84760 4182c2 LeaveCriticalSection _doexit 84748->84760 84750 413748 _free 45 API calls 84749->84750 84752 418291 84750->84752 84759 417f77 46 API calls __getptd_noexit 84752->84759 84755->84733 84756->84739 84758->84738 84759->84748 84760->84738 84761->84671 84762->84673 84945 40e6e0 84763->84945 84767 401f41 GetModuleFileNameW 84963 410100 84767->84963 84769 401f5c 84975 410960 84769->84975 84772 401b10 52 API calls 84773 401f81 84772->84773 84978 401980 84773->84978 84775 401f8e 84776 408f40 VariantClear 84775->84776 84777 401f9d 84776->84777 84778 401b10 52 API calls 84777->84778 84779 401fb4 84778->84779 84780 401980 53 API calls 84779->84780 84781 401fc3 84780->84781 84782 401b10 52 API calls 84781->84782 84783 401fd2 84782->84783 84986 40c2c0 84783->84986 84785 401fe1 84786 40bc70 52 API calls 84785->84786 84787 401ff3 84786->84787 85004 401a10 84787->85004 84789 401ffe 85011 4114ab 84789->85011 84792 428b05 84794 401a10 52 API calls 84792->84794 84793 402017 84795 4114ab __wcsicoll 58 API calls 84793->84795 84796 428b18 84794->84796 84797 402022 84795->84797 84799 401a10 52 API calls 84796->84799 84797->84796 84798 40202d 84797->84798 84800 4114ab __wcsicoll 58 API calls 84798->84800 84801 428b33 84799->84801 84802 402038 84800->84802 84804 428b3b GetModuleFileNameW 84801->84804 84803 402043 84802->84803 84802->84804 84805 4114ab __wcsicoll 58 API calls 84803->84805 84806 401a10 52 API calls 84804->84806 84807 40204e 84805->84807 84808 428b6c 84806->84808 84809 402092 84807->84809 84813 401a10 52 API calls 84807->84813 84819 428b90 _wcscpy 84807->84819 84810 40e0a0 52 API calls 84808->84810 84812 4020a3 84809->84812 84809->84819 84811 428b7a 84810->84811 84814 401a10 52 API calls 84811->84814 84815 428bc6 84812->84815 85019 40e830 53 API calls 84812->85019 84817 402073 _wcscpy 84813->84817 84818 428b88 84814->84818 84824 401a10 52 API calls 84817->84824 84818->84819 84820 401a10 52 API calls 84819->84820 84828 4020d0 84820->84828 84821 4020bb 85020 40cf00 53 API calls 84821->85020 84823 4020c6 84825 408f40 VariantClear 84823->84825 84824->84809 84825->84828 84826 402110 84830 408f40 VariantClear 84826->84830 84828->84826 84832 401a10 52 API calls 84828->84832 85021 40cf00 53 API calls 84828->85021 85022 40e6a0 53 API calls 84828->85022 84831 402120 moneypunct 84830->84831 84831->84677 84832->84828 84834 4295c9 _memcpy_s 84833->84834 84835 40f53c 84833->84835 84837 4295d9 GetOpenFileNameW 84834->84837 85698 410120 84835->85698 84837->84835 84839 40d5f5 84837->84839 84838 40f545 85702 4102b0 SHGetMalloc 84838->85702 84839->84685 84839->84687 84841 40f54c 85707 410190 GetFullPathNameW 84841->85707 84843 40f559 85718 40f570 84843->85718 85780 402400 84845->85780 84847 40146f 84849 428c29 _wcscat 84847->84849 85789 401500 84847->85789 84850 40147c 84850->84849 85797 40d440 84850->85797 84852 401489 84852->84849 84853 401491 GetFullPathNameW 84852->84853 84854 402160 52 API calls 84853->84854 84855 4014bb 84854->84855 84856 402160 52 API calls 84855->84856 84857 4014c8 84856->84857 84857->84849 84858 402160 52 API calls 84857->84858 84859 4014ee 84858->84859 84859->84687 84861 428361 84860->84861 84862 4103fc LoadImageW RegisterClassExW 84860->84862 85817 44395e EnumResourceNamesW LoadImageW 84861->85817 85816 410490 7 API calls 84862->85816 84865 40d651 84867 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 84865->84867 84866 428368 84867->84699 84869 409202 84868->84869 84870 42d7ad 84868->84870 84894 409216 moneypunct 84869->84894 86089 410940 330 API calls 84869->86089 86092 45e737 90 API calls 3 library calls 84870->86092 84873 409386 84874 40939c 84873->84874 86090 40f190 10 API calls 84873->86090 84874->84705 84934 401000 Shell_NotifyIconW _memcpy_s 84874->84934 84876 4095b2 84876->84874 84877 4095bf 84876->84877 86091 401a50 330 API calls 84877->86091 84878 409253 PeekMessageW 84878->84894 84880 40d410 VariantClear 84880->84894 84881 42d8cd Sleep 84881->84894 84882 4095c6 LockWindowUpdate DestroyWindow GetMessageW 84882->84874 84885 4095f9 84882->84885 84884 42e13b 86110 40d410 VariantClear 84884->86110 84887 42e158 TranslateMessage DispatchMessageW GetMessageW 84885->84887 84887->84887 84890 42e188 84887->84890 84889 409567 PeekMessageW 84889->84894 84890->84874 84893 44c29d 52 API calls 84905 4094e0 84893->84905 84894->84873 84894->84878 84894->84880 84894->84881 84894->84884 84894->84889 84896 46f3c1 107 API calls 84894->84896 84897 40e0a0 52 API calls 84894->84897 84898 409551 TranslateMessage DispatchMessageW 84894->84898 84900 42dcd2 WaitForSingleObject 84894->84900 84901 42dd3d Sleep 84894->84901 84894->84905 84907 4094cf Sleep 84894->84907 84911 42d94d timeGetTime 84894->84911 84916 47d33e 308 API calls 84894->84916 84927 45e737 90 API calls 84894->84927 84930 42e0cc VariantClear 84894->84930 84931 408f40 VariantClear 84894->84931 85818 4091b0 84894->85818 85876 40afa0 84894->85876 85902 408fc0 84894->85902 85937 408cc0 84894->85937 85951 40d150 84894->85951 85956 40d170 84894->85956 85962 4096a0 84894->85962 86093 465124 53 API calls 84894->86093 86094 40c620 timeGetTime 84894->86094 86109 40e270 VariantClear moneypunct 84894->86109 84895 46fdbf 108 API calls 84895->84905 84896->84894 84897->84894 84898->84889 84900->84894 84902 42dcf0 GetExitCodeProcess CloseHandle 84900->84902 84901->84905 86099 40d410 VariantClear 84902->86099 84905->84893 84905->84894 84905->84895 84909 408f40 VariantClear 84905->84909 84912 40c620 timeGetTime 84905->84912 84915 465124 53 API calls 84905->84915 84917 42dd89 CloseHandle 84905->84917 84919 42de19 GetExitCodeProcess CloseHandle 84905->84919 84920 401b10 52 API calls 84905->84920 84923 42de88 Sleep 84905->84923 84925 401980 53 API calls 84905->84925 86096 45178a 54 API calls 84905->86096 86097 47d33e 330 API calls 84905->86097 86098 453bc6 54 API calls 84905->86098 86100 40d410 VariantClear 84905->86100 86101 443d19 67 API calls _wcslen 84905->86101 86102 4574b4 VariantClear 84905->86102 86103 403cd0 84905->86103 86107 4731e1 VariantClear 84905->86107 86108 4331a2 6 API calls 84905->86108 84907->84905 84909->84905 86095 465124 53 API calls 84911->86095 84912->84905 84915->84905 84916->84894 84917->84905 84919->84905 84920->84905 84923->84894 84925->84905 84927->84894 84930->84894 84931->84894 84934->84705 84935->84687 84936->84693 84938 401b16 _wcslen 84937->84938 84939 4115d7 52 API calls 84938->84939 84942 401b63 84938->84942 84940 401b4b _memmove 84939->84940 84941 4115d7 52 API calls 84940->84941 84941->84942 84943 40d200 52 API calls 2 library calls 84942->84943 84943->84709 84944->84712 84946 40bc70 52 API calls 84945->84946 84947 401f31 84946->84947 84948 402560 84947->84948 84949 40256d __write_nolock 84948->84949 84950 402160 52 API calls 84949->84950 84952 402593 84950->84952 84962 4025bd 84952->84962 85023 401c90 84952->85023 84953 4026f0 52 API calls 84953->84962 84954 4026a7 84955 401b10 52 API calls 84954->84955 84961 4026db 84954->84961 84957 4026d1 84955->84957 84956 401b10 52 API calls 84956->84962 85027 40d7c0 52 API calls 2 library calls 84957->85027 84958 401c90 52 API calls 84958->84962 84961->84767 84962->84953 84962->84954 84962->84956 84962->84958 85026 40d7c0 52 API calls 2 library calls 84962->85026 85028 40f760 84963->85028 84966 410118 84966->84769 84968 42805d 84969 42806a 84968->84969 85084 431e58 84968->85084 84971 413748 _free 46 API calls 84969->84971 84972 428078 84971->84972 84973 431e58 82 API calls 84972->84973 84974 428084 84973->84974 84974->84769 84976 4115d7 52 API calls 84975->84976 84977 401f74 84976->84977 84977->84772 84979 4019a3 84978->84979 84983 401985 84978->84983 84980 4019b8 84979->84980 84979->84983 85687 403e10 53 API calls 84980->85687 84982 40199f 84982->84775 84983->84982 85686 403e10 53 API calls 84983->85686 84984 4019c4 84984->84775 84987 40c2c7 84986->84987 84988 40c30e 84986->84988 84989 40c2d3 84987->84989 84990 426c79 84987->84990 84991 40c315 84988->84991 84992 426c2b 84988->84992 85688 403ea0 52 API calls __cinit 84989->85688 85693 4534e3 52 API calls 84990->85693 84996 40c321 84991->84996 85001 426c5a 84991->85001 84994 426c4b 84992->84994 84995 426c2e 84992->84995 85691 4534e3 52 API calls 84994->85691 85003 40c2de 84995->85003 85690 4534e3 52 API calls 84995->85690 85689 403ea0 52 API calls __cinit 84996->85689 85692 4534e3 52 API calls 85001->85692 85003->84785 85005 401a30 85004->85005 85006 401a17 85004->85006 85008 402160 52 API calls 85005->85008 85007 401a2d 85006->85007 85694 403c30 52 API calls _memmove 85006->85694 85007->84789 85010 401a3d 85008->85010 85010->84789 85012 411523 85011->85012 85013 4114ba 85011->85013 85697 4113a8 58 API calls 4 library calls 85012->85697 85018 40200c 85013->85018 85695 417f77 46 API calls __getptd_noexit 85013->85695 85016 4114c6 85696 417f25 10 API calls __close 85016->85696 85018->84792 85018->84793 85019->84821 85020->84823 85021->84828 85022->84828 85024 4026f0 52 API calls 85023->85024 85025 401c97 85024->85025 85025->84952 85026->84962 85027->84961 85088 40f6f0 85028->85088 85030 40f77b _strcat moneypunct 85096 40f850 85030->85096 85035 427c2a 85125 414d04 85035->85125 85037 40f7fc 85037->85035 85039 40f804 85037->85039 85112 414a46 85039->85112 85043 40f80e 85043->84966 85047 4528bd 85043->85047 85044 427c59 85131 414fe2 85044->85131 85046 427c79 85048 4150d1 _fseek 81 API calls 85047->85048 85049 452930 85048->85049 85628 452719 85049->85628 85052 452948 85052->84968 85053 414d04 __fread_nolock 61 API calls 85054 452966 85053->85054 85055 414d04 __fread_nolock 61 API calls 85054->85055 85056 452976 85055->85056 85057 414d04 __fread_nolock 61 API calls 85056->85057 85058 45298f 85057->85058 85059 414d04 __fread_nolock 61 API calls 85058->85059 85060 4529aa 85059->85060 85061 4150d1 _fseek 81 API calls 85060->85061 85062 4529c4 85061->85062 85063 4135bb _malloc 46 API calls 85062->85063 85064 4529cf 85063->85064 85065 4135bb _malloc 46 API calls 85064->85065 85066 4529db 85065->85066 85067 414d04 __fread_nolock 61 API calls 85066->85067 85068 4529ec 85067->85068 85069 44afef GetSystemTimeAsFileTime 85068->85069 85070 452a00 85069->85070 85071 452a36 85070->85071 85072 452a13 85070->85072 85074 452aa5 85071->85074 85075 452a3c 85071->85075 85073 413748 _free 46 API calls 85072->85073 85077 452a1c 85073->85077 85076 413748 _free 46 API calls 85074->85076 85634 44b1a9 85075->85634 85083 452aa3 85076->85083 85079 413748 _free 46 API calls 85077->85079 85081 452a25 85079->85081 85080 452a9d 85082 413748 _free 46 API calls 85080->85082 85081->84968 85082->85083 85083->84968 85085 431e64 85084->85085 85087 431e6a 85084->85087 85086 414a46 __fcloseall 82 API calls 85085->85086 85086->85087 85087->84969 85089 425de2 85088->85089 85090 40f6fc _wcslen 85088->85090 85089->85030 85091 40f710 WideCharToMultiByte 85090->85091 85092 40f756 85091->85092 85093 40f728 85091->85093 85092->85030 85094 4115d7 52 API calls 85093->85094 85095 40f735 WideCharToMultiByte 85094->85095 85095->85030 85097 40f85d _memcpy_s _strlen 85096->85097 85099 40f7ab 85097->85099 85144 414db8 85097->85144 85100 4149c2 85099->85100 85156 414904 85100->85156 85102 40f7e9 85102->85035 85103 40f5c0 85102->85103 85107 40f5cd _strcat __write_nolock _memmove 85103->85107 85104 414d04 __fread_nolock 61 API calls 85104->85107 85106 425d11 85108 4150d1 _fseek 81 API calls 85106->85108 85107->85104 85107->85106 85111 40f691 __tzset_nolock 85107->85111 85244 4150d1 85107->85244 85109 425d33 85108->85109 85110 414d04 __fread_nolock 61 API calls 85109->85110 85110->85111 85111->85037 85113 414a52 __close 85112->85113 85114 414a64 85113->85114 85115 414a79 85113->85115 85384 417f77 46 API calls __getptd_noexit 85114->85384 85117 415471 __lock_file 47 API calls 85115->85117 85122 414a74 __close 85115->85122 85119 414a92 85117->85119 85118 414a69 85385 417f25 10 API calls __close 85118->85385 85368 4149d9 85119->85368 85122->85043 85453 414c76 85125->85453 85127 414d1c 85128 44afef 85127->85128 85621 442c5a 85128->85621 85130 44b00d 85130->85044 85132 414fee __close 85131->85132 85133 414ffa 85132->85133 85134 41500f 85132->85134 85625 417f77 46 API calls __getptd_noexit 85133->85625 85136 415471 __lock_file 47 API calls 85134->85136 85138 415017 85136->85138 85137 414fff 85626 417f25 10 API calls __close 85137->85626 85139 414e4e __ftell_nolock 51 API calls 85138->85139 85141 415024 85139->85141 85627 41503d LeaveCriticalSection LeaveCriticalSection __wfsopen 85141->85627 85142 41500a __close 85142->85046 85145 414dd6 85144->85145 85146 414deb 85144->85146 85153 417f77 46 API calls __getptd_noexit 85145->85153 85146->85145 85147 414df2 85146->85147 85151 414de6 85147->85151 85155 418f98 77 API calls 5 library calls 85147->85155 85149 414ddb 85154 417f25 10 API calls __close 85149->85154 85151->85097 85153->85149 85154->85151 85155->85151 85159 414910 __close 85156->85159 85157 414923 85212 417f77 46 API calls __getptd_noexit 85157->85212 85159->85157 85161 414951 85159->85161 85160 414928 85213 417f25 10 API calls __close 85160->85213 85175 41d4d1 85161->85175 85164 414956 85165 41496a 85164->85165 85166 41495d 85164->85166 85168 414992 85165->85168 85169 414972 85165->85169 85214 417f77 46 API calls __getptd_noexit 85166->85214 85192 41d218 85168->85192 85215 417f77 46 API calls __getptd_noexit 85169->85215 85172 414933 __close @_EH4_CallFilterFunc@8 85172->85102 85176 41d4dd __close 85175->85176 85177 4182cb __lock 46 API calls 85176->85177 85190 41d4eb 85177->85190 85178 41d560 85217 41d5fb 85178->85217 85179 41d567 85181 416b04 __malloc_crt 46 API calls 85179->85181 85183 41d56e 85181->85183 85182 41d5f0 __close 85182->85164 85183->85178 85184 41d57c InitializeCriticalSectionAndSpinCount 85183->85184 85187 41d59c 85184->85187 85188 41d5af EnterCriticalSection 85184->85188 85185 418209 __mtinitlocknum 46 API calls 85185->85190 85189 413748 _free 46 API calls 85187->85189 85188->85178 85189->85178 85190->85178 85190->85179 85190->85185 85220 4154b2 47 API calls __lock 85190->85220 85221 415520 LeaveCriticalSection LeaveCriticalSection _doexit 85190->85221 85194 41d23a 85192->85194 85193 41d26c __wopenfile 85199 41d47a 85193->85199 85211 41d421 85193->85211 85228 41341f 58 API calls 3 library calls 85193->85228 85194->85193 85195 41d255 85194->85195 85226 417f77 46 API calls __getptd_noexit 85195->85226 85197 41d25a 85227 417f25 10 API calls __close 85197->85227 85231 417f77 46 API calls __getptd_noexit 85199->85231 85200 41d48c 85223 422bf9 85200->85223 85203 41d47f 85232 417f25 10 API calls __close 85203->85232 85204 41499d 85216 4149b8 LeaveCriticalSection LeaveCriticalSection __wfsopen 85204->85216 85207 41d41a 85207->85211 85229 41341f 58 API calls 3 library calls 85207->85229 85209 41d439 85209->85211 85230 41341f 58 API calls 3 library calls 85209->85230 85211->85199 85211->85200 85212->85160 85213->85172 85214->85172 85215->85172 85216->85172 85222 4181f2 LeaveCriticalSection 85217->85222 85219 41d602 85219->85182 85220->85190 85221->85190 85222->85219 85233 422b35 85223->85233 85225 422c14 85225->85204 85226->85197 85227->85204 85228->85207 85229->85209 85230->85211 85231->85203 85232->85204 85236 422b41 __close 85233->85236 85234 422b54 85235 417f77 __tolower_l 46 API calls 85234->85235 85237 422b59 85235->85237 85236->85234 85238 422b8a 85236->85238 85240 417f25 __close 10 API calls 85237->85240 85239 422400 __tsopen_nolock 109 API calls 85238->85239 85241 422ba4 85239->85241 85243 422b63 __close 85240->85243 85242 422bcb __wsopen_helper LeaveCriticalSection 85241->85242 85242->85243 85243->85225 85245 4150dd __close 85244->85245 85246 4150e9 85245->85246 85247 41510f 85245->85247 85275 417f77 46 API calls __getptd_noexit 85246->85275 85257 415471 85247->85257 85250 4150ee 85276 417f25 10 API calls __close 85250->85276 85256 4150f9 __close 85256->85107 85258 415483 85257->85258 85259 4154a5 EnterCriticalSection 85257->85259 85258->85259 85260 41548b 85258->85260 85261 415117 85259->85261 85262 4182cb __lock 46 API calls 85260->85262 85263 415047 85261->85263 85262->85261 85264 415067 85263->85264 85265 415057 85263->85265 85270 415079 85264->85270 85278 414e4e 85264->85278 85333 417f77 46 API calls __getptd_noexit 85265->85333 85269 41505c 85277 415143 LeaveCriticalSection LeaveCriticalSection __wfsopen 85269->85277 85295 41443c 85270->85295 85273 4150b9 85308 41e1f4 85273->85308 85275->85250 85276->85256 85277->85256 85279 414e61 85278->85279 85280 414e79 85278->85280 85334 417f77 46 API calls __getptd_noexit 85279->85334 85282 414139 __flsbuf 46 API calls 85280->85282 85283 414e80 85282->85283 85286 41e1f4 __write 51 API calls 85283->85286 85284 414e66 85335 417f25 10 API calls __close 85284->85335 85287 414e97 85286->85287 85288 414f09 85287->85288 85290 414ec9 85287->85290 85294 414e71 85287->85294 85336 417f77 46 API calls __getptd_noexit 85288->85336 85291 41e1f4 __write 51 API calls 85290->85291 85290->85294 85292 414f64 85291->85292 85293 41e1f4 __write 51 API calls 85292->85293 85292->85294 85293->85294 85294->85270 85296 414477 85295->85296 85297 414455 85295->85297 85301 414139 85296->85301 85297->85296 85298 414139 __flsbuf 46 API calls 85297->85298 85299 414470 85298->85299 85337 41b7b2 77 API calls 5 library calls 85299->85337 85302 414145 85301->85302 85303 41415a 85301->85303 85338 417f77 46 API calls __getptd_noexit 85302->85338 85303->85273 85305 41414a 85339 417f25 10 API calls __close 85305->85339 85307 414155 85307->85273 85309 41e200 __close 85308->85309 85310 41e223 85309->85310 85311 41e208 85309->85311 85313 41e22f 85310->85313 85318 41e269 85310->85318 85360 417f8a 46 API calls __getptd_noexit 85311->85360 85362 417f8a 46 API calls __getptd_noexit 85313->85362 85314 41e20d 85361 417f77 46 API calls __getptd_noexit 85314->85361 85317 41e234 85363 417f77 46 API calls __getptd_noexit 85317->85363 85340 41ae56 85318->85340 85321 41e26f 85323 41e291 85321->85323 85324 41e27d 85321->85324 85322 41e23c 85364 417f25 10 API calls __close 85322->85364 85365 417f77 46 API calls __getptd_noexit 85323->85365 85350 41e17f 85324->85350 85328 41e215 __close 85328->85269 85329 41e289 85367 41e2c0 LeaveCriticalSection __unlock_fhandle 85329->85367 85330 41e296 85366 417f8a 46 API calls __getptd_noexit 85330->85366 85333->85269 85334->85284 85335->85294 85336->85294 85337->85296 85338->85305 85339->85307 85341 41ae62 __close 85340->85341 85342 41aebc 85341->85342 85344 4182cb __lock 46 API calls 85341->85344 85343 41aec1 EnterCriticalSection 85342->85343 85346 41aede __close 85342->85346 85343->85346 85345 41ae8e 85344->85345 85347 41aeaa 85345->85347 85348 41ae97 InitializeCriticalSectionAndSpinCount 85345->85348 85346->85321 85349 41aeec ___lock_fhandle LeaveCriticalSection 85347->85349 85348->85347 85349->85342 85351 41aded __chsize_nolock 46 API calls 85350->85351 85352 41e18e 85351->85352 85353 41e1a4 SetFilePointer 85352->85353 85354 41e194 85352->85354 85356 41e1bb GetLastError 85353->85356 85358 41e1c3 85353->85358 85355 417f77 __tolower_l 46 API calls 85354->85355 85357 41e199 85355->85357 85356->85358 85357->85329 85358->85357 85359 417f9d __dosmaperr 46 API calls 85358->85359 85359->85357 85360->85314 85361->85328 85362->85317 85363->85322 85364->85328 85365->85330 85366->85329 85367->85328 85369 4149ea 85368->85369 85370 4149fe 85368->85370 85414 417f77 46 API calls __getptd_noexit 85369->85414 85373 41443c __flush 77 API calls 85370->85373 85382 4149fa 85370->85382 85372 4149ef 85415 417f25 10 API calls __close 85372->85415 85375 414a0a 85373->85375 85387 41d8c2 85375->85387 85378 414139 __flsbuf 46 API calls 85379 414a18 85378->85379 85391 41d7fe 85379->85391 85381 414a1e 85381->85382 85383 413748 _free 46 API calls 85381->85383 85386 414ab2 LeaveCriticalSection LeaveCriticalSection __wfsopen 85382->85386 85383->85382 85384->85118 85385->85122 85386->85122 85388 414a12 85387->85388 85389 41d8d2 85387->85389 85388->85378 85389->85388 85390 413748 _free 46 API calls 85389->85390 85390->85388 85392 41d80a __close 85391->85392 85393 41d812 85392->85393 85394 41d82d 85392->85394 85431 417f8a 46 API calls __getptd_noexit 85393->85431 85396 41d839 85394->85396 85401 41d873 85394->85401 85433 417f8a 46 API calls __getptd_noexit 85396->85433 85397 41d817 85432 417f77 46 API calls __getptd_noexit 85397->85432 85400 41d83e 85434 417f77 46 API calls __getptd_noexit 85400->85434 85402 41ae56 ___lock_fhandle 48 API calls 85401->85402 85404 41d879 85402->85404 85406 41d893 85404->85406 85407 41d887 85404->85407 85405 41d846 85435 417f25 10 API calls __close 85405->85435 85436 417f77 46 API calls __getptd_noexit 85406->85436 85416 41d762 85407->85416 85411 41d88d 85437 41d8ba LeaveCriticalSection __unlock_fhandle 85411->85437 85412 41d81f __close 85412->85381 85414->85372 85415->85382 85438 41aded 85416->85438 85418 41d7c8 85451 41ad67 47 API calls 2 library calls 85418->85451 85419 41d772 85419->85418 85421 41d7a6 85419->85421 85423 41aded __chsize_nolock 46 API calls 85419->85423 85421->85418 85424 41aded __chsize_nolock 46 API calls 85421->85424 85422 41d7d0 85425 41d7f2 85422->85425 85452 417f9d 46 API calls 3 library calls 85422->85452 85426 41d79d 85423->85426 85427 41d7b2 CloseHandle 85424->85427 85425->85411 85429 41aded __chsize_nolock 46 API calls 85426->85429 85427->85418 85430 41d7be GetLastError 85427->85430 85429->85421 85430->85418 85431->85397 85432->85412 85433->85400 85434->85405 85435->85412 85436->85411 85437->85412 85439 41ae12 85438->85439 85440 41adfa 85438->85440 85442 417f8a __close 46 API calls 85439->85442 85445 41ae51 85439->85445 85441 417f8a __close 46 API calls 85440->85441 85443 41adff 85441->85443 85444 41ae23 85442->85444 85446 417f77 __tolower_l 46 API calls 85443->85446 85447 417f77 __tolower_l 46 API calls 85444->85447 85445->85419 85448 41ae07 85446->85448 85449 41ae2b 85447->85449 85448->85419 85450 417f25 __close 10 API calls 85449->85450 85450->85448 85451->85422 85452->85425 85454 414c82 __close 85453->85454 85455 414cbb __close 85454->85455 85456 414cc3 85454->85456 85457 414c96 _memcpy_s 85454->85457 85455->85127 85458 415471 __lock_file 47 API calls 85456->85458 85480 417f77 46 API calls __getptd_noexit 85457->85480 85459 414ccb 85458->85459 85466 414aba 85459->85466 85461 414cb0 85481 417f25 10 API calls __close 85461->85481 85467 414af2 85466->85467 85470 414ad8 _memcpy_s 85466->85470 85482 414cfa LeaveCriticalSection LeaveCriticalSection __wfsopen 85467->85482 85468 414ae2 85533 417f77 46 API calls __getptd_noexit 85468->85533 85470->85467 85470->85468 85472 414b2d 85470->85472 85472->85467 85474 414c38 _memcpy_s 85472->85474 85475 414139 __flsbuf 46 API calls 85472->85475 85483 41dfcc 85472->85483 85513 41d8f3 85472->85513 85535 41e0c2 46 API calls 4 library calls 85472->85535 85536 417f77 46 API calls __getptd_noexit 85474->85536 85475->85472 85479 414ae7 85534 417f25 10 API calls __close 85479->85534 85480->85461 85481->85455 85482->85455 85484 41dfd8 __close 85483->85484 85485 41dfe0 85484->85485 85486 41dffb 85484->85486 85606 417f8a 46 API calls __getptd_noexit 85485->85606 85487 41e007 85486->85487 85492 41e041 85486->85492 85608 417f8a 46 API calls __getptd_noexit 85487->85608 85490 41dfe5 85607 417f77 46 API calls __getptd_noexit 85490->85607 85491 41e00c 85609 417f77 46 API calls __getptd_noexit 85491->85609 85495 41e063 85492->85495 85496 41e04e 85492->85496 85497 41ae56 ___lock_fhandle 48 API calls 85495->85497 85611 417f8a 46 API calls __getptd_noexit 85496->85611 85500 41e069 85497->85500 85498 41e014 85610 417f25 10 API calls __close 85498->85610 85503 41e077 85500->85503 85504 41e08b 85500->85504 85501 41e053 85612 417f77 46 API calls __getptd_noexit 85501->85612 85502 41dfed __close 85502->85472 85537 41da15 85503->85537 85613 417f77 46 API calls __getptd_noexit 85504->85613 85509 41e083 85615 41e0ba LeaveCriticalSection __unlock_fhandle 85509->85615 85510 41e090 85614 417f8a 46 API calls __getptd_noexit 85510->85614 85514 41d900 85513->85514 85518 41d915 85513->85518 85619 417f77 46 API calls __getptd_noexit 85514->85619 85516 41d905 85620 417f25 10 API calls __close 85516->85620 85519 41d94a 85518->85519 85524 41d910 85518->85524 85616 420603 85518->85616 85521 414139 __flsbuf 46 API calls 85519->85521 85522 41d95e 85521->85522 85523 41dfcc __read 59 API calls 85522->85523 85525 41d965 85523->85525 85524->85472 85525->85524 85526 414139 __flsbuf 46 API calls 85525->85526 85527 41d988 85526->85527 85527->85524 85528 414139 __flsbuf 46 API calls 85527->85528 85529 41d994 85528->85529 85529->85524 85530 414139 __flsbuf 46 API calls 85529->85530 85531 41d9a1 85530->85531 85532 414139 __flsbuf 46 API calls 85531->85532 85532->85524 85533->85479 85534->85467 85535->85472 85536->85479 85538 41da31 85537->85538 85539 41da4c 85537->85539 85540 417f8a __close 46 API calls 85538->85540 85541 41da5b 85539->85541 85543 41da7a 85539->85543 85542 41da36 85540->85542 85544 417f8a __close 46 API calls 85541->85544 85546 417f77 __tolower_l 46 API calls 85542->85546 85545 41da98 85543->85545 85560 41daac 85543->85560 85547 41da60 85544->85547 85548 417f8a __close 46 API calls 85545->85548 85557 41da3e 85546->85557 85550 417f77 __tolower_l 46 API calls 85547->85550 85552 41da9d 85548->85552 85549 41db02 85551 417f8a __close 46 API calls 85549->85551 85553 41da67 85550->85553 85555 41db07 85551->85555 85556 417f77 __tolower_l 46 API calls 85552->85556 85554 417f25 __close 10 API calls 85553->85554 85554->85557 85558 417f77 __tolower_l 46 API calls 85555->85558 85559 41daa4 85556->85559 85557->85509 85558->85559 85563 417f25 __close 10 API calls 85559->85563 85560->85549 85560->85557 85561 41dae1 85560->85561 85562 41db1b 85560->85562 85561->85549 85568 41daec ReadFile 85561->85568 85565 416b04 __malloc_crt 46 API calls 85562->85565 85563->85557 85569 41db31 85565->85569 85566 41dc17 85567 41df8f GetLastError 85566->85567 85575 41dc2b 85566->85575 85570 41de16 85567->85570 85571 41df9c 85567->85571 85568->85566 85568->85567 85572 41db59 85569->85572 85573 41db3b 85569->85573 85579 417f9d __dosmaperr 46 API calls 85570->85579 85585 41dd9b 85570->85585 85577 417f77 __tolower_l 46 API calls 85571->85577 85576 420494 __lseeki64_nolock 48 API calls 85572->85576 85574 417f77 __tolower_l 46 API calls 85573->85574 85578 41db40 85574->85578 85575->85585 85586 41dc47 85575->85586 85589 41de5b 85575->85589 85580 41db67 85576->85580 85581 41dfa1 85577->85581 85583 417f8a __close 46 API calls 85578->85583 85579->85585 85580->85568 85582 417f8a __close 46 API calls 85581->85582 85582->85585 85583->85557 85584 413748 _free 46 API calls 85584->85557 85585->85557 85585->85584 85587 41dcab ReadFile 85586->85587 85596 41dd28 85586->85596 85590 41dcc9 GetLastError 85587->85590 85598 41dcd3 85587->85598 85588 41ded0 ReadFile 85591 41deef GetLastError 85588->85591 85599 41def9 85588->85599 85589->85585 85589->85588 85590->85586 85590->85598 85591->85589 85591->85599 85592 41ddec MultiByteToWideChar 85592->85585 85593 41de10 GetLastError 85592->85593 85593->85570 85594 41dda3 85601 41dd60 85594->85601 85602 41ddda 85594->85602 85595 41dd96 85597 417f77 __tolower_l 46 API calls 85595->85597 85596->85585 85596->85594 85596->85595 85596->85601 85597->85585 85598->85586 85603 420494 __lseeki64_nolock 48 API calls 85598->85603 85599->85589 85600 420494 __lseeki64_nolock 48 API calls 85599->85600 85600->85599 85601->85592 85604 420494 __lseeki64_nolock 48 API calls 85602->85604 85603->85598 85605 41dde9 85604->85605 85605->85592 85606->85490 85607->85502 85608->85491 85609->85498 85610->85502 85611->85501 85612->85498 85613->85510 85614->85509 85615->85502 85617 416b04 __malloc_crt 46 API calls 85616->85617 85618 420618 85617->85618 85618->85519 85619->85516 85620->85524 85624 4148b3 GetSystemTimeAsFileTime __aulldiv 85621->85624 85623 442c6b 85623->85130 85624->85623 85625->85137 85626->85142 85627->85142 85633 45272f __tzset_nolock _wcscpy 85628->85633 85629 414d04 61 API calls __fread_nolock 85629->85633 85630 44afef GetSystemTimeAsFileTime 85630->85633 85631 4528a4 85631->85052 85631->85053 85632 4150d1 81 API calls _fseek 85632->85633 85633->85629 85633->85630 85633->85631 85633->85632 85635 44b1bc 85634->85635 85636 44b1ca 85634->85636 85637 4149c2 116 API calls 85635->85637 85638 44b1e1 85636->85638 85639 44b1d8 85636->85639 85640 4149c2 116 API calls 85636->85640 85637->85636 85669 4321a4 85638->85669 85639->85080 85641 44b2db 85640->85641 85641->85638 85643 44b2e9 85641->85643 85645 44b2f6 85643->85645 85648 414a46 __fcloseall 82 API calls 85643->85648 85644 44b224 85646 44b253 85644->85646 85647 44b228 85644->85647 85645->85080 85673 43213d 85646->85673 85650 44b235 85647->85650 85652 414a46 __fcloseall 82 API calls 85647->85652 85648->85645 85653 44b245 85650->85653 85654 414a46 __fcloseall 82 API calls 85650->85654 85651 44b25a 85655 44b260 85651->85655 85656 44b289 85651->85656 85652->85650 85653->85080 85654->85653 85658 44b26d 85655->85658 85660 414a46 __fcloseall 82 API calls 85655->85660 85683 44b0bf 87 API calls 85656->85683 85661 44b27d 85658->85661 85663 414a46 __fcloseall 82 API calls 85658->85663 85659 44b28f 85684 4320f8 46 API calls _free 85659->85684 85660->85658 85661->85080 85663->85661 85664 44b2a2 85667 44b2b2 85664->85667 85668 414a46 __fcloseall 82 API calls 85664->85668 85665 44b295 85665->85664 85666 414a46 __fcloseall 82 API calls 85665->85666 85666->85664 85667->85080 85668->85667 85670 4321b4 __tzset_nolock _memmove 85669->85670 85671 4321cb 85669->85671 85670->85644 85672 414d04 __fread_nolock 61 API calls 85671->85672 85672->85670 85674 4135bb _malloc 46 API calls 85673->85674 85675 432150 85674->85675 85676 4135bb _malloc 46 API calls 85675->85676 85677 432162 85676->85677 85678 4135bb _malloc 46 API calls 85677->85678 85679 432174 85678->85679 85681 432189 85679->85681 85685 4320f8 46 API calls _free 85679->85685 85681->85651 85682 432198 85682->85651 85683->85659 85684->85665 85685->85682 85686->84982 85687->84984 85688->85003 85689->85003 85690->85003 85691->85001 85692->85003 85693->85003 85694->85007 85695->85016 85696->85018 85697->85018 85747 410160 85698->85747 85700 41012f GetFullPathNameW 85701 410147 moneypunct 85700->85701 85701->84838 85703 4102cb SHGetDesktopFolder 85702->85703 85704 410333 _wcsncpy 85702->85704 85703->85704 85705 4102e0 _wcsncpy 85703->85705 85704->84841 85705->85704 85706 41031c SHGetPathFromIDListW 85705->85706 85706->85704 85708 4101bb 85707->85708 85710 425f4a 85707->85710 85709 410160 52 API calls 85708->85709 85711 4101c7 85709->85711 85712 4114ab __wcsicoll 58 API calls 85710->85712 85715 425f6e 85710->85715 85751 410200 52 API calls 2 library calls 85711->85751 85712->85710 85714 4101d6 85752 410200 52 API calls 2 library calls 85714->85752 85715->84843 85717 4101e9 85717->84843 85719 40f760 126 API calls 85718->85719 85720 40f584 85719->85720 85721 429335 85720->85721 85722 40f58c 85720->85722 85725 4528bd 118 API calls 85721->85725 85723 40f598 85722->85723 85724 429358 85722->85724 85777 4033c0 113 API calls 7 library calls 85723->85777 85778 434034 86 API calls _wprintf 85724->85778 85727 42934b 85725->85727 85730 429373 85727->85730 85731 42934f 85727->85731 85729 40f5b4 85729->84839 85733 4115d7 52 API calls 85730->85733 85734 431e58 82 API calls 85731->85734 85732 429369 85732->85730 85746 4293c5 moneypunct 85733->85746 85734->85724 85735 42959c 85736 413748 _free 46 API calls 85735->85736 85737 4295a5 85736->85737 85738 431e58 82 API calls 85737->85738 85739 4295b1 85738->85739 85743 401b10 52 API calls 85743->85746 85746->85735 85746->85743 85753 444af8 85746->85753 85756 44b41c 85746->85756 85763 402780 85746->85763 85771 4022d0 85746->85771 85779 44c7dd 64 API calls 3 library calls 85746->85779 85748 410167 _wcslen 85747->85748 85749 4115d7 52 API calls 85748->85749 85750 41017e _wcscpy 85749->85750 85750->85700 85751->85714 85752->85717 85754 4115d7 52 API calls 85753->85754 85755 444b27 _memmove 85754->85755 85755->85746 85757 44b429 85756->85757 85758 4115d7 52 API calls 85757->85758 85759 44b440 85758->85759 85760 44b45e 85759->85760 85761 401b10 52 API calls 85759->85761 85760->85746 85762 44b453 85761->85762 85762->85746 85764 402790 moneypunct _memmove 85763->85764 85765 402827 85763->85765 85766 4115d7 52 API calls 85764->85766 85768 4115d7 52 API calls 85765->85768 85767 402797 85766->85767 85769 4115d7 52 API calls 85767->85769 85770 4027bd 85767->85770 85768->85764 85769->85770 85770->85746 85772 4022e0 85771->85772 85774 40239d 85771->85774 85773 4115d7 52 API calls 85772->85773 85772->85774 85775 402320 moneypunct 85772->85775 85773->85775 85774->85746 85775->85774 85776 4115d7 52 API calls 85775->85776 85776->85775 85777->85729 85778->85732 85779->85746 85781 402539 moneypunct 85780->85781 85782 402417 85780->85782 85781->84847 85782->85781 85783 4115d7 52 API calls 85782->85783 85784 402443 85783->85784 85785 4115d7 52 API calls 85784->85785 85786 4024b4 85785->85786 85786->85781 85788 4022d0 52 API calls 85786->85788 85809 402880 95 API calls 2 library calls 85786->85809 85788->85786 85793 401566 85789->85793 85790 401794 85810 40e9a0 90 API calls 85790->85810 85793->85790 85794 40167a 85793->85794 85795 4010a0 52 API calls 85793->85795 85796 4017c0 85794->85796 85811 45e737 90 API calls 3 library calls 85794->85811 85795->85793 85796->84850 85798 40bc70 52 API calls 85797->85798 85807 40d451 85798->85807 85799 40d50f 85814 410600 52 API calls 85799->85814 85801 427c01 85815 45e737 90 API calls 3 library calls 85801->85815 85802 40e0a0 52 API calls 85802->85807 85804 401b10 52 API calls 85804->85807 85805 40d519 85805->84852 85807->85799 85807->85801 85807->85802 85807->85804 85807->85805 85812 40f310 53 API calls 85807->85812 85813 40d860 91 API calls 85807->85813 85809->85786 85810->85794 85811->85796 85812->85807 85813->85807 85814->85805 85815->85805 85816->84865 85817->84866 85819 42c5fe 85818->85819 85871 4091c6 85818->85871 85820 40bc70 52 API calls 85819->85820 85819->85871 85821 42c64e InterlockedIncrement 85820->85821 85823 42c665 85821->85823 85827 42c697 85821->85827 85822 42c737 InterlockedDecrement 85824 42c74a 85822->85824 85825 42c672 InterlockedDecrement Sleep InterlockedIncrement 85823->85825 85823->85827 85828 408f40 VariantClear 85824->85828 85825->85823 85825->85827 85826 42c731 85826->85822 85827->85822 85827->85826 86111 408e80 85827->86111 85830 42c752 85828->85830 86124 410c60 85830->86124 85834 42c6db 85835 402160 52 API calls 85834->85835 85836 42c6e5 85835->85836 85837 45340c 85 API calls 85836->85837 85838 42c6f1 85837->85838 86121 40d200 52 API calls 2 library calls 85838->86121 85840 42c6fb 86122 465124 53 API calls 85840->86122 85842 42c715 85843 42c76a 85842->85843 85844 42c719 85842->85844 85846 401b10 52 API calls 85843->85846 86123 46fe32 VariantClear 85844->86123 85847 42c77e 85846->85847 85848 401980 53 API calls 85847->85848 85854 42c796 85848->85854 85849 42c812 86135 46fe32 VariantClear 85849->86135 85851 42c82a InterlockedDecrement 86136 46ff07 54 API calls 85851->86136 85853 42c864 86137 45e737 90 API calls 3 library calls 85853->86137 85854->85849 85854->85853 86129 40ba10 85854->86129 85856 42c9ec 86179 47d33e 330 API calls 85856->86179 85861 408f40 VariantClear 85872 42c849 85861->85872 85863 402780 52 API calls 85863->85872 85865 408f40 VariantClear 85866 42c891 85865->85866 85868 410c60 VariantClear 85866->85868 85868->85871 85869 401980 53 API calls 85869->85872 85871->84894 85872->85856 85872->85861 85872->85863 85872->85869 86138 40a780 85872->86138 85873 42c874 85873->85865 85875 42ca59 85873->85875 85875->85875 85877 40afc4 85876->85877 85878 40b156 85876->85878 85879 40afd5 85877->85879 85880 42d1e3 85877->85880 86194 45e737 90 API calls 3 library calls 85878->86194 85884 40a780 199 API calls 85879->85884 85901 40b11a moneypunct 85879->85901 86195 45e737 90 API calls 3 library calls 85880->86195 85883 40b143 85883->84894 85887 40b00a 85884->85887 85885 42d1f8 85889 408f40 VariantClear 85885->85889 85887->85885 85890 40b012 85887->85890 85888 42d4db 85888->85888 85889->85883 85891 40b04a 85890->85891 85892 42d231 VariantClear 85890->85892 85894 40b094 moneypunct 85890->85894 85900 40b05c moneypunct 85891->85900 86196 40e270 VariantClear moneypunct 85891->86196 85892->85900 85893 40b108 85893->85901 86197 40e270 VariantClear moneypunct 85893->86197 85894->85893 85899 42d425 moneypunct 85894->85899 85895 42d45a VariantClear 85895->85901 85898 4115d7 52 API calls 85898->85894 85899->85895 85899->85901 85900->85894 85900->85898 85901->85883 86198 45e737 90 API calls 3 library calls 85901->86198 85903 408fff 85902->85903 85917 40900d 85902->85917 86245 403ea0 52 API calls __cinit 85903->86245 85906 42c3f6 86248 45e737 90 API calls 3 library calls 85906->86248 85908 40a780 199 API calls 85908->85917 85909 4090f2 moneypunct 85909->84894 85910 42c44a 86250 45e737 90 API calls 3 library calls 85910->86250 85912 42c47b 86251 451b42 61 API calls 85912->86251 85914 42c4cb 86199 47faae 85914->86199 85915 42c564 85919 408f40 VariantClear 85915->85919 85917->85906 85917->85908 85917->85909 85917->85910 85917->85912 85917->85914 85917->85915 85923 4090df 85917->85923 85925 42c528 85917->85925 85926 409112 85917->85926 85927 42c548 85917->85927 85930 4090ea 85917->85930 86247 4534e3 52 API calls 85917->86247 86249 40c4e0 199 API calls 85917->86249 85919->85909 85920 42c491 85920->85909 86252 45e737 90 API calls 3 library calls 85920->86252 85921 42c4da 85921->85909 86253 45e737 90 API calls 3 library calls 85921->86253 85923->85930 85931 408e80 VariantClear 85923->85931 86254 45e737 90 API calls 3 library calls 85925->86254 85926->85927 85928 40912b 85926->85928 86255 45e737 90 API calls 3 library calls 85927->86255 85928->85909 86246 403e10 53 API calls 85928->86246 85933 408f40 VariantClear 85930->85933 85931->85930 85933->85909 85935 40914b 85936 408f40 VariantClear 85935->85936 85936->85909 86442 408d90 85937->86442 85939 408cf9 85940 429778 85939->85940 85943 42976c 85939->85943 85945 408d2d 85939->85945 85941 410c60 VariantClear 85940->85941 85942 429780 85941->85942 86467 45e737 90 API calls 3 library calls 85943->86467 86458 403d10 85945->86458 85948 408d71 moneypunct 85948->84894 85949 408f40 VariantClear 85950 408d45 moneypunct 85949->85950 85950->85948 85950->85949 85952 425c87 85951->85952 85955 40d15f 85951->85955 85953 425cc7 85952->85953 85954 425ca1 TranslateAcceleratorW 85952->85954 85954->85955 85955->84894 85957 42602f 85956->85957 85960 40d17f 85956->85960 85957->84894 85958 40d18c 85958->84894 85959 42608e IsDialogMessageW 85959->85958 85959->85960 85960->85958 85960->85959 86681 430c46 GetClassLongW 85960->86681 85963 4096c6 _wcslen 85962->85963 85964 4115d7 52 API calls 85963->85964 86026 40a70c moneypunct _memmove 85963->86026 85965 4096fa _memmove 85964->85965 85966 4115d7 52 API calls 85965->85966 85969 40971b 85966->85969 85967 4013a0 52 API calls 85968 4297aa 85967->85968 85970 4115d7 52 API calls 85968->85970 85971 409749 CharUpperBuffW 85969->85971 85973 40976a moneypunct 85969->85973 85969->86026 86013 4297d1 _memmove 85970->86013 85971->85973 86022 4097e5 moneypunct 85973->86022 86683 47dcbb 201 API calls 85973->86683 85975 408f40 VariantClear 85976 42ae92 85975->85976 85977 410c60 VariantClear 85976->85977 85978 42aea4 85977->85978 85979 409aa2 85981 4115d7 52 API calls 85979->85981 85986 409afe 85979->85986 85979->86013 85980 40a689 85983 4115d7 52 API calls 85980->85983 85981->85986 85982 4115d7 52 API calls 85982->86022 86000 40a6af moneypunct _memmove 85983->86000 85984 409b2a 85988 429dbe 85984->85988 86050 409b4d moneypunct _memmove 85984->86050 86689 40b400 VariantClear VariantClear moneypunct 85984->86689 85985 40c2c0 52 API calls 85985->86022 85986->85984 85987 4115d7 52 API calls 85986->85987 85989 429d31 85987->85989 85993 429dd3 85988->85993 86690 40b400 VariantClear VariantClear moneypunct 85988->86690 85992 429d42 85989->85992 86686 44a801 52 API calls 85989->86686 85990 409fd2 85998 40a045 85990->85998 86051 42a3f5 85990->86051 86004 40e0a0 52 API calls 85992->86004 86007 40e1c0 VariantClear 85993->86007 85993->86050 85994 429a46 VariantClear 85994->86022 85995 408f40 VariantClear 85995->86022 86002 4115d7 52 API calls 85998->86002 86008 4115d7 52 API calls 86000->86008 86009 40a04c 86002->86009 86010 429d57 86004->86010 86005 40ba10 52 API calls 86005->86022 86006 42a42f 86694 45e737 90 API calls 3 library calls 86006->86694 86007->86050 86008->86026 86011 40a0a7 86009->86011 86015 4091e0 316 API calls 86009->86015 86687 453443 52 API calls 86010->86687 86034 40a0af 86011->86034 86695 40c790 VariantClear moneypunct 86011->86695 86012 4299d9 86016 408f40 VariantClear 86012->86016 86706 45e737 90 API calls 3 library calls 86013->86706 86015->86011 86021 4299e2 86016->86021 86017 429abd 86017->84894 86018 429d88 86688 453443 52 API calls 86018->86688 86031 410c60 VariantClear 86021->86031 86022->85979 86022->85980 86022->85982 86022->85985 86022->85994 86022->85995 86022->86000 86022->86005 86022->86012 86022->86013 86022->86017 86024 42a452 86022->86024 86028 40a780 199 API calls 86022->86028 86684 40c4e0 199 API calls 86022->86684 86685 40e270 VariantClear moneypunct 86022->86685 86024->85975 86026->85967 86028->86022 86029 402780 52 API calls 86029->86050 86030 44a801 52 API calls 86030->86050 86085 40a650 moneypunct 86031->86085 86032 408f40 VariantClear 86063 40a162 moneypunct _memmove 86032->86063 86033 41130a 51 API calls __cinit 86033->86050 86035 40a11b 86034->86035 86037 42a4b4 VariantClear 86034->86037 86034->86063 86042 40a12d moneypunct 86035->86042 86696 40e270 VariantClear moneypunct 86035->86696 86036 40a780 199 API calls 86036->86050 86037->86042 86039 401980 53 API calls 86039->86050 86040 408e80 VariantClear 86040->86050 86041 4115d7 52 API calls 86041->86063 86042->86041 86042->86063 86043 408e80 VariantClear 86043->86063 86045 42a74d VariantClear 86045->86063 86046 4115d7 52 API calls 86046->86050 86047 40a368 86049 42aad4 86047->86049 86057 40a397 86047->86057 86048 40e270 VariantClear 86048->86063 86699 46fe90 VariantClear VariantClear moneypunct 86049->86699 86050->85990 86050->86006 86050->86026 86050->86029 86050->86030 86050->86033 86050->86036 86050->86039 86050->86040 86050->86046 86050->86051 86055 409c95 86050->86055 86691 45f508 52 API calls 86050->86691 86692 403e10 53 API calls 86050->86692 86693 47390f VariantClear 86051->86693 86052 42a7e4 VariantClear 86052->86063 86053 42a886 VariantClear 86053->86063 86055->84894 86056 40a3ce 86071 40a3d9 moneypunct 86056->86071 86700 40b400 VariantClear VariantClear moneypunct 86056->86700 86057->86056 86082 40a42c moneypunct 86057->86082 86682 40b400 VariantClear VariantClear moneypunct 86057->86682 86060 4115d7 52 API calls 86060->86063 86061 42abaf 86066 42abd4 VariantClear 86061->86066 86075 40a4ee moneypunct 86061->86075 86062 4115d7 52 API calls 86065 42a5a6 VariantInit VariantCopy 86062->86065 86063->86032 86063->86043 86063->86045 86063->86047 86063->86048 86063->86049 86063->86052 86063->86053 86063->86060 86063->86062 86697 470870 52 API calls 86063->86697 86698 44ccf1 VariantClear moneypunct 86063->86698 86064 40a4dc 86064->86075 86702 40e270 VariantClear moneypunct 86064->86702 86065->86063 86068 42a5c6 VariantClear 86065->86068 86066->86075 86067 40a41a 86067->86082 86701 40e270 VariantClear moneypunct 86067->86701 86068->86063 86069 42ac4f 86076 42ac79 VariantClear 86069->86076 86080 40a546 moneypunct 86069->86080 86071->86067 86073 42ab44 VariantClear 86071->86073 86071->86082 86072 40a534 86072->86080 86703 40e270 VariantClear moneypunct 86072->86703 86073->86082 86075->86069 86075->86072 86076->86080 86077 42ad28 86083 42ad4e VariantClear 86077->86083 86088 40a583 moneypunct 86077->86088 86080->86077 86081 40a571 86080->86081 86081->86088 86704 40e270 VariantClear moneypunct 86081->86704 86082->86061 86082->86064 86083->86088 86085->84894 86086 42ae0e VariantClear 86086->86088 86088->86085 86088->86086 86705 40e270 VariantClear moneypunct 86088->86705 86089->84894 86090->84876 86091->84882 86092->84894 86093->84894 86094->84894 86095->84894 86096->84905 86097->84905 86098->84905 86099->84905 86100->84905 86101->84905 86102->84905 86104 403cdf 86103->86104 86105 408f40 VariantClear 86104->86105 86106 403ce7 86105->86106 86106->84923 86107->84905 86108->84905 86109->84894 86110->84873 86112 408e88 86111->86112 86114 408e94 86111->86114 86113 408f40 VariantClear 86112->86113 86113->86114 86115 45340c 86114->86115 86116 453439 86115->86116 86117 453419 86115->86117 86116->85834 86118 45342f 86117->86118 86181 4531b1 85 API calls 5 library calls 86117->86181 86118->85834 86120 453425 86120->85834 86121->85840 86122->85842 86123->85826 86125 428372 86124->86125 86126 410c73 moneypunct 86124->86126 86128 42838c 86125->86128 86182 40e1c0 86125->86182 86126->85871 86130 40ba49 86129->86130 86133 40ba1b moneypunct _memmove 86129->86133 86132 4115d7 52 API calls 86130->86132 86131 4115d7 52 API calls 86134 40ba22 86131->86134 86132->86133 86133->86131 86134->85854 86135->85851 86136->85872 86137->85873 86181->86120 86183 408f40 VariantClear 86182->86183 86184 40e1cb moneypunct 86183->86184 86184->86125 86194->85880 86195->85885 86196->85900 86197->85901 86198->85888 86200 408e80 VariantClear 86199->86200 86233 47fb02 86200->86233 86203 47fc59 86204 40a780 199 API calls 86203->86204 86207 47fc6a 86204->86207 86205 47fc2b 86208 408f40 VariantClear 86205->86208 86207->86205 86212 47fc7d 86207->86212 86213 47fc8c 86207->86213 86209 47fc33 86208->86209 86211 408f40 VariantClear 86209->86211 86210 408f40 VariantClear 86210->86233 86214 47fc3b 86211->86214 86297 45e737 90 API calls 3 library calls 86212->86297 86216 40ba10 52 API calls 86213->86216 86218 408f40 VariantClear 86214->86218 86217 47fc98 86216->86217 86298 47b2f4 144 API calls 86217->86298 86220 47fc43 86218->86220 86223 410c60 VariantClear 86220->86223 86221 47fca7 86224 408f40 VariantClear 86221->86224 86222 47fcd4 86227 408f40 VariantClear 86222->86227 86226 47fc4b 86223->86226 86228 47fcb1 86224->86228 86225 408e80 VariantClear 86225->86233 86226->85921 86229 47fcdc 86227->86229 86230 408f40 VariantClear 86228->86230 86231 408f40 VariantClear 86229->86231 86232 47fcb9 86230->86232 86234 47fce4 86231->86234 86236 408f40 VariantClear 86232->86236 86233->86203 86233->86205 86233->86210 86233->86222 86233->86225 86241 47fc1d 86233->86241 86256 475a67 86233->86256 86284 47b291 86233->86284 86295 46fe32 VariantClear 86233->86295 86235 408f40 VariantClear 86234->86235 86237 47fcec 86235->86237 86238 47fcc1 86236->86238 86239 410c60 VariantClear 86237->86239 86240 410c60 VariantClear 86238->86240 86242 47fcf4 86239->86242 86243 47fcc9 86240->86243 86296 45e538 90 API calls 3 library calls 86241->86296 86242->85921 86243->85921 86245->85917 86246->85935 86247->85917 86248->85909 86249->85917 86250->85909 86251->85920 86252->85909 86253->85909 86254->85909 86255->85915 86257 475ae5 86256->86257 86261 475ac5 86256->86261 86299 45e737 90 API calls 3 library calls 86257->86299 86259 475afe 86260 408f40 VariantClear 86259->86260 86266 475b06 86260->86266 86261->86257 86262 475b42 86261->86262 86263 402780 52 API calls 86261->86263 86264 402780 52 API calls 86262->86264 86263->86261 86275 475b60 86264->86275 86265 475c7c 86267 408f40 VariantClear 86265->86267 86266->86233 86270 475c84 86267->86270 86268 40c2c0 52 API calls 86268->86275 86269 40a780 199 API calls 86269->86275 86270->86233 86271 475cc7 86273 408f40 VariantClear 86271->86273 86272 40ba10 52 API calls 86272->86275 86278 475ca8 86273->86278 86274 408f40 VariantClear 86274->86275 86275->86265 86275->86268 86275->86269 86275->86271 86275->86272 86275->86274 86276 475cd5 86275->86276 86282 475ca0 86275->86282 86300 40c4e0 199 API calls 86275->86300 86301 45e737 90 API calls 3 library calls 86276->86301 86278->86233 86280 475ce8 86281 408f40 VariantClear 86280->86281 86281->86278 86283 408f40 VariantClear 86282->86283 86283->86278 86285 47b2e7 86284->86285 86286 47b2a5 86284->86286 86285->86233 86302 40e710 86286->86302 86289 47b2b7 86313 47974b 86289->86313 86290 47b2cf 86291 47974b 144 API calls 86290->86291 86293 47b2df 86291->86293 86293->86233 86294 47b2c7 86294->86233 86295->86233 86296->86205 86297->86205 86298->86221 86299->86259 86300->86275 86301->86280 86303 408f40 VariantClear 86302->86303 86304 40e71b 86303->86304 86305 4115d7 52 API calls 86304->86305 86306 40e729 86305->86306 86307 40e734 86306->86307 86308 426bdc 86306->86308 86309 426be7 86307->86309 86311 401b10 52 API calls 86307->86311 86308->86309 86310 40bc70 52 API calls 86308->86310 86310->86309 86312 40e743 86311->86312 86312->86289 86312->86290 86314 479786 86313->86314 86315 479aed 86313->86315 86314->86315 86318 479798 86314->86318 86382 451b42 61 API calls 86315->86382 86317 479b00 86317->86294 86319 4797a2 86318->86319 86320 4797be 86318->86320 86375 451b42 61 API calls 86319->86375 86321 4797c7 86320->86321 86322 4797e3 86320->86322 86376 451b42 61 API calls 86321->86376 86353 441eba 86322->86353 86326 4797b5 86326->86294 86327 4797da 86327->86294 86328 4797f7 86329 479815 86328->86329 86330 4797fe 86328->86330 86334 47983c 86329->86334 86358 451d2b 86329->86358 86377 451b42 61 API calls 86330->86377 86332 47980c 86332->86294 86338 4798e6 86334->86338 86369 479714 86334->86369 86335 47994b VariantInit 86338->86335 86339 479916 VariantClear 86338->86339 86339->86338 86354 441f12 86353->86354 86355 441ecc _wcslen 86353->86355 86354->86328 86355->86354 86356 410160 52 API calls 86355->86356 86357 441ede 86356->86357 86357->86328 86359 451d5e 86358->86359 86360 451f21 86359->86360 86361 451e93 SysFreeString 86359->86361 86362 451ea0 86359->86362 86363 451d68 86359->86363 86360->86362 86365 451f6d lstrcmpiW 86360->86365 86361->86362 86362->86363 86363->86334 86370 479728 86369->86370 86384 479500 VariantInit 86370->86384 86375->86326 86376->86327 86377->86332 86382->86317 86443 4289d2 86442->86443 86444 408db3 86442->86444 86472 45e737 90 API calls 3 library calls 86443->86472 86468 40bec0 86444->86468 86447 4289e5 86473 45e737 90 API calls 3 library calls 86447->86473 86448 408e5a 86448->85939 86450 428a05 86452 408f40 VariantClear 86450->86452 86451 40ba10 52 API calls 86454 408dc9 86451->86454 86452->86448 86453 40a780 199 API calls 86453->86454 86454->86447 86454->86448 86454->86450 86454->86451 86454->86453 86455 408e64 86454->86455 86457 408f40 VariantClear 86454->86457 86456 408f40 VariantClear 86455->86456 86456->86448 86457->86454 86459 408f40 VariantClear 86458->86459 86460 403d20 86459->86460 86461 403cd0 VariantClear 86460->86461 86462 403d4d 86461->86462 86475 477145 86462->86475 86480 46f8cb 86462->86480 86499 4755ad 86462->86499 86463 403d76 86463->85940 86463->85950 86467->85940 86469 40bed0 86468->86469 86470 40bef2 86469->86470 86474 45e737 90 API calls 3 library calls 86469->86474 86470->86454 86472->86447 86473->86450 86474->86470 86476 408e80 VariantClear 86475->86476 86477 47715a 86476->86477 86502 467ac4 86477->86502 86479 477160 86479->86463 86481 46f8e7 86480->86481 86482 46f978 86480->86482 86483 46f900 86481->86483 86484 46f8ee 86481->86484 86485 46f93c 86481->86485 86486 46f91a 86481->86486 86482->86463 86487 45340c 85 API calls 86483->86487 86490 45340c 85 API calls 86484->86490 86489 45340c 85 API calls 86485->86489 86488 45340c 85 API calls 86486->86488 86487->86484 86491 46f931 86488->86491 86492 46f958 86489->86492 86494 46f971 86490->86494 86495 45340c 85 API calls 86491->86495 86493 45340c 85 API calls 86492->86493 86496 46f95f 86493->86496 86525 46cb5f 86494->86525 86495->86484 86498 45340c 85 API calls 86496->86498 86498->86484 86575 475077 86499->86575 86501 4755c0 86501->86463 86503 467adc 86502->86503 86513 467bb8 86502->86513 86504 467c1d 86503->86504 86505 467c16 86503->86505 86506 467b90 86503->86506 86515 467aed 86503->86515 86508 4115d7 52 API calls 86504->86508 86524 40e270 VariantClear moneypunct 86505->86524 86509 4115d7 52 API calls 86506->86509 86521 467b75 _memmove 86508->86521 86509->86521 86510 467b55 86512 4115d7 52 API calls 86510->86512 86511 4115d7 52 API calls 86511->86513 86514 467b5b 86512->86514 86513->86479 86522 442ee0 52 API calls 86514->86522 86517 4115d7 52 API calls 86515->86517 86520 467b28 moneypunct 86515->86520 86517->86520 86518 467b6b 86523 45f645 54 API calls moneypunct 86518->86523 86520->86504 86520->86510 86520->86521 86521->86511 86522->86518 86523->86521 86524->86504 86526 40bc70 52 API calls 86525->86526 86527 46cb7e 86526->86527 86528 40bc70 52 API calls 86527->86528 86529 46cb86 86528->86529 86530 40bc70 52 API calls 86529->86530 86531 46cb91 86530->86531 86532 408f40 VariantClear 86531->86532 86533 46cbaf 86532->86533 86534 46cbd4 CLSIDFromProgID 86533->86534 86535 46cbc5 OleInitialize 86533->86535 86535->86534 86628 4533eb 86575->86628 86578 4750ee 86581 408f40 VariantClear 86578->86581 86579 475129 86632 4646e0 86579->86632 86585 4750f5 86581->86585 86582 47515e 86583 475162 86582->86583 86591 47518e 86582->86591 86584 408f40 VariantClear 86583->86584 86585->86501 86629 453404 86628->86629 86630 4533f8 86628->86630 86629->86578 86629->86579 86630->86629 86675 4531b1 85 API calls 5 library calls 86630->86675 86676 4536f7 53 API calls 86632->86676 86634 4646fc 86677 4426cd 59 API calls _wcslen 86634->86677 86636 464711 86638 40bc70 52 API calls 86636->86638 86643 46474b 86636->86643 86639 46472c 86638->86639 86678 461465 52 API calls _memmove 86639->86678 86641 464741 86642 40c600 52 API calls 86641->86642 86642->86643 86644 464793 86643->86644 86679 463ad5 64 API calls __wcsicoll 86643->86679 86644->86582 86675->86629 86676->86634 86677->86636 86678->86641 86679->86644 86681->85960 86682->86056 86683->85973 86684->86022 86685->86022 86686->85992 86687->86018 86688->85984 86689->85988 86690->85993 86691->86050 86692->86050 86693->86006 86694->86024 86695->86011 86696->86042 86697->86063 86698->86063 86699->86056 86700->86071 86701->86082 86702->86075 86703->86080 86704->86088 86705->86088 86706->86024 86707 42d154 86711 480a8d 86707->86711 86709 42d161 86710 480a8d 199 API calls 86709->86710 86710->86709 86712 480ae4 86711->86712 86713 480b26 86711->86713 86715 480aeb 86712->86715 86716 480b15 86712->86716 86714 40bc70 52 API calls 86713->86714 86726 480b2e 86714->86726 86718 480aee 86715->86718 86719 480b04 86715->86719 86744 4805bf 199 API calls 86716->86744 86718->86713 86721 480af3 86718->86721 86743 47fea2 199 API calls __itow_s 86719->86743 86742 47f135 199 API calls 86721->86742 86722 40e0a0 52 API calls 86722->86726 86725 408f40 VariantClear 86728 481156 86725->86728 86726->86722 86727 480aff 86726->86727 86729 40c2c0 52 API calls 86726->86729 86732 401980 53 API calls 86726->86732 86734 40e710 53 API calls 86726->86734 86735 40a780 199 API calls 86726->86735 86736 480ff5 86726->86736 86738 408e80 VariantClear 86726->86738 86745 45377f 52 API calls 86726->86745 86746 45e951 53 API calls 86726->86746 86747 40e830 53 API calls 86726->86747 86748 47925f 53 API calls 86726->86748 86749 47fcff 199 API calls 86726->86749 86727->86725 86730 408f40 VariantClear 86728->86730 86729->86726 86731 48115e 86730->86731 86731->86709 86732->86726 86734->86726 86735->86726 86750 45e737 90 API calls 3 library calls 86736->86750 86738->86726 86742->86727 86743->86727 86744->86727 86745->86726 86746->86726 86747->86726 86748->86726 86749->86726 86750->86727 86751 428905 86752 4115d7 52 API calls 86751->86752 86753 42890c 86752->86753 86754 428945 86753->86754 86755 42891f 86753->86755 86756 4115d7 52 API calls 86754->86756 86757 4115d7 52 API calls 86755->86757 86758 42894c 86756->86758 86759 428925 _memmove 86757->86759 86760 42b14b 86767 40bc10 86760->86767 86762 42b159 86763 4096a0 330 API calls 86762->86763 86764 42b177 86763->86764 86778 44b92d VariantClear 86764->86778 86766 42bc5b 86768 40bc24 86767->86768 86769 40bc17 86767->86769 86770 40bc2a 86768->86770 86771 40bc3c 86768->86771 86772 408e80 VariantClear 86769->86772 86773 408e80 VariantClear 86770->86773 86774 4115d7 52 API calls 86771->86774 86775 40bc1f 86772->86775 86776 40bc33 86773->86776 86777 40bc43 86774->86777 86775->86762 86776->86762 86777->86762 86778->86766 86779 425b2b 86784 40f000 86779->86784 86783 425b3a 86785 4115d7 52 API calls 86784->86785 86786 40f007 86785->86786 86787 4276ea 86786->86787 86793 40f030 86786->86793 86792 41130a 51 API calls __cinit 86792->86783 86794 40f039 86793->86794 86795 40f01a 86793->86795 86823 41130a 51 API calls __cinit 86794->86823 86797 40e500 86795->86797 86798 40bc70 52 API calls 86797->86798 86799 40e515 GetVersionExW 86798->86799 86800 402160 52 API calls 86799->86800 86801 40e557 86800->86801 86824 40e660 86801->86824 86807 427674 86811 4276c6 GetSystemInfo 86807->86811 86809 40e5e0 86813 4276d5 GetSystemInfo 86809->86813 86838 40efd0 86809->86838 86810 40e5cd GetCurrentProcess 86845 40ef20 LoadLibraryA GetProcAddress 86810->86845 86811->86813 86816 40e629 86842 40ef90 86816->86842 86819 40e641 FreeLibrary 86820 40e644 86819->86820 86821 40e653 FreeLibrary 86820->86821 86822 40e656 86820->86822 86821->86822 86822->86792 86823->86795 86825 40e667 86824->86825 86826 42761d 86825->86826 86827 40c600 52 API calls 86825->86827 86828 40e55c 86827->86828 86829 40e680 86828->86829 86830 40e687 86829->86830 86831 427616 86830->86831 86832 40c600 52 API calls 86830->86832 86833 40e566 86832->86833 86833->86807 86834 40ef60 86833->86834 86835 40e5c8 86834->86835 86836 40ef66 LoadLibraryA 86834->86836 86835->86809 86835->86810 86836->86835 86837 40ef77 GetProcAddress 86836->86837 86837->86835 86839 40e620 86838->86839 86840 40efd6 LoadLibraryA 86838->86840 86839->86811 86839->86816 86840->86839 86841 40efe7 GetProcAddress 86840->86841 86841->86839 86846 40efb0 LoadLibraryA GetProcAddress 86842->86846 86844 40e632 GetNativeSystemInfo 86844->86819 86844->86820 86845->86809 86846->86844 86847 425b5e 86852 40c7f0 86847->86852 86851 425b6d 86887 40db10 52 API calls 86852->86887 86854 40c82a 86888 410ab0 6 API calls 86854->86888 86856 40c86d 86857 40bc70 52 API calls 86856->86857 86858 40c877 86857->86858 86859 40bc70 52 API calls 86858->86859 86860 40c881 86859->86860 86861 40bc70 52 API calls 86860->86861 86862 40c88b 86861->86862 86863 40bc70 52 API calls 86862->86863 86864 40c8d1 86863->86864 86865 40bc70 52 API calls 86864->86865 86866 40c991 86865->86866 86889 40d2c0 52 API calls 86866->86889 86868 40c99b 86890 40d0d0 53 API calls 86868->86890 86870 40c9c1 86871 40bc70 52 API calls 86870->86871 86872 40c9cb 86871->86872 86891 40e310 53 API calls 86872->86891 86874 40ca28 86875 408f40 VariantClear 86874->86875 86876 40ca30 86875->86876 86877 408f40 VariantClear 86876->86877 86878 40ca38 GetStdHandle 86877->86878 86879 429630 86878->86879 86880 40ca87 86878->86880 86879->86880 86881 429639 86879->86881 86886 41130a 51 API calls __cinit 86880->86886 86892 4432c0 57 API calls 86881->86892 86883 429641 86893 44b6ab CreateThread 86883->86893 86885 42964f CloseHandle 86885->86880 86886->86851 86887->86854 86888->86856 86889->86868 86890->86870 86891->86874 86892->86883 86893->86885 86894 44b5cb 58 API calls 86893->86894 86895 425b6f 86900 40dc90 86895->86900 86899 425b7e 86901 40bc70 52 API calls 86900->86901 86902 40dd03 86901->86902 86909 40f210 86902->86909 86904 40dd96 86905 426a97 86904->86905 86907 40ddb7 86904->86907 86912 40dc00 52 API calls 2 library calls 86904->86912 86908 41130a 51 API calls __cinit 86907->86908 86908->86899 86913 40f250 RegOpenKeyExW 86909->86913 86911 40f230 86911->86904 86912->86904 86914 425e17 86913->86914 86915 40f275 RegQueryValueExW 86913->86915 86914->86911 86916 40f2c3 RegCloseKey 86915->86916 86917 40f298 86915->86917 86916->86911 86918 40f2a9 RegCloseKey 86917->86918 86919 425e1d 86917->86919 86918->86911 86920 41fd810 86934 41fb460 86920->86934 86922 41fd8c5 86937 41fd700 86922->86937 86936 41fbaeb 86934->86936 86940 41fe910 GetPEB 86934->86940 86936->86922 86938 41fd709 Sleep 86937->86938 86939 41fd717 86938->86939 86940->86936
      APIs
      • _wcslen.LIBCMT ref: 004096C1
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • _memmove.LIBCMT ref: 0040970C
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
      • _memmove.LIBCMT ref: 00409D96
      • _memmove.LIBCMT ref: 0040A6C4
      • _memmove.LIBCMT ref: 004297E5
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
      • String ID:
      • API String ID: 2383988440-0
      • Opcode ID: eda493e7f635b4d651ef0572aa73cbf796ade256709b72ea31569c7d9da174e7
      • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
      • Opcode Fuzzy Hash: eda493e7f635b4d651ef0572aa73cbf796ade256709b72ea31569c7d9da174e7
      • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

      Control-flow Graph

      APIs
      • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
        • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
        • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
      • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
      • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
        • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
      • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
      • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
      • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
      • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
      • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
        • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
        • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
        • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
        • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
        • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
        • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
        • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
        • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
        • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
        • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
        • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
        • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
      Strings
      • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
      • runas, xrefs: 0042E2AD, 0042E2DC
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
      • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
      • API String ID: 2495805114-3383388033
      • Opcode ID: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
      • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
      • Opcode Fuzzy Hash: a40813cb8be74a7845095afbf10676f30eabccecee99da57b5cbcca8d29a6aad
      • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1515 46cb5f-46cbc3 call 40bc70 * 3 call 408f40 1524 46cbd4-46cbe7 CLSIDFromProgID 1515->1524 1525 46cbc5-46cbcd OleInitialize 1515->1525 1526 46cc33-46cc47 1524->1526 1527 46cbe9-46cbf9 CLSIDFromString 1524->1527 1525->1524 1528 46cca6-46ccba call 458651 1526->1528 1529 46cc49-46cc60 CoCreateInstance 1526->1529 1527->1526 1530 46cbfb-46cc05 1527->1530 1532 46cc96-46cca1 1528->1532 1539 46ccbc-46ccf7 CoInitializeSecurity call 412f40 call 4311fc 1528->1539 1529->1532 1533 46cc62-46cc8b call 43119b 1529->1533 1534 46cc06-46cc30 call 451b42 call 402250 * 3 1530->1534 1532->1534 1548 46cc8e-46cc90 1533->1548 1553 46cdf4 1539->1553 1554 46ccfd-46cd1f call 402160 call 431a2b 1539->1554 1548->1532 1551 46ceb7-46cef0 call 468070 call 402250 * 3 1548->1551 1555 46cdfa-46ce4a call 412f40 CoCreateInstanceEx CoTaskMemFree 1553->1555 1569 46cd35-46cd47 call 465177 1554->1569 1570 46cd21-46cd33 1554->1570 1555->1532 1565 46ce50-46ce55 1555->1565 1565->1532 1568 46ce5b-46ce62 1565->1568 1574 46ce64-46ce8b CoSetProxyBlanket 1568->1574 1575 46ce8d-46ce9e 1568->1575 1582 46cd4a-46cda3 call 40e0a0 call 402250 call 46150f call 40e0a0 call 402250 1569->1582 1571 46cda5-46cdaa 1570->1571 1579 46cdac-46cdbb call 4111c1 1571->1579 1580 46cdbd-46cdc0 1571->1580 1574->1575 1575->1548 1578 46cea4-46ceb2 1575->1578 1578->1534 1581 46cdc3-46cdf2 1579->1581 1580->1581 1581->1555 1582->1571
      APIs
      • OleInitialize.OLE32(00000000), ref: 0046CBC7
      • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
      • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
      • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
      • _wcslen.LIBCMT ref: 0046CDB0
      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
      • CoTaskMemFree.OLE32(?), ref: 0046CE42
      • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
        • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
        • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
        • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
      Strings
      • NULL Pointer assignment, xrefs: 0046CEA6
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
      • String ID: NULL Pointer assignment
      • API String ID: 440038798-2785691316
      • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
      • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
      • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
      • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1986 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1995 40e582-40e583 1986->1995 1996 427674-427679 1986->1996 1999 40e585-40e596 1995->1999 2000 40e5ba-40e5cb call 40ef60 1995->2000 1997 427683-427686 1996->1997 1998 42767b-427681 1996->1998 2003 427693-427696 1997->2003 2004 427688-427691 1997->2004 2002 4276b4-4276be 1998->2002 2005 427625-427629 1999->2005 2006 40e59c-40e59f 1999->2006 2017 40e5ec-40e60c 2000->2017 2018 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2000->2018 2019 4276c6-4276ca GetSystemInfo 2002->2019 2003->2002 2009 427698-4276a8 2003->2009 2004->2002 2011 427636-427640 2005->2011 2012 42762b-427631 2005->2012 2007 40e5a5-40e5ae 2006->2007 2008 427654-427657 2006->2008 2013 40e5b4 2007->2013 2014 427645-42764f 2007->2014 2008->2000 2020 42765d-42766f 2008->2020 2015 4276b0 2009->2015 2016 4276aa-4276ae 2009->2016 2011->2000 2012->2000 2013->2000 2014->2000 2015->2002 2016->2002 2022 40e612-40e623 call 40efd0 2017->2022 2023 4276d5-4276df GetSystemInfo 2017->2023 2018->2017 2030 40e5e8 2018->2030 2019->2023 2020->2000 2022->2019 2028 40e629-40e63f call 40ef90 GetNativeSystemInfo 2022->2028 2032 40e641-40e642 FreeLibrary 2028->2032 2033 40e644-40e651 2028->2033 2030->2017 2032->2033 2034 40e653-40e654 FreeLibrary 2033->2034 2035 40e656-40e65d 2033->2035 2034->2035
      APIs
      • GetVersionExW.KERNEL32(?), ref: 0040E52A
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
      • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
      • FreeLibrary.KERNEL32(?), ref: 0040E642
      • FreeLibrary.KERNEL32(?), ref: 0040E654
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
      • String ID: 0SH
      • API String ID: 3363477735-851180471
      • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
      • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
      • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
      • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
      APIs
      • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
      • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: IsThemeActive$uxtheme.dll
      • API String ID: 2574300362-3542929980
      • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
      • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
      • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
      • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
      APIs
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
      • Sleep.KERNEL32(0000000A,?), ref: 004094D1
      • TranslateMessage.USER32(?), ref: 00409556
      • DispatchMessageW.USER32(?), ref: 00409561
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Message$Peek$DispatchSleepTranslate
      • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
      • API String ID: 1762048999-758534266
      • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
      • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
      • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
      • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

      Control-flow Graph

      APIs
      • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • __wcsicoll.LIBCMT ref: 00402007
      • __wcsicoll.LIBCMT ref: 0040201D
      • __wcsicoll.LIBCMT ref: 00402033
        • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
      • __wcsicoll.LIBCMT ref: 00402049
      • _wcscpy.LIBCMT ref: 0040207C
      • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
      • API String ID: 3948761352-1609664196
      • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
      • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
      • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
      • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

      Control-flow Graph

      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
      • __wsplitpath.LIBCMT ref: 0040E41C
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • _wcsncat.LIBCMT ref: 0040E433
      • __wmakepath.LIBCMT ref: 0040E44F
        • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • _wcscpy.LIBCMT ref: 0040E487
        • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
      • _wcscat.LIBCMT ref: 00427541
      • _wcslen.LIBCMT ref: 00427551
      • _wcslen.LIBCMT ref: 00427562
      • _wcscat.LIBCMT ref: 0042757C
      • _wcsncpy.LIBCMT ref: 004275BC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
      • String ID: Include$\
      • API String ID: 3173733714-3429789819
      • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
      • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
      • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
      • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

      Control-flow Graph

      APIs
      • _fseek.LIBCMT ref: 0045292B
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
      • __fread_nolock.LIBCMT ref: 00452961
      • __fread_nolock.LIBCMT ref: 00452971
      • __fread_nolock.LIBCMT ref: 0045298A
      • __fread_nolock.LIBCMT ref: 004529A5
      • _fseek.LIBCMT ref: 004529BF
      • _malloc.LIBCMT ref: 004529CA
      • _malloc.LIBCMT ref: 004529D6
      • __fread_nolock.LIBCMT ref: 004529E7
      • _free.LIBCMT ref: 00452A17
      • _free.LIBCMT ref: 00452A20
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
      • String ID:
      • API String ID: 1255752989-0
      • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
      • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
      • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
      • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __fread_nolock$_fseek_wcscpy
      • String ID: FILE
      • API String ID: 3888824918-3121273764
      • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
      • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
      • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
      • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

      Control-flow Graph

      APIs
      • GetSysColorBrush.USER32(0000000F), ref: 004104C3
      • RegisterClassExW.USER32(00000030), ref: 004104ED
      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
      • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
      • LoadIconW.USER32(00400000,000000A9), ref: 00410542
      • ImageList_ReplaceIcon.COMCTL32(00C05490,000000FF,00000000), ref: 00410552
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
      • API String ID: 2914291525-1005189915
      • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
      • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
      • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
      • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

      Control-flow Graph

      APIs
      • GetSysColorBrush.USER32(0000000F), ref: 0041039B
      • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
      • LoadIconW.USER32(?,00000063), ref: 004103C0
      • LoadIconW.USER32(?,000000A4), ref: 004103D3
      • LoadIconW.USER32(?,000000A2), ref: 004103E6
      • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
      • RegisterClassExW.USER32(?), ref: 0041045D
        • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
        • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
        • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
        • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
        • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
        • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
        • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00C05490,000000FF,00000000), ref: 00410552
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
      • String ID: #$0$AutoIt v3
      • API String ID: 423443420-4155596026
      • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
      • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
      • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
      • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _malloc
      • String ID: Default
      • API String ID: 1579825452-753088835
      • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
      • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
      • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
      • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2036 40f5c0-40f5cf call 422240 2039 40f5d0-40f5e8 2036->2039 2039->2039 2040 40f5ea-40f613 call 413650 call 410e60 2039->2040 2045 40f614-40f633 call 414d04 2040->2045 2048 40f691 2045->2048 2049 40f635-40f63c 2045->2049 2052 40f696-40f69c 2048->2052 2050 40f660-40f674 call 4150d1 2049->2050 2051 40f63e 2049->2051 2056 40f679-40f67c 2050->2056 2053 40f640 2051->2053 2055 40f642-40f650 2053->2055 2057 40f652-40f655 2055->2057 2058 40f67e-40f68c 2055->2058 2056->2045 2059 40f65b-40f65e 2057->2059 2060 425d1e-425d3e call 4150d1 call 414d04 2057->2060 2061 40f68e-40f68f 2058->2061 2062 40f69f-40f6ad 2058->2062 2059->2050 2059->2053 2073 425d43-425d5f call 414d30 2060->2073 2061->2057 2063 40f6b4-40f6c2 2062->2063 2064 40f6af-40f6b2 2062->2064 2066 425d16 2063->2066 2067 40f6c8-40f6d6 2063->2067 2064->2057 2066->2060 2069 425d05-425d0b 2067->2069 2070 40f6dc-40f6df 2067->2070 2069->2055 2072 425d11 2069->2072 2070->2057 2072->2066 2073->2052
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __fread_nolock_fseek_memmove_strcat
      • String ID: AU3!$EA06
      • API String ID: 1268643489-2658333250
      • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
      • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
      • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
      • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2076 401100-401111 2077 401113-401119 2076->2077 2078 401179-401180 2076->2078 2080 401144-40114a 2077->2080 2081 40111b-40111e 2077->2081 2078->2077 2079 401182 2078->2079 2085 40112c-401141 DefWindowProcW 2079->2085 2083 401184-40118e call 401250 2080->2083 2084 40114c-40114f 2080->2084 2081->2080 2082 401120-401126 2081->2082 2082->2085 2086 42b038-42b03f 2082->2086 2093 401193-40119a 2083->2093 2087 401151-401157 2084->2087 2088 40119d 2084->2088 2086->2085 2092 42b045-42b059 call 401000 call 40e0c0 2086->2092 2090 401219-40121f 2087->2090 2091 40115d 2087->2091 2094 4011a3-4011a9 2088->2094 2095 42afb4-42afc5 call 40f190 2088->2095 2090->2082 2099 401225-42b06d call 468b0e 2090->2099 2097 401163-401166 2091->2097 2098 42b01d-42b024 2091->2098 2092->2085 2094->2082 2096 4011af 2094->2096 2095->2093 2096->2082 2102 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2096->2102 2103 4011db-401202 SetTimer RegisterWindowMessageW 2096->2103 2105 42afe9-42b018 call 40f190 call 401a50 2097->2105 2106 40116c-401172 2097->2106 2098->2085 2104 42b02a-42b033 call 4370f4 2098->2104 2099->2093 2103->2093 2112 401204-401216 CreatePopupMenu 2103->2112 2104->2085 2105->2085 2106->2082 2114 401174-42afde call 45fd57 2106->2114 2114->2085 2127 42afe4 2114->2127 2127->2093
      APIs
      • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
      • KillTimer.USER32(?,00000001,?), ref: 004011B9
      • PostQuitMessage.USER32(00000000), ref: 004011CB
      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
      • CreatePopupMenu.USER32 ref: 00401204
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
      • String ID: TaskbarCreated
      • API String ID: 129472671-2362178303
      • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
      • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
      • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
      • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2128 4115d7-4115df 2129 4115ee-4115f9 call 4135bb 2128->2129 2132 4115e1-4115ec call 411988 2129->2132 2133 4115fb-4115fc 2129->2133 2132->2129 2136 4115fd-41160e 2132->2136 2137 411610-41163b call 417fc0 call 41130a 2136->2137 2138 41163c-411656 call 4180af call 418105 2136->2138 2137->2138
      APIs
      • _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
      • std::exception::exception.LIBCMT ref: 00411626
      • std::exception::exception.LIBCMT ref: 00411640
      • __CxxThrowException@8.LIBCMT ref: 00411651
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
      • String ID: ,*H$4*H$@fI
      • API String ID: 615853336-1459471987
      • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
      • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
      • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
      • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2147 41fbd80-41fbdd2 call 41fbc80 CreateFileW 2150 41fbddb-41fbde8 2147->2150 2151 41fbdd4-41fbdd6 2147->2151 2154 41fbdfb-41fbe12 VirtualAlloc 2150->2154 2155 41fbdea-41fbdf6 2150->2155 2152 41fbf34-41fbf38 2151->2152 2156 41fbe1b-41fbe41 CreateFileW 2154->2156 2157 41fbe14-41fbe16 2154->2157 2155->2152 2158 41fbe65-41fbe7f ReadFile 2156->2158 2159 41fbe43-41fbe60 2156->2159 2157->2152 2161 41fbea3-41fbea7 2158->2161 2162 41fbe81-41fbe9e 2158->2162 2159->2152 2164 41fbea9-41fbec6 2161->2164 2165 41fbec8-41fbedf WriteFile 2161->2165 2162->2152 2164->2152 2166 41fbf0a-41fbf2f CloseHandle VirtualFree 2165->2166 2167 41fbee1-41fbf08 2165->2167 2166->2152 2167->2152
      APIs
      • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 041FBDC5
      Memory Dump Source
      • Source File: 00000000.00000002.1747619518.00000000041FB000.00000040.00000020.00020000.00000000.sdmp, Offset: 041FB000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_41fb000_payment Receipt.jbxd
      Similarity
      • API ID: CreateFile
      • String ID:
      • API String ID: 823142352-0
      • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
      • Instruction ID: d76e9f86b386b634e0b0fe0c7720c5bce3322ae0f9eb71dd0347cfac622bc8de
      • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
      • Instruction Fuzzy Hash: 51511775A15208FBEF24DFA4CC89FEE77B8AF48700F108554F70AEA180DB74A6459B60

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2177 401250-40125c 2178 401262-401293 call 412f40 call 401b80 2177->2178 2179 4012e8-4012ed 2177->2179 2184 4012d1-4012e2 KillTimer SetTimer 2178->2184 2185 401295-4012b5 2178->2185 2184->2179 2186 4012bb-4012bf 2185->2186 2187 4272ec-4272f2 2185->2187 2190 4012c5-4012cb 2186->2190 2191 42733f-427346 2186->2191 2188 4272f4-427315 Shell_NotifyIconW 2187->2188 2189 42731a-42733a Shell_NotifyIconW 2187->2189 2188->2184 2189->2184 2190->2184 2194 427393-4273b4 Shell_NotifyIconW 2190->2194 2192 427348-427369 Shell_NotifyIconW 2191->2192 2193 42736e-42738e Shell_NotifyIconW 2191->2193 2192->2184 2193->2184 2194->2184
      APIs
        • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
        • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
        • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
      • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
      • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
      • String ID:
      • API String ID: 3300667738-0
      • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
      • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
      • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
      • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2195 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2198 427190-4271ae RegQueryValueExW 2195->2198 2199 40e4eb-40e4f0 2195->2199 2200 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2198->2200 2201 42721a-42722a RegCloseKey 2198->2201 2206 427210-427219 call 436508 2200->2206 2207 4271f7-42720e call 402160 2200->2207 2206->2201 2207->2206
      APIs
      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
      • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: QueryValue$CloseOpen
      • String ID: Include$Software\AutoIt v3\AutoIt
      • API String ID: 1586453840-614718249
      • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
      • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
      • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
      • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
      APIs
      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
      • ShowWindow.USER32(?,00000000), ref: 004105E4
      • ShowWindow.USER32(?,00000000), ref: 004105EE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$CreateShow
      • String ID: AutoIt v3$edit
      • API String ID: 1584632944-3779509399
      • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
      • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
      • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
      • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Variant$Copy$ClearErrorLast
      • String ID: NULL Pointer assignment$Not an Object type
      • API String ID: 2487901850-572801152
      • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
      • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
      • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
      • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
      APIs
      • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • _wcsncpy.LIBCMT ref: 00401C41
      • _wcscpy.LIBCMT ref: 00401C5D
      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
      • String ID: Line:
      • API String ID: 1874344091-1585850449
      • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
      • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
      • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
      • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
      APIs
      • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
      • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
      • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
      • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Close$OpenQueryValue
      • String ID: Control Panel\Mouse
      • API String ID: 1607946009-824357125
      • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
      • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
      • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
      • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
      APIs
      • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
      • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
      • _wcsncpy.LIBCMT ref: 004102ED
      • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
      • _wcsncpy.LIBCMT ref: 00410340
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcsncpy$DesktopFolderFromListMallocPath
      • String ID:
      • API String ID: 3170942423-0
      • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
      • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
      • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
      • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
      APIs
        • Part of subcall function 041FD700: Sleep.KERNELBASE(000001F4), ref: 041FD711
      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 041FD931
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1747619518.00000000041FB000.00000040.00000020.00020000.00000000.sdmp, Offset: 041FB000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_41fb000_payment Receipt.jbxd
      Similarity
      • API ID: CreateFileSleep
      • String ID: OHVOQ4N7NJQ6RO58
      • API String ID: 2694422964-1544095311
      • Opcode ID: 3caed6eb84ae6e39304824b3fa92999008f0c337a4bf561d463012a63031fd6e
      • Instruction ID: 08c384a5f00caafd189d920db90a411c23a8938d2ea8a2ec46d208c34ee54396
      • Opcode Fuzzy Hash: 3caed6eb84ae6e39304824b3fa92999008f0c337a4bf561d463012a63031fd6e
      • Instruction Fuzzy Hash: 1E519230D14249DBEF15DBA4DC58BEEBB79AF45300F004199E609BB2C0D7791B49CB65
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
      • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
      • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
      • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
      APIs
      • VariantInit.OLEAUT32(?), ref: 0047950F
      • SysAllocString.OLEAUT32(00000000), ref: 004795D8
      • VariantCopy.OLEAUT32(?,?), ref: 0047960F
      • VariantClear.OLEAUT32(?), ref: 00479650
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Variant$AllocClearCopyInitString
      • String ID:
      • API String ID: 2808897238-0
      • Opcode ID: 81882916ed450cc42db375fcf7c21005814c176867ddcffa7bb55a60db91dd5f
      • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
      • Opcode Fuzzy Hash: 81882916ed450cc42db375fcf7c21005814c176867ddcffa7bb55a60db91dd5f
      • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID: Error:
      • API String ID: 4104443479-232661952
      • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
      • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
      • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
      • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
      APIs
      • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
        • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
        • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
        • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
        • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
        • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
        • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
      • String ID: X$pWH
      • API String ID: 85490731-941433119
      • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
      • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
      • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
      • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
      APIs
      • _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • _memmove.LIBCMT ref: 00401B57
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
      • String ID: @EXITCODE
      • API String ID: 2734553683-3436989551
      • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
      • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
      • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
      • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
      APIs
      • CreateProcessW.KERNELBASE(?,00000000), ref: 041FC4A5
      • ExitProcess.KERNEL32(00000000), ref: 041FC4C4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1747619518.00000000041FB000.00000040.00000020.00020000.00000000.sdmp, Offset: 041FB000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_41fb000_payment Receipt.jbxd
      Similarity
      • API ID: Process$CreateExit
      • String ID: D
      • API String ID: 126409537-2746444292
      • Opcode ID: 9ec10d9bb68332e7bcdb3756cd9d8bc900757a5150bae08cbb91c2426b35d2e1
      • Instruction ID: cb2489296de999cb3bbd58b8ae0a8221e76caabe31f23836cde6ae72e06cd698
      • Opcode Fuzzy Hash: 9ec10d9bb68332e7bcdb3756cd9d8bc900757a5150bae08cbb91c2426b35d2e1
      • Instruction Fuzzy Hash: 52F0EC7254424CABDB60EFE0CC89FFE777CBF44705F008508BB1A9A184EB74A6189B65
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
      • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
      • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
      • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __filbuf__getptd_noexit__read_memcpy_s
      • String ID:
      • API String ID: 1794320848-0
      • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
      • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
      • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
      • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
      APIs
      • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
      • TerminateProcess.KERNEL32(00000000), ref: 004753CE
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Process$CurrentTerminate
      • String ID:
      • API String ID: 2429186680-0
      • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
      • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
      • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
      • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
      APIs
      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: IconNotifyShell_
      • String ID:
      • API String ID: 1144537725-0
      • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
      • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
      • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
      • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
      APIs
      • _malloc.LIBCMT ref: 0043214B
        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
      • _malloc.LIBCMT ref: 0043215D
      • _malloc.LIBCMT ref: 0043216F
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _malloc$AllocateHeap
      • String ID:
      • API String ID: 680241177-0
      • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
      • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
      • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
      • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
      APIs
      • TranslateMessage.USER32(?), ref: 00409556
      • DispatchMessageW.USER32(?), ref: 00409561
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Message$DispatchPeekTranslate
      • String ID:
      • API String ID: 4217535847-0
      • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
      • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
      • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
      • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
      APIs
        • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
      • _free.LIBCMT ref: 004295A0
        • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
        • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
        • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
        • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
        • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
        • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
      • String ID: >>>AUTOIT SCRIPT<<<
      • API String ID: 3938964917-2806939583
      • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
      • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
      • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
      • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
      Strings
      • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _strcat
      • String ID: >>>AUTOIT NO CMDEXECUTE<<<
      • API String ID: 1765576173-2684727018
      • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
      • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
      • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
      • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
      • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
      • Opcode Fuzzy Hash: 30fb1b5656a8e298aebe1b45ed9f9297ed51282c110b4441b4c64d109fdc6671
      • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID:
      • API String ID: 4104443479-0
      • Opcode ID: 275534035a012e7ef0db215d78f24564d6aa5c775b6c55b3817692144b07e5e7
      • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
      • Opcode Fuzzy Hash: 275534035a012e7ef0db215d78f24564d6aa5c775b6c55b3817692144b07e5e7
      • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
      APIs
        • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
        • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
        • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
      • _strcat.LIBCMT ref: 0040F786
        • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
        • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
      • String ID:
      • API String ID: 3199840319-0
      • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
      • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
      • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
      • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
      APIs
      • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
      • FreeLibrary.KERNEL32(?), ref: 0040D78E
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: FreeInfoLibraryParametersSystem
      • String ID:
      • API String ID: 3403648963-0
      • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
      • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
      • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
      • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
      APIs
      • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 00473B8D
      • _memmove.LIBCMT ref: 00473BBD
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ArrayCreateSafeVector_memmove
      • String ID:
      • API String ID: 564309351-0
      • Opcode ID: 927860ad1d610d876ffb5b648d8578c5aeccaab6c37d476698ef8c4dfd3a4d25
      • Instruction ID: 457454d8b13899d86e5be62d6fbacd9c0d8eef3db234b15496ed66e70df05eda
      • Opcode Fuzzy Hash: 927860ad1d610d876ffb5b648d8578c5aeccaab6c37d476698ef8c4dfd3a4d25
      • Instruction Fuzzy Hash: AC018F7790011C66D600FA6AEC429EB776CDB80355F00057FFE05A6142EE39AA5982F9
      APIs
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      • __lock_file.LIBCMT ref: 00414A8D
        • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
      • __fclose_nolock.LIBCMT ref: 00414A98
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
      • String ID:
      • API String ID: 2800547568-0
      • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
      • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
      • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
      • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
      APIs
      • __lock_file.LIBCMT ref: 00415012
      • __ftell_nolock.LIBCMT ref: 0041501F
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __ftell_nolock__getptd_noexit__lock_file
      • String ID:
      • API String ID: 2999321469-0
      • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
      • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
      • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
      • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
      APIs
      • VariantClear.OLEAUT32(00479459), ref: 0043706B
      • VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Variant$ClearCopy
      • String ID:
      • API String ID: 274517740-0
      • Opcode ID: 175bde5d7e7200bdd07dee29e64fa583f54bc1cc1ed7ce2c810a0693f5fbc3f8
      • Instruction ID: 04f5bc28fb39dc4d651aca37f2cae7a6fb773616424f01e3c31b72a906b86de5
      • Opcode Fuzzy Hash: 175bde5d7e7200bdd07dee29e64fa583f54bc1cc1ed7ce2c810a0693f5fbc3f8
      • Instruction Fuzzy Hash: 76C01236001128BB46016B99EC08CDF775CEE096617008011FD0483101C770A90087F9
      APIs
        • Part of subcall function 041FBD40: GetFileAttributesW.KERNELBASE(?), ref: 041FBD4B
      • CreateDirectoryW.KERNELBASE(?,00000000), ref: 041FC5FF
      Memory Dump Source
      • Source File: 00000000.00000002.1747619518.00000000041FB000.00000040.00000020.00020000.00000000.sdmp, Offset: 041FB000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_41fb000_payment Receipt.jbxd
      Similarity
      • API ID: AttributesCreateDirectoryFile
      • String ID:
      • API String ID: 3401506121-0
      • Opcode ID: fef485108c8867a555c341ca00a06f0667b0adcde9fceacf1968bdbcc6e43f4b
      • Instruction ID: 7b815da9a4f1b4cf1ca3c1b9153e686416e4b9a28138d98a798a47d49dcbb4f0
      • Opcode Fuzzy Hash: fef485108c8867a555c341ca00a06f0667b0adcde9fceacf1968bdbcc6e43f4b
      • Instruction Fuzzy Hash: CE518431A1520D96EF14EFA0CD44BEF7339EF58300F0055A9A609E7280FB79AB45CBA5
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID:
      • API String ID: 4104443479-0
      • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
      • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
      • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
      • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID:
      • API String ID: 4104443479-0
      • Opcode ID: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
      • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
      • Opcode Fuzzy Hash: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
      • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ProtectVirtual
      • String ID:
      • API String ID: 544645111-0
      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
      • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
      • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
      • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
      • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
      • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __lock_file
      • String ID:
      • API String ID: 3031932315-0
      • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
      • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
      • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
      • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • _memmove.LIBCMT ref: 00428939
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
      • String ID:
      • API String ID: 620504543-0
      • Opcode ID: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
      • Instruction ID: c2064c2796ab03ff69418e3c62d92c7a192424b86f475a5c46dd96dfc8171558
      • Opcode Fuzzy Hash: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
      • Instruction Fuzzy Hash: 27011DB46005509FDB00DF5DD891F5677A1AF8A308F14819DE2098F366DA36E846CB92
      APIs
        • Part of subcall function 00479500: VariantInit.OLEAUT32(?), ref: 0047950F
        • Part of subcall function 00437063: VariantClear.OLEAUT32(00479459), ref: 0043706B
        • Part of subcall function 00437063: VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
      • VariantClear.OLEAUT32(?), ref: 0047973E
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Variant$Clear$CopyInit
      • String ID:
      • API String ID: 24293632-0
      • Opcode ID: 0a6f2c8fe72e55b9553011708fdcca806f77a23cbb8e20867b9cb7d7c1d06051
      • Instruction ID: ce75823fad5ab463881ca656a32c684f825172ff923cb7d6b6c05433a05b9d1b
      • Opcode Fuzzy Hash: 0a6f2c8fe72e55b9553011708fdcca806f77a23cbb8e20867b9cb7d7c1d06051
      • Instruction Fuzzy Hash: C4E012B251010C6B8704FBFDDDC6CAFB7BCFB18204B80495DB919A3142EA75A914C7E9
      APIs
      • GetFileAttributesW.KERNELBASE(?), ref: 041FBD4B
      Memory Dump Source
      • Source File: 00000000.00000002.1747619518.00000000041FB000.00000040.00000020.00020000.00000000.sdmp, Offset: 041FB000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_41fb000_payment Receipt.jbxd
      Similarity
      • API ID: AttributesFile
      • String ID:
      • API String ID: 3188754299-0
      • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
      • Instruction ID: 0de1c2b60a5e117c9bc46866eb835825b785c4703ff7715135c716146372a40a
      • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
      • Instruction Fuzzy Hash: 62E08C70A09208EBCB28CEA8CC44AA973A8D705324F004795EA06C3290E630BA42A616
      APIs
      • GetFileAttributesW.KERNELBASE(?), ref: 041FBD1B
      Memory Dump Source
      • Source File: 00000000.00000002.1747619518.00000000041FB000.00000040.00000020.00020000.00000000.sdmp, Offset: 041FB000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_41fb000_payment Receipt.jbxd
      Similarity
      • API ID: AttributesFile
      • String ID:
      • API String ID: 3188754299-0
      • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
      • Instruction ID: cbc7baf6a8aa216679f1623001020bce079d7cc5d1756065fdc5d638c9fb7b8d
      • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
      • Instruction Fuzzy Hash: 47D0A73090A20CEBCB10DFB4DC04AEA73A8D704334F004754FE15C3280D631B9419761
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __wfsopen
      • String ID:
      • API String ID: 197181222-0
      • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
      • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
      • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
      • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: dd957122352b2a24994cc76c0a2fe1c6bdbe155a2543db358ff03b8863c1f765
      • Instruction ID: 4c453d13d2013f2e1e26a6480b89871b610256b9520be3dfcd5ee63b17ce12d0
      • Opcode Fuzzy Hash: dd957122352b2a24994cc76c0a2fe1c6bdbe155a2543db358ff03b8863c1f765
      • Instruction Fuzzy Hash: 52C09B714156204F5350DF7DF84C98777D4EF0D214341C97FD059C2510E6B458414F94
      APIs
      • Sleep.KERNELBASE(000001F4), ref: 041FD711
      Memory Dump Source
      • Source File: 00000000.00000002.1747619518.00000000041FB000.00000040.00000020.00020000.00000000.sdmp, Offset: 041FB000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_41fb000_payment Receipt.jbxd
      Similarity
      • API ID: Sleep
      • String ID:
      • API String ID: 3472027048-0
      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
      • Instruction ID: 6c1764591d9c372c7dd32b1fb30fa05bb93678066b769acc711ffa5f9ebb24f4
      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
      • Instruction Fuzzy Hash: 78E0BF7494010DEFDB00EFB4D9496EE7BB4EF04302F1006A1FD05D7680DB309E548A62
      APIs
      • Sleep.KERNELBASE(000001F4), ref: 041FD711
      Memory Dump Source
      • Source File: 00000000.00000002.1747619518.00000000041FB000.00000040.00000020.00020000.00000000.sdmp, Offset: 041FB000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_41fb000_payment Receipt.jbxd
      Similarity
      • API ID: Sleep
      • String ID:
      • API String ID: 3472027048-0
      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
      • Instruction ID: 666f0afe7f207a4894538abfdc0229b241b6cfec762a1fd437f25d27678aa952
      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
      • Instruction Fuzzy Hash: F0E0E67494010DDFDB00EFB4D9496EE7FB4EF04302F100661FD01D2280D7309D508A62
      APIs
      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
      • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
      • GetKeyState.USER32(00000011), ref: 0047C92D
      • GetKeyState.USER32(00000009), ref: 0047C936
      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
      • GetKeyState.USER32(00000010), ref: 0047C953
      • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
      • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
      • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
      • _wcsncpy.LIBCMT ref: 0047CA29
      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
      • SendMessageW.USER32 ref: 0047CA7F
      • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
      • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
      • ImageList_SetDragCursorImage.COMCTL32(00C05490,00000000,00000000,00000000), ref: 0047CB9B
      • ImageList_BeginDrag.COMCTL32(00C05490,00000000,000000F8,000000F0), ref: 0047CBAC
      • SetCapture.USER32(?), ref: 0047CBB6
      • ClientToScreen.USER32(?,?), ref: 0047CC17
      • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
      • ReleaseCapture.USER32 ref: 0047CC3A
      • GetCursorPos.USER32(?), ref: 0047CC72
      • ScreenToClient.USER32(?,?), ref: 0047CC80
      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
      • SendMessageW.USER32 ref: 0047CD12
      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
      • SendMessageW.USER32 ref: 0047CD80
      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
      • GetCursorPos.USER32(?), ref: 0047CDC8
      • ScreenToClient.USER32(?,?), ref: 0047CDD6
      • GetParent.USER32(00000000), ref: 0047CDF7
      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
      • SendMessageW.USER32 ref: 0047CE93
      • ClientToScreen.USER32(?,?), ref: 0047CEEE
      • TrackPopupMenuEx.USER32(?,00000000,?,?,00A11A18,00000000,?,?,?,?), ref: 0047CF1C
      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
      • SendMessageW.USER32 ref: 0047CF6B
      • ClientToScreen.USER32(?,?), ref: 0047CFB5
      • TrackPopupMenuEx.USER32(?,00000080,?,?,00A11A18,00000000,?,?,?,?), ref: 0047CFE6
      • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
      • String ID: @GUI_DRAGID$F
      • API String ID: 3100379633-4164748364
      • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
      • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
      • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
      • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
      APIs
      • GetForegroundWindow.USER32 ref: 00434420
      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
      • IsIconic.USER32(?), ref: 0043444F
      • ShowWindow.USER32(?,00000009), ref: 0043445C
      • SetForegroundWindow.USER32(?), ref: 0043446A
      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
      • GetCurrentThreadId.KERNEL32 ref: 00434485
      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
      • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
      • SetForegroundWindow.USER32(00000000), ref: 004344B7
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
      • keybd_event.USER32(00000012,00000000), ref: 004344CF
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
      • keybd_event.USER32(00000012,00000000), ref: 004344E6
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
      • keybd_event.USER32(00000012,00000000), ref: 004344FD
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
      • keybd_event.USER32(00000012,00000000), ref: 00434514
      • SetForegroundWindow.USER32(00000000), ref: 0043451E
      • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
      • String ID: Shell_TrayWnd
      • API String ID: 2889586943-2988720461
      • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
      • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
      • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
      • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
      APIs
      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
      • CloseHandle.KERNEL32(?), ref: 004463A0
      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
      • GetProcessWindowStation.USER32 ref: 004463D1
      • SetProcessWindowStation.USER32(00000000), ref: 004463DB
      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
      • _wcslen.LIBCMT ref: 00446498
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • _wcsncpy.LIBCMT ref: 004464C0
      • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
      • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
      • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
      • UnloadUserProfile.USERENV(?,?), ref: 00446555
      • CloseWindowStation.USER32(00000000), ref: 0044656C
      • CloseDesktop.USER32(?), ref: 0044657A
      • SetProcessWindowStation.USER32(?), ref: 00446588
      • CloseHandle.KERNEL32(?), ref: 00446592
      • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
      • String ID: $@OH$default$winsta0
      • API String ID: 3324942560-3791954436
      • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
      • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
      • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
      • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
      APIs
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
        • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
        • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
        • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • _wcscat.LIBCMT ref: 0044BD94
      • _wcscat.LIBCMT ref: 0044BDBD
      • __wsplitpath.LIBCMT ref: 0044BDEA
      • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
      • _wcscpy.LIBCMT ref: 0044BE71
      • _wcscat.LIBCMT ref: 0044BE83
      • _wcscat.LIBCMT ref: 0044BE95
      • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
      • DeleteFileW.KERNEL32(?), ref: 0044BED3
      • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
      • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
      • DeleteFileW.KERNEL32(?), ref: 0044BF15
      • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
      • FindClose.KERNEL32(00000000), ref: 0044BF33
      • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
      • FindClose.KERNEL32(00000000), ref: 0044BF7C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
      • String ID: \*.*
      • API String ID: 2188072990-1173974218
      • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
      • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
      • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
      • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
      APIs
      • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
      • FindClose.KERNEL32(00000000), ref: 00478924
      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
      • __swprintf.LIBCMT ref: 004789D3
      • __swprintf.LIBCMT ref: 00478A1D
      • __swprintf.LIBCMT ref: 00478A4B
      • __swprintf.LIBCMT ref: 00478A79
        • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
        • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
      • __swprintf.LIBCMT ref: 00478AA7
      • __swprintf.LIBCMT ref: 00478AD5
      • __swprintf.LIBCMT ref: 00478B03
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
      • API String ID: 999945258-2428617273
      • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
      • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
      • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
      • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
      • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
      • __wsplitpath.LIBCMT ref: 00403492
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • _wcscpy.LIBCMT ref: 004034A7
      • _wcscat.LIBCMT ref: 004034BC
      • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
        • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
        • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
      • _wcscpy.LIBCMT ref: 004035A0
      • _wcslen.LIBCMT ref: 00403623
      • _wcslen.LIBCMT ref: 0040367D
      Strings
      • Error opening the file, xrefs: 00428231
      • Unterminated string, xrefs: 00428348
      • _, xrefs: 0040371C
      • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
      • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
      • API String ID: 3393021363-188983378
      • Opcode ID: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
      • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
      • Opcode Fuzzy Hash: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
      • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
      APIs
      • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
      • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
      • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
      • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
      • FindClose.KERNEL32(00000000), ref: 00431B20
      • FindClose.KERNEL32(00000000), ref: 00431B34
      • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
      • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
      • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
      • FindClose.KERNEL32(00000000), ref: 00431BCD
      • FindClose.KERNEL32(00000000), ref: 00431BDB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
      • String ID: *.*
      • API String ID: 1409584000-438819550
      • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
      • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
      • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
      • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
      APIs
      • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
      • __swprintf.LIBCMT ref: 00431C2E
      • _wcslen.LIBCMT ref: 00431C3A
      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
      • String ID: :$\$\??\%s
      • API String ID: 2192556992-3457252023
      • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
      • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
      • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
      • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
      APIs
      • GetLocalTime.KERNEL32(?), ref: 004722A2
      • __swprintf.LIBCMT ref: 004722B9
      • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
      • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
      • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
      • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
      • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
      • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
      • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
      • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
      • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: FolderPath$LocalTime__swprintf
      • String ID: %.3d
      • API String ID: 3337348382-986655627
      • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
      • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
      • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
      • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
      APIs
      • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
      • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
      • FindClose.KERNEL32(00000000), ref: 0044291C
      • FindClose.KERNEL32(00000000), ref: 00442930
      • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
      • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
      • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
      • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
      • FindClose.KERNEL32(00000000), ref: 004429D4
        • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
      • FindClose.KERNEL32(00000000), ref: 004429E2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
      • String ID: *.*
      • API String ID: 2640511053-438819550
      • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
      • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
      • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
      • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
      APIs
      • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
      • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
      • GetLastError.KERNEL32 ref: 00433414
      • ExitWindowsEx.USER32(?,00000000), ref: 00433437
      • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
      • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 2938487562-3733053543
      • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
      • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
      • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
      • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
      APIs
        • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
        • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
        • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
        • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
      • GetLengthSid.ADVAPI32(?), ref: 004461D0
      • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
      • GetLengthSid.ADVAPI32(?), ref: 00446241
      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
      • CopySid.ADVAPI32(00000000), ref: 00446271
      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
      • String ID:
      • API String ID: 1255039815-0
      • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
      • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
      • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
      • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
      APIs
      • __swprintf.LIBCMT ref: 00433073
      • __swprintf.LIBCMT ref: 00433085
      • __wcsicoll.LIBCMT ref: 00433092
      • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
      • LoadResource.KERNEL32(?,00000000), ref: 004330BD
      • LockResource.KERNEL32(00000000), ref: 004330CA
      • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
      • LoadResource.KERNEL32(?,00000000), ref: 00433105
      • SizeofResource.KERNEL32(?,00000000), ref: 00433114
      • LockResource.KERNEL32(?), ref: 00433120
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
      • String ID:
      • API String ID: 1158019794-0
      • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
      • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
      • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
      • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
      • String ID:
      • API String ID: 1737998785-0
      • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
      • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
      • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
      • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D627
      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
      • GetLastError.KERNEL32 ref: 0045D6BF
      • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Error$Mode$DiskFreeLastSpace
      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
      • API String ID: 4194297153-14809454
      • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
      • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
      • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
      • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove$_strncmp
      • String ID: @oH$\$^$h
      • API String ID: 2175499884-3701065813
      • Opcode ID: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
      • Instruction ID: d0725f23cfd3ca281eac06f76a82abe5967bc3f30214560d9089fed7748fa16d
      • Opcode Fuzzy Hash: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
      • Instruction Fuzzy Hash: C642E270E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD855AB351D7399946CF55
      APIs
      • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
      • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
      • bind.WSOCK32(00000000,?,00000010), ref: 00465356
      • WSAGetLastError.WSOCK32(00000000), ref: 00465363
      • closesocket.WSOCK32(00000000,00000000), ref: 00465377
      • listen.WSOCK32(00000000,00000005), ref: 00465381
      • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
      • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorLast$closesocket$bindlistensocket
      • String ID:
      • API String ID: 540024437-0
      • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
      • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
      • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
      • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID: ERCP$VUUU$VUUU$VUUU$XjH
      • API String ID: 0-2872873767
      • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
      • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
      • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
      • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
      APIs
      • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
      • __wsplitpath.LIBCMT ref: 00475644
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • _wcscat.LIBCMT ref: 00475657
      • __wcsicoll.LIBCMT ref: 0047567B
      • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
      • CloseHandle.KERNEL32(00000000), ref: 004756BA
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
      • String ID:
      • API String ID: 2547909840-0
      • Opcode ID: 66fbdd7d2143bc3ea17fb0b89755d5829eeb71157ddfe2517e7fed7a99b972a8
      • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
      • Opcode Fuzzy Hash: 66fbdd7d2143bc3ea17fb0b89755d5829eeb71157ddfe2517e7fed7a99b972a8
      • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
      • Sleep.KERNEL32(0000000A), ref: 0045250B
      • FindNextFileW.KERNEL32(?,?), ref: 004525E9
      • FindClose.KERNEL32(?), ref: 004525FF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
      • String ID: *.*$\VH
      • API String ID: 2786137511-2657498754
      • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
      • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
      • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
      • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
      APIs
      • IsDebuggerPresent.KERNEL32 ref: 00421FC1
      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
      • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
      • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
      • TerminateProcess.KERNEL32(00000000), ref: 00422004
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
      • String ID: pqI
      • API String ID: 2579439406-2459173057
      • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
      • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
      • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
      • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
      APIs
      • __wcsicoll.LIBCMT ref: 00433349
      • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
      • __wcsicoll.LIBCMT ref: 00433375
      • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __wcsicollmouse_event
      • String ID: DOWN
      • API String ID: 1033544147-711622031
      • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
      • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
      • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
      • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
      APIs
      • GetKeyboardState.USER32(?), ref: 0044C3D2
      • SetKeyboardState.USER32(00000080), ref: 0044C3F6
      • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
      • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
      • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: KeyboardMessagePostState$InputSend
      • String ID:
      • API String ID: 3031425849-0
      • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
      • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
      • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
      • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
      APIs
        • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
      • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
      • WSAGetLastError.WSOCK32(00000000), ref: 00476692
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorLastinet_addrsocket
      • String ID:
      • API String ID: 4170576061-0
      • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
      • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
      • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
      • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
      APIs
        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
      • IsWindowVisible.USER32 ref: 0047A368
      • IsWindowEnabled.USER32 ref: 0047A378
      • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
      • IsIconic.USER32 ref: 0047A393
      • IsZoomed.USER32 ref: 0047A3A1
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$EnabledForegroundIconicVisibleZoomed
      • String ID:
      • API String ID: 292994002-0
      • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
      • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
      • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
      • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
      APIs
      • OpenClipboard.USER32(?), ref: 0046DCE7
      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
      • GetClipboardData.USER32(0000000D), ref: 0046DD01
      • CloseClipboard.USER32 ref: 0046DD0D
      • GlobalLock.KERNEL32(00000000), ref: 0046DD37
      • CloseClipboard.USER32 ref: 0046DD41
      • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
      • GetClipboardData.USER32(00000001), ref: 0046DD8D
      • CloseClipboard.USER32 ref: 0046DD99
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
      • String ID:
      • API String ID: 15083398-0
      • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
      • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
      • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
      • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID: U$\
      • API String ID: 4104443479-100911408
      • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
      • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
      • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
      • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
      APIs
      • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
      • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
      • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Find$File$CloseFirstNext
      • String ID:
      • API String ID: 3541575487-0
      • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
      • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
      • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
      • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
      APIs
      • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
      • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
      • FindClose.KERNEL32(00000000), ref: 004339EB
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: FileFind$AttributesCloseFirst
      • String ID:
      • API String ID: 48322524-0
      • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
      • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
      • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
      • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
      APIs
      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
      • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Internet$AvailableDataErrorFileLastQueryRead
      • String ID:
      • API String ID: 901099227-0
      • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
      • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
      • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
      • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
      APIs
      • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Proc
      • String ID:
      • API String ID: 2346855178-0
      • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
      • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
      • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
      • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
      APIs
      • BlockInput.USER32(00000001), ref: 0045A38B
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: BlockInput
      • String ID:
      • API String ID: 3456056419-0
      • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
      • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
      • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
      • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
      APIs
      • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: LogonUser
      • String ID:
      • API String ID: 1244722697-0
      • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
      • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
      • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
      • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
      APIs
      • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: NameUser
      • String ID:
      • API String ID: 2645101109-0
      • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
      • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
      • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
      • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
      APIs
      • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled
      • String ID:
      • API String ID: 3192549508-0
      • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
      • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
      • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
      • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID: N@
      • API String ID: 0-1509896676
      • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
      • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
      • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
      • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
      • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
      • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
      • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
      • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
      • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
      • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
      • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
      • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
      • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
      • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
      • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
      • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
      APIs
      • DeleteObject.GDI32(?), ref: 0045953B
      • DeleteObject.GDI32(?), ref: 00459551
      • DestroyWindow.USER32(?), ref: 00459563
      • GetDesktopWindow.USER32 ref: 00459581
      • GetWindowRect.USER32(00000000), ref: 00459588
      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
      • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
      • GetClientRect.USER32(00000000,?), ref: 004596F8
      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
      • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
      • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
      • GlobalLock.KERNEL32(00000000), ref: 0045978F
      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
      • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
      • CloseHandle.KERNEL32(00000000), ref: 004597AC
      • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
      • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
      • GlobalFree.KERNEL32(00000000), ref: 004597E2
      • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
      • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
      • ShowWindow.USER32(?,00000004), ref: 00459865
      • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
      • GetStockObject.GDI32(00000011), ref: 004598CD
      • SelectObject.GDI32(00000000,00000000), ref: 004598D5
      • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
      • DeleteDC.GDI32(00000000), ref: 004598F8
      • _wcslen.LIBCMT ref: 00459916
      • _wcscpy.LIBCMT ref: 0045993A
      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
      • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
      • GetDC.USER32(00000000), ref: 004599FC
      • SelectObject.GDI32(00000000,?), ref: 00459A0C
      • SelectObject.GDI32(00000000,00000007), ref: 00459A37
      • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
      • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
      • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
      • String ID: $AutoIt v3$DISPLAY$static
      • API String ID: 4040870279-2373415609
      • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
      • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
      • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
      • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
      APIs
      • GetSysColor.USER32(00000012), ref: 0044181E
      • SetTextColor.GDI32(?,?), ref: 00441826
      • GetSysColorBrush.USER32(0000000F), ref: 0044183D
      • GetSysColor.USER32(0000000F), ref: 00441849
      • SetBkColor.GDI32(?,?), ref: 00441864
      • SelectObject.GDI32(?,?), ref: 00441874
      • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
      • GetSysColor.USER32(00000010), ref: 004418B2
      • CreateSolidBrush.GDI32(00000000), ref: 004418B9
      • FrameRect.USER32(?,?,00000000), ref: 004418CA
      • DeleteObject.GDI32(?), ref: 004418D5
      • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
      • FillRect.USER32(?,?,?), ref: 00441970
        • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
        • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
        • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
        • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
        • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
        • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
        • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
        • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
        • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
        • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
        • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
        • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
        • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
      • String ID:
      • API String ID: 69173610-0
      • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
      • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
      • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
      • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
      APIs
      • DestroyWindow.USER32(?), ref: 004590F2
      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
      • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
      • GetClientRect.USER32(00000000,?), ref: 0045924E
      • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
      • GetStockObject.GDI32(00000011), ref: 004592AC
      • SelectObject.GDI32(00000000,00000000), ref: 004592B4
      • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
      • DeleteDC.GDI32(00000000), ref: 004592D6
      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
      • GetStockObject.GDI32(00000011), ref: 004593D3
      • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
      • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
      • API String ID: 2910397461-517079104
      • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
      • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
      • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
      • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __wcsnicmp
      • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
      • API String ID: 1038674560-3360698832
      • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
      • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
      • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
      • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
      APIs
      • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
      • SetCursor.USER32(00000000), ref: 0043075B
      • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
      • SetCursor.USER32(00000000), ref: 00430773
      • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
      • SetCursor.USER32(00000000), ref: 0043078B
      • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
      • SetCursor.USER32(00000000), ref: 004307A3
      • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
      • SetCursor.USER32(00000000), ref: 004307BB
      • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
      • SetCursor.USER32(00000000), ref: 004307D3
      • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
      • SetCursor.USER32(00000000), ref: 004307EB
      • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
      • SetCursor.USER32(00000000), ref: 00430803
      • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
      • SetCursor.USER32(00000000), ref: 0043081B
      • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
      • SetCursor.USER32(00000000), ref: 00430833
      • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
      • SetCursor.USER32(00000000), ref: 0043084B
      • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
      • SetCursor.USER32(00000000), ref: 00430863
      • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
      • SetCursor.USER32(00000000), ref: 0043087B
      • SetCursor.USER32(00000000), ref: 00430887
      • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
      • SetCursor.USER32(00000000), ref: 0043089F
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Cursor$Load
      • String ID:
      • API String ID: 1675784387-0
      • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
      • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
      • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
      • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
      APIs
      • GetSysColor.USER32(0000000E), ref: 00430913
      • SetTextColor.GDI32(?,00000000), ref: 0043091B
      • GetSysColor.USER32(00000012), ref: 00430933
      • SetTextColor.GDI32(?,?), ref: 0043093B
      • GetSysColorBrush.USER32(0000000F), ref: 0043094E
      • GetSysColor.USER32(0000000F), ref: 00430959
      • CreateSolidBrush.GDI32(?), ref: 00430962
      • GetSysColor.USER32(00000011), ref: 00430979
      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
      • SelectObject.GDI32(?,00000000), ref: 0043099C
      • SetBkColor.GDI32(?,?), ref: 004309A6
      • SelectObject.GDI32(?,?), ref: 004309B4
      • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
      • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
      • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
      • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
      • DrawFocusRect.USER32(?,?), ref: 00430A91
      • GetSysColor.USER32(00000011), ref: 00430A9F
      • SetTextColor.GDI32(?,00000000), ref: 00430AA7
      • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
      • SelectObject.GDI32(?,?), ref: 00430AD0
      • DeleteObject.GDI32(00000105), ref: 00430ADC
      • SelectObject.GDI32(?,?), ref: 00430AE3
      • DeleteObject.GDI32(?), ref: 00430AE9
      • SetTextColor.GDI32(?,?), ref: 00430AF0
      • SetBkColor.GDI32(?,?), ref: 00430AFB
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
      • String ID:
      • API String ID: 1582027408-0
      • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
      • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
      • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
      • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
      APIs
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
      • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CloseConnectCreateRegistry
      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
      • API String ID: 3217815495-966354055
      • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
      • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
      • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
      • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
      APIs
      • GetCursorPos.USER32(?), ref: 004566AE
      • GetDesktopWindow.USER32 ref: 004566C3
      • GetWindowRect.USER32(00000000), ref: 004566CA
      • GetWindowLongW.USER32(?,000000F0), ref: 00456722
      • GetWindowLongW.USER32(?,000000F0), ref: 00456735
      • DestroyWindow.USER32(?), ref: 00456746
      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
      • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
      • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
      • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
      • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
      • IsWindowVisible.USER32(?), ref: 0045682C
      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
      • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
      • GetWindowRect.USER32(?,?), ref: 00456873
      • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
      • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
      • CopyRect.USER32(?,?), ref: 004568BE
      • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
      • String ID: ($,$tooltips_class32
      • API String ID: 225202481-3320066284
      • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
      • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
      • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
      • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
      APIs
      • OpenClipboard.USER32(?), ref: 0046DCE7
      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
      • GetClipboardData.USER32(0000000D), ref: 0046DD01
      • CloseClipboard.USER32 ref: 0046DD0D
      • GlobalLock.KERNEL32(00000000), ref: 0046DD37
      • CloseClipboard.USER32 ref: 0046DD41
      • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
      • GetClipboardData.USER32(00000001), ref: 0046DD8D
      • CloseClipboard.USER32 ref: 0046DD99
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
      • String ID:
      • API String ID: 15083398-0
      • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
      • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
      • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
      • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • GetWindowRect.USER32(?,?), ref: 00471CF7
      • GetClientRect.USER32(?,?), ref: 00471D05
      • GetSystemMetrics.USER32(00000007), ref: 00471D0D
      • GetSystemMetrics.USER32(00000008), ref: 00471D20
      • GetSystemMetrics.USER32(00000004), ref: 00471D42
      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
      • GetSystemMetrics.USER32(00000007), ref: 00471D79
      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
      • GetSystemMetrics.USER32(00000008), ref: 00471DAB
      • GetSystemMetrics.USER32(00000004), ref: 00471DCF
      • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
      • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
      • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
      • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
      • GetClientRect.USER32(?,?), ref: 00471E8A
      • GetStockObject.GDI32(00000011), ref: 00471EA6
      • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
      • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
      • String ID: @$AutoIt v3 GUI
      • API String ID: 867697134-3359773793
      • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
      • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
      • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
      • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __wcsicoll$__wcsnicmp
      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
      • API String ID: 790654849-32604322
      • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
      • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
      • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
      • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
      • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
      • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
      • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
      APIs
        • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
      • _fseek.LIBCMT ref: 00452B3B
      • __wsplitpath.LIBCMT ref: 00452B9B
      • _wcscpy.LIBCMT ref: 00452BB0
      • _wcscat.LIBCMT ref: 00452BC5
      • __wsplitpath.LIBCMT ref: 00452BEF
      • _wcscat.LIBCMT ref: 00452C07
      • _wcscat.LIBCMT ref: 00452C1C
      • __fread_nolock.LIBCMT ref: 00452C53
      • __fread_nolock.LIBCMT ref: 00452C64
      • __fread_nolock.LIBCMT ref: 00452C83
      • __fread_nolock.LIBCMT ref: 00452C94
      • __fread_nolock.LIBCMT ref: 00452CB5
      • __fread_nolock.LIBCMT ref: 00452CC6
      • __fread_nolock.LIBCMT ref: 00452CD7
      • __fread_nolock.LIBCMT ref: 00452CE8
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
      • __fread_nolock.LIBCMT ref: 00452D78
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
      • String ID:
      • API String ID: 2054058615-0
      • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
      • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
      • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
      • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
      APIs
      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window
      • String ID: 0
      • API String ID: 2353593579-4108050209
      • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
      • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
      • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
      • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
      APIs
      • GetSysColor.USER32(0000000F), ref: 0044A05E
      • GetClientRect.USER32(?,?), ref: 0044A0D1
      • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
      • GetWindowDC.USER32(?), ref: 0044A0F6
      • GetPixel.GDI32(00000000,?,?), ref: 0044A108
      • ReleaseDC.USER32(?,?), ref: 0044A11B
      • GetSysColor.USER32(0000000F), ref: 0044A131
      • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
      • GetSysColor.USER32(0000000F), ref: 0044A14F
      • GetSysColor.USER32(00000005), ref: 0044A15B
      • GetWindowDC.USER32(?), ref: 0044A1BE
      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
      • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
      • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
      • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
      • ReleaseDC.USER32(?,00000000), ref: 0044A229
      • SetBkColor.GDI32(?,00000000), ref: 0044A24C
      • GetSysColor.USER32(00000008), ref: 0044A265
      • SetTextColor.GDI32(?,00000000), ref: 0044A270
      • SetBkMode.GDI32(?,00000001), ref: 0044A282
      • GetStockObject.GDI32(00000005), ref: 0044A28A
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
      • String ID:
      • API String ID: 1744303182-0
      • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
      • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
      • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
      • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
      APIs
      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
      • __mtterm.LIBCMT ref: 00417C34
        • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
        • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
        • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
        • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
      • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
      • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
      • __init_pointers.LIBCMT ref: 00417CE6
      • __calloc_crt.LIBCMT ref: 00417D54
      • GetCurrentThreadId.KERNEL32 ref: 00417D80
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
      • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
      • API String ID: 4163708885-3819984048
      • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
      • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
      • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
      • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • GetForegroundWindow.USER32(?,?,?,?,?,?,?), ref: 0046EE79
      • GetForegroundWindow.USER32(?,?,?,?,?,?), ref: 0046F265
      • IsWindow.USER32(?), ref: 0046F29A
      • GetDesktopWindow.USER32 ref: 0046F356
      • EnumChildWindows.USER32(00000000), ref: 0046F35D
      • EnumWindows.USER32(0046130D,?), ref: 0046F365
        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop_memmove
      • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
      • API String ID: 329138477-1919597938
      • Opcode ID: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
      • Instruction ID: 15289122aec5319afe5b60ce0d71565fabc5791e0031d8771947120ab82528ab
      • Opcode Fuzzy Hash: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
      • Instruction Fuzzy Hash: 83F10B714143019BDB00FF61D885AAFB3A4BF85308F44496FF94567282E779E909CBA7
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __wcsicoll$IconLoad
      • String ID: blank$info$question$stop$warning
      • API String ID: 2485277191-404129466
      • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
      • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
      • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
      • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
      APIs
      • LoadIconW.USER32(?,00000063), ref: 0045464C
      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
      • SetWindowTextW.USER32(?,?), ref: 00454678
      • GetDlgItem.USER32(?,000003EA), ref: 00454690
      • SetWindowTextW.USER32(00000000,?), ref: 00454697
      • GetDlgItem.USER32(?,000003E9), ref: 004546A8
      • SetWindowTextW.USER32(00000000,?), ref: 004546AF
      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
      • GetWindowRect.USER32(?,?), ref: 004546F5
      • SetWindowTextW.USER32(?,?), ref: 00454765
      • GetDesktopWindow.USER32 ref: 0045476F
      • GetWindowRect.USER32(00000000), ref: 00454776
      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
      • GetClientRect.USER32(?,?), ref: 004547D2
      • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
      • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
      • String ID:
      • API String ID: 3869813825-0
      • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
      • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
      • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
      • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
      APIs
      • _wcslen.LIBCMT ref: 00464B28
      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
      • _wcslen.LIBCMT ref: 00464C28
      • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
      • _wcslen.LIBCMT ref: 00464CBA
      • _wcslen.LIBCMT ref: 00464CD0
      • _wcslen.LIBCMT ref: 00464CEF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcslen$Directory$CurrentSystem
      • String ID: D
      • API String ID: 1914653954-2746444292
      • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
      • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
      • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
      • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
      APIs
      • _wcsncpy.LIBCMT ref: 0045CE39
      • __wsplitpath.LIBCMT ref: 0045CE78
      • _wcscat.LIBCMT ref: 0045CE8B
      • _wcscat.LIBCMT ref: 0045CE9E
      • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
      • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
      • _wcscpy.LIBCMT ref: 0045CF61
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
      • String ID: *.*
      • API String ID: 1153243558-438819550
      • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
      • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
      • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
      • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __wcsicoll
      • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
      • API String ID: 3832890014-4202584635
      • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
      • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
      • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
      • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
      APIs
      • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
      • GetFocus.USER32 ref: 0046A0DD
      • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessagePost$CtrlFocus
      • String ID: 0
      • API String ID: 1534620443-4108050209
      • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
      • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
      • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
      • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
      APIs
      • DestroyWindow.USER32(?), ref: 004558E3
      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$CreateDestroy
      • String ID: ,$tooltips_class32
      • API String ID: 1109047481-3856767331
      • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
      • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
      • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
      • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
      APIs
      • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
      • GetMenuItemCount.USER32(?), ref: 00468C45
      • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
      • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
      • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
      • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
      • GetMenuItemCount.USER32 ref: 00468CFD
      • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
      • GetCursorPos.USER32(?), ref: 00468D3F
      • SetForegroundWindow.USER32(?), ref: 00468D49
      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
      • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
      • String ID: 0
      • API String ID: 1441871840-4108050209
      • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
      • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
      • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
      • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
      APIs
      • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
      • __swprintf.LIBCMT ref: 00460915
      • __swprintf.LIBCMT ref: 0046092D
      • _wprintf.LIBCMT ref: 004609E1
      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
      • API String ID: 3631882475-2268648507
      • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
      • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
      • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
      • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
      APIs
      • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
      • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
      • SendMessageW.USER32 ref: 00471740
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
      • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
      • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
      • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
      • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
      • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
      • SendMessageW.USER32 ref: 0047184F
      • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
      • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
      • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
      • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
      • String ID:
      • API String ID: 4116747274-0
      • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
      • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
      • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
      • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
      APIs
      • GetClassNameW.USER32(?,?,00000100), ref: 00461678
      • _wcslen.LIBCMT ref: 00461683
      • __swprintf.LIBCMT ref: 00461721
      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
      • GetClassNameW.USER32(?,?,00000400), ref: 00461811
      • GetDlgCtrlID.USER32(?), ref: 00461869
      • GetWindowRect.USER32(?,?), ref: 004618A4
      • GetParent.USER32(?), ref: 004618C3
      • ScreenToClient.USER32(00000000), ref: 004618CA
      • GetClassNameW.USER32(?,?,00000100), ref: 00461941
      • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
      • String ID: %s%u
      • API String ID: 1899580136-679674701
      • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
      • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
      • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
      • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
      APIs
      • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
      • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
      • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: InfoItemMenu$Sleep
      • String ID: 0
      • API String ID: 1196289194-4108050209
      • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
      • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
      • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
      • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
      APIs
      • GetDC.USER32(00000000), ref: 0043143E
      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
      • CreateCompatibleDC.GDI32(00000000), ref: 00431459
      • SelectObject.GDI32(00000000,?), ref: 00431466
      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
      • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
      • String ID: (
      • API String ID: 3300687185-3887548279
      • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
      • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
      • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
      • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
      APIs
        • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
      • GetDriveTypeW.KERNEL32 ref: 0045DB32
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
      • API String ID: 1976180769-4113822522
      • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
      • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
      • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
      • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcslen$_wcsncpy$LocalTime__fassign
      • String ID:
      • API String ID: 461458858-0
      • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
      • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
      • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
      • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
      APIs
      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
      • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
      • GlobalLock.KERNEL32(00000000), ref: 004300F6
      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
      • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
      • CloseHandle.KERNEL32(00000000), ref: 00430113
      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
      • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
      • GlobalFree.KERNEL32(00000000), ref: 00430150
      • GetObjectW.GDI32(?,00000018,?), ref: 00430177
      • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
      • DeleteObject.GDI32(?), ref: 004301D0
      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
      • String ID:
      • API String ID: 3969911579-0
      • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
      • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
      • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
      • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
      • String ID: 0
      • API String ID: 956284711-4108050209
      • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
      • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
      • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
      • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
      • String ID: 0.0.0.0
      • API String ID: 1965227024-3771769585
      • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
      • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
      • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
      • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: SendString$_memmove_wcslen
      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
      • API String ID: 369157077-1007645807
      • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
      • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
      • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
      • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
      APIs
      • GetParent.USER32 ref: 00445BF8
      • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
      • __wcsicoll.LIBCMT ref: 00445C33
      • __wcsicoll.LIBCMT ref: 00445C4F
      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __wcsicoll$ClassMessageNameParentSend
      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
      • API String ID: 3125838495-3381328864
      • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
      • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
      • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
      • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
      APIs
      • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
      • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
      • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
      • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
      • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
      • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
      • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
      • SendMessageW.USER32(?,00000402,?), ref: 00449399
      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$CharNext
      • String ID:
      • API String ID: 1350042424-0
      • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
      • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
      • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
      • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
      APIs
        • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
      • GetDriveTypeW.KERNEL32(?), ref: 004787B9
      • _wcscpy.LIBCMT ref: 004787E5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: BuffCharDriveLowerType_wcscpy_wcslen
      • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
      • API String ID: 3052893215-2127371420
      • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
      • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
      • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
      • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
      APIs
      • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
      • __swprintf.LIBCMT ref: 0045E7F7
      • _wprintf.LIBCMT ref: 0045E8B3
      • _wprintf.LIBCMT ref: 0045E8D7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
      • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
      • API String ID: 2295938435-2354261254
      • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
      • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
      • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
      • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __swprintf_wcscpy$__i64tow__itow
      • String ID: %.15g$0x%p$False$True
      • API String ID: 3038501623-2263619337
      • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
      • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
      • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
      • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
      APIs
      • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
      • __swprintf.LIBCMT ref: 0045E5F6
      • _wprintf.LIBCMT ref: 0045E6A3
      • _wprintf.LIBCMT ref: 0045E6C7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
      • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
      • API String ID: 2295938435-8599901
      • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
      • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
      • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
      • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
      APIs
      • timeGetTime.WINMM ref: 00443B67
        • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
      • Sleep.KERNEL32(0000000A), ref: 00443B9F
      • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
      • SetActiveWindow.USER32(?), ref: 00443BEC
      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
      • Sleep.KERNEL32(000000FA), ref: 00443C2D
      • IsWindow.USER32(?), ref: 00443C3A
      • EndDialog.USER32(?,00000000), ref: 00443C4C
        • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
        • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
        • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
      • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
      • String ID: BUTTON
      • API String ID: 1834419854-3405671355
      • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
      • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
      • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
      • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
      APIs
      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
      • LoadStringW.USER32(00000000), ref: 00454040
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • _wprintf.LIBCMT ref: 00454074
      • __swprintf.LIBCMT ref: 004540A3
      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
      • API String ID: 455036304-4153970271
      • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
      • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
      • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
      • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
      APIs
      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
      • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
      • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
      • _memmove.LIBCMT ref: 00467EB8
      • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
      • _memmove.LIBCMT ref: 00467F6C
      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
      • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
      • String ID:
      • API String ID: 2170234536-0
      • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
      • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
      • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
      • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
      APIs
      • GetKeyboardState.USER32(?), ref: 00453CE0
      • SetKeyboardState.USER32(?), ref: 00453D3B
      • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
      • GetKeyState.USER32(000000A0), ref: 00453D75
      • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
      • GetKeyState.USER32(000000A1), ref: 00453DB5
      • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
      • GetKeyState.USER32(00000011), ref: 00453DEF
      • GetAsyncKeyState.USER32(00000012), ref: 00453E18
      • GetKeyState.USER32(00000012), ref: 00453E26
      • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
      • GetKeyState.USER32(0000005B), ref: 00453E5D
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: State$Async$Keyboard
      • String ID:
      • API String ID: 541375521-0
      • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
      • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
      • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
      • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
      APIs
      • GetDlgItem.USER32(?,00000001), ref: 004357DB
      • GetWindowRect.USER32(00000000,?), ref: 004357ED
      • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
      • GetDlgItem.USER32(?,00000002), ref: 0043586A
      • GetWindowRect.USER32(00000000,?), ref: 0043587C
      • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
      • GetDlgItem.USER32(?,000003E9), ref: 004358DC
      • GetWindowRect.USER32(00000000,?), ref: 004358EE
      • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
      • GetDlgItem.USER32(?,000003EA), ref: 00435941
      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
      • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$ItemMoveRect$Invalidate
      • String ID:
      • API String ID: 3096461208-0
      • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
      • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
      • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
      • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
      APIs
      • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
      • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
      • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
      • DeleteObject.GDI32(?), ref: 0047151E
      • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
      • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
      • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
      • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
      • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
      • DeleteObject.GDI32(?), ref: 004715EA
      • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
      • String ID:
      • API String ID: 3218148540-0
      • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
      • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
      • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
      • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
      • String ID:
      • API String ID: 136442275-0
      • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
      • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
      • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
      • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
      APIs
      • _wcsncpy.LIBCMT ref: 00467490
      • _wcsncpy.LIBCMT ref: 004674BC
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • _wcstok.LIBCMT ref: 004674FF
        • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
      • _wcstok.LIBCMT ref: 004675B2
      • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
      • _wcslen.LIBCMT ref: 00467793
      • _wcscpy.LIBCMT ref: 00467641
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • _wcslen.LIBCMT ref: 004677BD
      • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
        • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
      • String ID: X
      • API String ID: 3104067586-3081909835
      • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
      • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
      • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
      • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
      APIs
      • GetClassNameW.USER32(?,?,00000400), ref: 00461056
      • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
      • _wcslen.LIBCMT ref: 004610A3
      • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
      • GetClassNameW.USER32(?,?,00000400), ref: 00461124
      • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
      • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
      • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
      • GetWindowRect.USER32(?,?), ref: 00461248
        • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
      • String ID: ThumbnailClass
      • API String ID: 4136854206-1241985126
      • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
      • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
      • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
      • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
      APIs
      • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
      • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
      • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
      • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
      • GetClientRect.USER32(?,?), ref: 00471A1A
      • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
      • DestroyIcon.USER32(?), ref: 00471AF4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
      • String ID: 2
      • API String ID: 1331449709-450215437
      • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
      • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
      • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
      • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
      APIs
      • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
      • __swprintf.LIBCMT ref: 00460915
      • __swprintf.LIBCMT ref: 0046092D
      • _wprintf.LIBCMT ref: 004609E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
      • API String ID: 3054410614-2561132961
      • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
      • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
      • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
      • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
      • CLSIDFromString.OLE32(?,?), ref: 004587B3
      • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
      • RegCloseKey.ADVAPI32(?), ref: 004587C5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
      • API String ID: 600699880-22481851
      • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
      • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
      • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
      • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: DestroyWindow
      • String ID: static
      • API String ID: 3375834691-2160076837
      • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
      • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
      • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
      • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D959
      • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorMode$DriveType
      • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
      • API String ID: 2907320926-3566645568
      • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
      • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
      • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
      • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
      APIs
        • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
      • DestroyAcceleratorTable.USER32(?), ref: 0047094A
      • ImageList_Destroy.COMCTL32(?), ref: 004709AD
      • ImageList_Destroy.COMCTL32(?), ref: 004709C5
      • ImageList_Destroy.COMCTL32(?), ref: 004709D5
      • DeleteObject.GDI32(00290000), ref: 00470A04
      • DestroyIcon.USER32(0041005C), ref: 00470A1C
      • DeleteObject.GDI32(3325B5CA), ref: 00470A34
      • DestroyWindow.USER32(00460020), ref: 00470A4C
      • DestroyIcon.USER32(?), ref: 00470A73
      • DestroyIcon.USER32(?), ref: 00470A81
      • KillTimer.USER32(00000000,00000000), ref: 00470B00
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
      • String ID:
      • API String ID: 1237572874-0
      • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
      • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
      • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
      • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
      APIs
      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
      • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
      • VariantInit.OLEAUT32(?), ref: 004793E1
      • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
      • VariantCopy.OLEAUT32(?,?), ref: 00479461
      • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
      • VariantClear.OLEAUT32(?), ref: 00479489
      • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
      • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
      • VariantClear.OLEAUT32(?), ref: 004794CA
      • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
      • String ID:
      • API String ID: 2706829360-0
      • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
      • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
      • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
      • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
      APIs
      • GetKeyboardState.USER32(?), ref: 0044480E
      • GetAsyncKeyState.USER32(000000A0), ref: 00444899
      • GetKeyState.USER32(000000A0), ref: 004448AA
      • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
      • GetKeyState.USER32(000000A1), ref: 004448D9
      • GetAsyncKeyState.USER32(00000011), ref: 004448F5
      • GetKeyState.USER32(00000011), ref: 00444903
      • GetAsyncKeyState.USER32(00000012), ref: 0044491F
      • GetKeyState.USER32(00000012), ref: 0044492D
      • GetAsyncKeyState.USER32(0000005B), ref: 00444949
      • GetKeyState.USER32(0000005B), ref: 00444958
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: State$Async$Keyboard
      • String ID:
      • API String ID: 541375521-0
      • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
      • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
      • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
      • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: InitVariant$_malloc_wcscpy_wcslen
      • String ID:
      • API String ID: 3413494760-0
      • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
      • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
      • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
      • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _strncmp
      • String ID: '$DEFINE$\$`$h$h
      • API String ID: 909875538-3708680428
      • Opcode ID: c0119b86fdbff93204f49aa9905b13b9b84c98abe9b4d8f4a229c1acd795ed82
      • Instruction ID: 816ce89e9d314c50cae2ff635e2dae77420ade2a81b985ada7b38a9c48760da0
      • Opcode Fuzzy Hash: c0119b86fdbff93204f49aa9905b13b9b84c98abe9b4d8f4a229c1acd795ed82
      • Instruction Fuzzy Hash: C502B470A042498FEF14CF69C9906AEBBF2FF85304F2481AED8459B341D7399946CB55
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AddressProc_free_malloc$_strcat_strlen
      • String ID: AU3_FreeVar
      • API String ID: 2634073740-771828931
      • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
      • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
      • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
      • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
      APIs
      • CoInitialize.OLE32 ref: 0046C63A
      • CoUninitialize.OLE32 ref: 0046C645
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
        • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
      • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
      • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
      • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
      • IIDFromString.OLE32(?,?), ref: 0046C705
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
      • API String ID: 2294789929-1287834457
      • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
      • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
      • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
      • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
      APIs
        • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
        • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
        • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
        • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
      • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
      • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
      • ImageList_EndDrag.COMCTL32 ref: 00471169
      • ReleaseCapture.USER32 ref: 0047116F
      • SetWindowTextW.USER32(?,00000000), ref: 00471206
      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
      • String ID: @GUI_DRAGFILE$@GUI_DROPID
      • API String ID: 2483343779-2107944366
      • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
      • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
      • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
      • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
      APIs
      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
      • _wcslen.LIBCMT ref: 00450720
      • _wcscat.LIBCMT ref: 00450733
      • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
      • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$Window_wcscat_wcslen
      • String ID: -----$SysListView32
      • API String ID: 4008455318-3975388722
      • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
      • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
      • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
      • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
      • GetDlgCtrlID.USER32(00000000), ref: 00469C84
      • GetParent.USER32 ref: 00469C98
      • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
      • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
      • GetParent.USER32 ref: 00469CBC
      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$CtrlParent$_memmove_wcslen
      • String ID: ComboBox$ListBox
      • API String ID: 2360848162-1403004172
      • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
      • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
      • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
      • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469E71
      • GetDlgCtrlID.USER32(00000000), ref: 00469E82
      • GetParent.USER32 ref: 00469E96
      • SendMessageW.USER32(00000000,?,00000111), ref: 00469E9D
      • GetDlgCtrlID.USER32(00000000), ref: 00469EA3
      • GetParent.USER32 ref: 00469EBA
      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469EC1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$CtrlParent$_memmove_wcslen
      • String ID: ComboBox$ListBox
      • API String ID: 2360848162-1403004172
      • Opcode ID: 986fe2d2ad3502a89dd9d9f189f0f45c93be64f12821e5ba271ad6af13960510
      • Instruction ID: 3a0c9dd1fa5fd4c1d1a647422213a645dfa1e4764d365342f395b6f430504e68
      • Opcode Fuzzy Hash: 986fe2d2ad3502a89dd9d9f189f0f45c93be64f12821e5ba271ad6af13960510
      • Instruction Fuzzy Hash: D121F7716001187BDB00ABA9CC85BBF77ACEB85310F00855FFA44EB2D5D6B8DC4587A5
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
      • String ID:
      • API String ID: 262282135-0
      • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
      • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
      • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
      • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
      APIs
      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
      • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
      • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
      • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
      • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
      • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$LongWindow
      • String ID:
      • API String ID: 312131281-0
      • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
      • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
      • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
      • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
      APIs
        • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
      • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
      • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
        • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$BrushCreateDeleteObjectSolid
      • String ID:
      • API String ID: 3771399671-0
      • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
      • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
      • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
      • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
      APIs
      • GetCurrentThreadId.KERNEL32 ref: 00434643
      • GetForegroundWindow.USER32(00000000), ref: 00434655
      • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
      • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
      • String ID:
      • API String ID: 2156557900-0
      • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
      • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
      • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
      • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
      • API String ID: 0-1603158881
      • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
      • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
      • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
      • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
      APIs
      • CreateMenu.USER32 ref: 00448603
      • SetMenu.USER32(?,00000000), ref: 00448613
      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
      • IsMenu.USER32(?), ref: 004486AB
      • CreatePopupMenu.USER32 ref: 004486B5
      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
      • DrawMenuBar.USER32 ref: 004486F5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Menu$CreateItem$DrawInfoInsertPopup
      • String ID: 0
      • API String ID: 161812096-4108050209
      • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
      • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
      • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
      • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
      • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
      • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
      • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
      APIs
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • lstrcmpiW.KERNEL32(?,?), ref: 00453900
      • MoveFileW.KERNEL32(?,?), ref: 00453932
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: File$AttributesFullMoveNamePathlstrcmpi
      • String ID:
      • API String ID: 978794511-0
      • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
      • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
      • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
      • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
      • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
      • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
      • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
      • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
      • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
      • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove$_memcmp
      • String ID: '$\$h
      • API String ID: 2205784470-1303700344
      • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
      • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
      • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
      • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
      APIs
      • VariantInit.OLEAUT32(00000000), ref: 0045EA56
      • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
      • VariantClear.OLEAUT32 ref: 0045EA6D
      • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
      • __swprintf.LIBCMT ref: 0045EC33
      • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
      Strings
      • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Variant$InitTime$ClearCopySystem__swprintf
      • String ID: %4d%02d%02d%02d%02d%02d
      • API String ID: 2441338619-1568723262
      • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
      • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
      • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
      • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
      APIs
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
      • Sleep.KERNEL32(0000000A), ref: 0042C67F
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Interlocked$DecrementIncrement$Sleep
      • String ID: @COM_EVENTOBJ
      • API String ID: 327565842-2228938565
      • Opcode ID: 7a6a6944b375bdcf2396f9f34e6abe7c386284c5530abc4d8420471013998a44
      • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
      • Opcode Fuzzy Hash: 7a6a6944b375bdcf2396f9f34e6abe7c386284c5530abc4d8420471013998a44
      • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
      APIs
      • VariantClear.OLEAUT32(?), ref: 0047031B
      • VariantClear.OLEAUT32(?), ref: 0047044F
      • VariantInit.OLEAUT32(?), ref: 004704A3
      • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
      • VariantClear.OLEAUT32(?), ref: 00470516
        • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
      • VariantCopy.OLEAUT32(?,?), ref: 0047057A
        • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
      • VariantClear.OLEAUT32(00000000), ref: 0047060D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Variant$Clear$Copy$CallDispFuncInit
      • String ID: H
      • API String ID: 3613100350-2852464175
      • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
      • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
      • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
      • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
      APIs
      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
      • DestroyWindow.USER32(?), ref: 00426F50
      • UnregisterHotKey.USER32(?), ref: 00426F77
      • FreeLibrary.KERNEL32(?), ref: 0042701F
      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
      • String ID: close all
      • API String ID: 4174999648-3243417748
      • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
      • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
      • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
      • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
      APIs
      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
      • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
      • String ID:
      • API String ID: 1291720006-3916222277
      • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
      • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
      • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
      • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
      APIs
      • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
      • IsMenu.USER32(?), ref: 0045FC5F
      • CreatePopupMenu.USER32 ref: 0045FC97
      • GetMenuItemCount.USER32(?), ref: 0045FCFD
      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Menu$Item$CountCreateInfoInsertPopup
      • String ID: 0$2
      • API String ID: 93392585-3793063076
      • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
      • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
      • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
      • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
      APIs
      • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
      • VariantClear.OLEAUT32(?), ref: 00435320
      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
      • VariantClear.OLEAUT32(?), ref: 004353B3
      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
      • String ID: crts
      • API String ID: 586820018-3724388283
      • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
      • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
      • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
      • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
      APIs
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
      • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
      • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
      • _wcscat.LIBCMT ref: 0044BCAF
      • _wcslen.LIBCMT ref: 0044BCBB
      • _wcslen.LIBCMT ref: 0044BCD1
      • SHFileOperationW.SHELL32(?), ref: 0044BD17
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
      • String ID: \*.*
      • API String ID: 2326526234-1173974218
      • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
      • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
      • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
      • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
      APIs
        • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
      • _wcslen.LIBCMT ref: 004335F2
      • GetFileAttributesW.KERNEL32(?), ref: 0043361C
      • GetLastError.KERNEL32 ref: 0043362B
      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
      • _wcsrchr.LIBCMT ref: 00433666
        • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
      • String ID: \
      • API String ID: 321622961-2967466578
      • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
      • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
      • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
      • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __wcsnicmp
      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
      • API String ID: 1038674560-2734436370
      • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
      • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
      • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
      • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
      APIs
      • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
      • LoadStringW.USER32(00000000), ref: 00434060
      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
      • LoadStringW.USER32(00000000), ref: 00434078
      • _wprintf.LIBCMT ref: 004340A1
      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
      Strings
      • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: HandleLoadModuleString$Message_wprintf
      • String ID: %s (%d) : ==> %s: %s %s
      • API String ID: 3648134473-3128320259
      • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
      • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
      • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
      • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
      APIs
      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
      • __lock.LIBCMT ref: 00417981
        • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
        • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
        • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
      • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
      • __lock.LIBCMT ref: 004179A2
      • ___addlocaleref.LIBCMT ref: 004179C0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
      • String ID: KERNEL32.DLL$pI
      • API String ID: 637971194-197072765
      • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
      • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
      • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
      • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove$_malloc
      • String ID:
      • API String ID: 1938898002-0
      • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
      • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
      • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
      • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
      APIs
        • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
      • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
      • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
        • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$BrushCreateDeleteObjectSolid
      • String ID:
      • API String ID: 3771399671-0
      • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
      • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
      • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
      • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
      APIs
      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
      • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
      • _memmove.LIBCMT ref: 0044B555
      • _memmove.LIBCMT ref: 0044B578
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
      • String ID:
      • API String ID: 2737351978-0
      • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
      • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
      • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
      • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 0041523A
      • __calloc_crt.LIBCMT ref: 00415246
      • __getptd.LIBCMT ref: 00415253
      • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
      • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
      • _free.LIBCMT ref: 0041529E
      • __dosmaperr.LIBCMT ref: 004152A9
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
      • String ID:
      • API String ID: 3638380555-0
      • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
      • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
      • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
      • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
      APIs
      • VariantInit.OLEAUT32(?), ref: 0046C96E
        • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
        • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Variant$Copy$ClearErrorInitLast
      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
      • API String ID: 3207048006-625585964
      • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
      • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
      • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
      • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
      APIs
      • WSAStartup.WSOCK32(00000101,?), ref: 00465559
        • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
      • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
      • gethostbyname.WSOCK32(?), ref: 004655A6
      • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
      • _memmove.LIBCMT ref: 004656CA
      • GlobalFree.KERNEL32(00000000), ref: 0046575C
      • WSACleanup.WSOCK32 ref: 00465762
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
      • String ID:
      • API String ID: 2945290962-0
      • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
      • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
      • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
      • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
      APIs
      • GetSystemMetrics.USER32(0000000F), ref: 00440527
      • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
      • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
      • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
      • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
      • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
      • String ID:
      • API String ID: 1457242333-0
      • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
      • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
      • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
      • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ConnectRegistry_memmove_wcslen
      • String ID:
      • API String ID: 15295421-0
      • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
      • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
      • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
      • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • _wcstok.LIBCMT ref: 004675B2
        • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
      • _wcscpy.LIBCMT ref: 00467641
      • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
      • _wcslen.LIBCMT ref: 00467793
      • _wcslen.LIBCMT ref: 004677BD
        • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
      • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
      • String ID: X
      • API String ID: 780548581-3081909835
      • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
      • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
      • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
      • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
      APIs
        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
      • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
      • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
      • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
      • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
      • CloseFigure.GDI32(?), ref: 0044751F
      • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
      • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
      • String ID:
      • API String ID: 4082120231-0
      • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
      • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
      • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
      • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
      • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
      • RegCloseKey.ADVAPI32(?), ref: 0046B49D
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
      • String ID:
      • API String ID: 2027346449-0
      • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
      • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
      • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
      • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
      • GetMenu.USER32 ref: 0047A703
      • GetMenuItemCount.USER32(00000000), ref: 0047A74F
      • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
      • _wcslen.LIBCMT ref: 0047A79E
      • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
      • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
      • String ID:
      • API String ID: 3257027151-0
      • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
      • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
      • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
      • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
      APIs
      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
      • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorLastselect
      • String ID:
      • API String ID: 215497628-0
      • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
      • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
      • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
      • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
      APIs
      • GetParent.USER32(?), ref: 0044443B
      • GetKeyboardState.USER32(?), ref: 00444450
      • SetKeyboardState.USER32(?), ref: 004444A4
      • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
      • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$Parent
      • String ID:
      • API String ID: 87235514-0
      • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
      • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
      • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
      • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
      APIs
      • GetParent.USER32(?), ref: 00444633
      • GetKeyboardState.USER32(?), ref: 00444648
      • SetKeyboardState.USER32(?), ref: 0044469C
      • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
      • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
      • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
      • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$Parent
      • String ID:
      • API String ID: 87235514-0
      • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
      • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
      • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
      • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __snwprintf__wcsicoll_wcscpy
      • String ID: , $$AUTOITCALLVARIABLE%d$CALLARGARRAY
      • API String ID: 1729044348-3025626884
      • Opcode ID: 7769a92cfab6b8d3931dc5c653c39d142ecf4e8a499bfed4412259d626728bb2
      • Instruction ID: fa375d034fa7217e9d4d929611683fd4ef9c76ca58110cba6d833e9902d6ecd0
      • Opcode Fuzzy Hash: 7769a92cfab6b8d3931dc5c653c39d142ecf4e8a499bfed4412259d626728bb2
      • Instruction Fuzzy Hash: 5D5184719002099BCB10EF51C982AEFB779EF84308F10856BF905B7281D779AE45CBE9
      APIs
      • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
      • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
      • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
      • String ID:
      • API String ID: 2354583917-0
      • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
      • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
      • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
      • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
      • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
      • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
      • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
      APIs
      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
      • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$Enable$Show$MessageMoveSend
      • String ID:
      • API String ID: 896007046-0
      • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
      • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
      • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
      • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
      APIs
      • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
      • GetFocus.USER32 ref: 00448ACF
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$Enable$Show$FocusMessageSend
      • String ID:
      • API String ID: 3429747543-0
      • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
      • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
      • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
      • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D459
      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
      • __swprintf.LIBCMT ref: 0045D4E9
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorMode$InformationVolume__swprintf
      • String ID: %lu$\VH
      • API String ID: 3164766367-2432546070
      • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
      • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
      • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
      • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
      APIs
      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
      • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
      • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: Msctls_Progress32
      • API String ID: 3850602802-3636473452
      • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
      • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
      • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
      • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
      • String ID:
      • API String ID: 3985565216-0
      • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
      • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
      • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
      • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
      APIs
      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,004A8178), ref: 00433E19
      • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00433E2C
      • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104), ref: 00433E43
      • __wsplitpath.LIBCMT ref: 00433E6D
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • _wcscat.LIBCMT ref: 00433E80
      • __wcsicoll.LIBCMT ref: 00433E90
      • CloseHandle.KERNEL32(00000000), ref: 00433EC8
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Process$BaseCloseEnumHandleModuleModulesNameOpen__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
      • String ID:
      • API String ID: 135935984-0
      • Opcode ID: b9dd60fc789600814193b10c203562de5ce45e1fa765f6932a0e1556b25623f2
      • Instruction ID: 66738fc5919b7c3a3c7c4a311c48fd84e22d6c2a66b6279363cc5d51ef299119
      • Opcode Fuzzy Hash: b9dd60fc789600814193b10c203562de5ce45e1fa765f6932a0e1556b25623f2
      • Instruction Fuzzy Hash: 832180B6500118AFDB11CF90CD85EEEB379EB8C700F10459AFA0997150DA75AA85CBA4
      APIs
      • _malloc.LIBCMT ref: 0041F707
        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
      • _free.LIBCMT ref: 0041F71A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AllocateHeap_free_malloc
      • String ID: [B
      • API String ID: 1020059152-632041663
      • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
      • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
      • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
      • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 00413DA4
      • __calloc_crt.LIBCMT ref: 00413DB0
      • __getptd.LIBCMT ref: 00413DBD
      • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
      • _free.LIBCMT ref: 00413E07
      • __dosmaperr.LIBCMT ref: 00413E12
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
      • String ID:
      • API String ID: 155776804-0
      • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
      • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
      • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
      • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
      APIs
        • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
        • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
      • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
      • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
      • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
      • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
      • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
      • String ID:
      • API String ID: 1957940570-0
      • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
      • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
      • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
      • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 00413D20
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 00413D2B
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 00413D3E
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
      • ExitThread.KERNEL32 ref: 00413D4E
      • GetCurrentThreadId.KERNEL32 ref: 00413D54
      • __freefls@4.LIBCMT ref: 00413D74
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
      • String ID:
      • API String ID: 259663610-0
      • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
      • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
      • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
      • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
      APIs
      • GetClientRect.USER32(?,?), ref: 004302E6
      • GetWindowRect.USER32(00000000,?), ref: 00430316
      • GetClientRect.USER32(?,?), ref: 00430364
      • GetSystemMetrics.USER32(0000000F), ref: 004303B1
      • GetWindowRect.USER32(?,?), ref: 004303C3
      • ScreenToClient.USER32(?,?), ref: 004303EC
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Rect$Client$Window$MetricsScreenSystem
      • String ID:
      • API String ID: 3220332590-0
      • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
      • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
      • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
      • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _malloc_wcslen$_strcat_wcscpy
      • String ID:
      • API String ID: 1612042205-0
      • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
      • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
      • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
      • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove_strncmp
      • String ID: >$U$\
      • API String ID: 2666721431-237099441
      • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
      • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
      • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
      • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
      APIs
      • GetKeyboardState.USER32(?), ref: 0044C570
      • SetKeyboardState.USER32(00000080), ref: 0044C594
      • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
      • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
      • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
      • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$InputSend
      • String ID:
      • API String ID: 2221674350-0
      • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
      • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
      • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
      • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcscpy$_wcscat
      • String ID:
      • API String ID: 2037614760-0
      • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
      • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
      • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
      • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
      APIs
      • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
      • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
      • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
      • VariantCopy.OLEAUT32(?,?), ref: 00451C27
      • VariantClear.OLEAUT32(?), ref: 00451CA1
      • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Variant$Copy$AllocClearErrorLastString
      • String ID:
      • API String ID: 960795272-0
      • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
      • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
      • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
      • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
      APIs
      • BeginPaint.USER32(00000000,?), ref: 00447BDF
      • GetWindowRect.USER32(?,?), ref: 00447C5D
      • ScreenToClient.USER32(?,?), ref: 00447C7B
      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
      • EndPaint.USER32(?,?), ref: 00447D13
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
      • String ID:
      • API String ID: 4189319755-0
      • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
      • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
      • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
      • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
      APIs
      • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
      • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
      • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
      • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
      • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$LongWindow$InvalidateRect
      • String ID:
      • API String ID: 1976402638-0
      • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
      • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
      • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
      • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
      APIs
      • ShowWindow.USER32(?,00000000), ref: 00440A8A
      • EnableWindow.USER32(?,00000000), ref: 00440AAF
      • ShowWindow.USER32(?,00000000), ref: 00440B18
      • ShowWindow.USER32(?,00000004), ref: 00440B2B
      • EnableWindow.USER32(?,00000001), ref: 00440B50
      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$Show$Enable$MessageSend
      • String ID:
      • API String ID: 642888154-0
      • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
      • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
      • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
      • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
      APIs
      • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$Enable$Show$MessageSend
      • String ID:
      • API String ID: 1871949834-0
      • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
      • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
      • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
      • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
      • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
      • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
      • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
      APIs
      • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
      • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
      • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
      • SendMessageW.USER32 ref: 00471AE3
      • DestroyIcon.USER32(?), ref: 00471AF4
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
      • String ID:
      • API String ID: 3611059338-0
      • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
      • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
      • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
      • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: DestroyWindow$DeleteObject$IconMove
      • String ID:
      • API String ID: 1640429340-0
      • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
      • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
      • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
      • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
      APIs
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • _wcslen.LIBCMT ref: 004438CD
      • _wcslen.LIBCMT ref: 004438E6
      • _wcstok.LIBCMT ref: 004438F8
      • _wcslen.LIBCMT ref: 0044390C
      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
      • _wcstok.LIBCMT ref: 00443931
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
      • String ID:
      • API String ID: 3632110297-0
      • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
      • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
      • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
      • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Destroy$DeleteMenuObject$IconWindow
      • String ID:
      • API String ID: 752480666-0
      • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
      • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
      • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
      • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$IconImageList_
      • String ID:
      • API String ID: 3275902921-0
      • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
      • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
      • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
      • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$IconImageList_
      • String ID:
      • API String ID: 3275902921-0
      • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
      • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
      • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
      • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
      APIs
      • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
      • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: PerformanceQuery$CounterSleep$Frequency
      • String ID:
      • API String ID: 2833360925-0
      • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
      • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
      • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
      • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
      APIs
      • SendMessageW.USER32 ref: 004555C7
      • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: DeleteDestroyMessageObjectSend$IconWindow
      • String ID:
      • API String ID: 3691411573-0
      • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
      • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
      • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
      • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
      APIs
        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
      • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
      • LineTo.GDI32(?,?,?), ref: 004472AC
      • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
      • LineTo.GDI32(?,?,?), ref: 004472C6
      • EndPath.GDI32(?), ref: 004472D6
      • StrokePath.GDI32(?), ref: 004472E4
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
      • String ID:
      • API String ID: 372113273-0
      • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
      • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
      • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
      • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
      APIs
      • GetDC.USER32(00000000), ref: 0044CC6D
      • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
      • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
      • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
      • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CapsDevice$Release
      • String ID:
      • API String ID: 1035833867-0
      • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
      • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
      • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
      • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
      APIs
      • __getptd.LIBCMT ref: 0041708E
        • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
        • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
      • __amsg_exit.LIBCMT ref: 004170AE
      • __lock.LIBCMT ref: 004170BE
      • InterlockedDecrement.KERNEL32(?), ref: 004170DB
      • _free.LIBCMT ref: 004170EE
      • InterlockedIncrement.KERNEL32(00A12CE0), ref: 00417106
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
      • String ID:
      • API String ID: 3470314060-0
      • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
      • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
      • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
      • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
      APIs
      • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
      • EnterCriticalSection.KERNEL32(?), ref: 0044B666
      • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
      • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
        • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
      • String ID:
      • API String ID: 3495660284-0
      • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
      • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
      • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
      • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
      APIs
      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Virtual
      • String ID:
      • API String ID: 4278518827-0
      • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
      • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
      • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
      • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 004151C0
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 004151CB
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 004151DD
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
      • ExitThread.KERNEL32 ref: 004151ED
      • __freefls@4.LIBCMT ref: 00415209
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
      • String ID:
      • API String ID: 442100245-0
      • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
      • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
      • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
      • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
      APIs
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
      • _wcslen.LIBCMT ref: 0045F94A
      • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
      • String ID: 0
      • API String ID: 621800784-4108050209
      • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
      • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
      • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
      • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • SetErrorMode.KERNEL32 ref: 004781CE
      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • SetErrorMode.KERNEL32(?), ref: 00478270
      • SetErrorMode.KERNEL32(?), ref: 00478340
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorMode$AttributesFile_memmove_wcslen
      • String ID: \VH
      • API String ID: 3884216118-234962358
      • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
      • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
      • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
      • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
      APIs
      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
      • IsMenu.USER32(?), ref: 0044854D
      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
      • DrawMenuBar.USER32 ref: 004485AF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Menu$Item$DrawInfoInsert
      • String ID: 0
      • API String ID: 3076010158-4108050209
      • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
      • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
      • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
      • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
      • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$_memmove_wcslen
      • String ID: ComboBox$ListBox
      • API String ID: 1589278365-1403004172
      • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
      • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
      • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
      • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Handle
      • String ID: nul
      • API String ID: 2519475695-2873401336
      • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
      • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
      • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
      • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
      APIs
      • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Handle
      • String ID: nul
      • API String ID: 2519475695-2873401336
      • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
      • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
      • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
      • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID: SysAnimate32
      • API String ID: 0-1011021900
      • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
      • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
      • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
      • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
        • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
        • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
        • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
        • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
      • GetFocus.USER32 ref: 0046157B
        • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
        • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
      • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
      • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
      • __swprintf.LIBCMT ref: 00461608
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
      • String ID: %s%d
      • API String ID: 2645982514-1110647743
      • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
      • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
      • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
      • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
      • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
      • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
      • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
      APIs
      • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
      • CloseHandle.KERNEL32(00000000), ref: 00475A4D
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Process$CloseCountersCurrentHandleOpen
      • String ID:
      • API String ID: 3488606520-0
      • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
      • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
      • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
      • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ConnectRegistry_memmove_wcslen
      • String ID:
      • API String ID: 15295421-0
      • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
      • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
      • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
      • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
      APIs
      • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
      • GetProcAddress.KERNEL32(?,?), ref: 004648F7
      • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
      • GetProcAddress.KERNEL32(?,?), ref: 0046495A
      • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AddressProc$Library$FreeLoad
      • String ID:
      • API String ID: 2449869053-0
      • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
      • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
      • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
      • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
      APIs
      • GetCursorPos.USER32(?), ref: 004563A6
      • ScreenToClient.USER32(?,?), ref: 004563C3
      • GetAsyncKeyState.USER32(?), ref: 00456400
      • GetAsyncKeyState.USER32(?), ref: 00456410
      • GetWindowLongW.USER32(?,000000F0), ref: 00456466
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AsyncState$ClientCursorLongScreenWindow
      • String ID:
      • API String ID: 3539004672-0
      • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
      • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
      • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
      • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
      APIs
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
      • Sleep.KERNEL32(0000000A), ref: 0047D455
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Interlocked$DecrementIncrement$Sleep
      • String ID:
      • API String ID: 327565842-0
      • Opcode ID: 9dc5377443ce6d6d6f4d2094a12b75972c96b6e0f004f6bf3202481cb4e98956
      • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
      • Opcode Fuzzy Hash: 9dc5377443ce6d6d6f4d2094a12b75972c96b6e0f004f6bf3202481cb4e98956
      • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
      APIs
      • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
      • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
      • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
      • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: PrivateProfile$SectionWrite$String
      • String ID:
      • API String ID: 2832842796-0
      • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
      • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
      • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
      • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
      APIs
      • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
      • RegCloseKey.ADVAPI32(?), ref: 00441CFE
      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Enum$CloseDeleteOpen
      • String ID:
      • API String ID: 2095303065-0
      • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
      • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
      • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
      • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
      APIs
      • GetWindowRect.USER32(?,?), ref: 00436A24
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: RectWindow
      • String ID:
      • API String ID: 861336768-0
      • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
      • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
      • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
      • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
      APIs
      • SendMessageW.USER32 ref: 00449598
        • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
      • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
      • _wcslen.LIBCMT ref: 0044960D
      • _wcslen.LIBCMT ref: 0044961A
      • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$_wcslen$_wcspbrk
      • String ID:
      • API String ID: 1856069659-0
      • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
      • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
      • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
      • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
      APIs
      • GetCursorPos.USER32(?), ref: 004478E2
      • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
      • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
      • GetCursorPos.USER32(00000000), ref: 0044796A
      • TrackPopupMenuEx.USER32(00A16420,00000000,00000000,?,?,00000000), ref: 00447991
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CursorMenuPopupTrack$Proc
      • String ID:
      • API String ID: 1300944170-0
      • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
      • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
      • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
      • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
      APIs
      • GetClientRect.USER32(?,?), ref: 004479CC
      • GetCursorPos.USER32(?), ref: 004479D7
      • ScreenToClient.USER32(?,?), ref: 004479F3
      • WindowFromPoint.USER32(?,?), ref: 00447A34
      • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Client$CursorFromPointProcRectScreenWindow
      • String ID:
      • API String ID: 1822080540-0
      • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
      • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
      • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
      • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
      APIs
      • GetWindowRect.USER32(?,?), ref: 00447C5D
      • ScreenToClient.USER32(?,?), ref: 00447C7B
      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
      • EndPaint.USER32(?,?), ref: 00447D13
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ClientPaintRectRectangleScreenViewportWindow
      • String ID:
      • API String ID: 659298297-0
      • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
      • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
      • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
      • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
      APIs
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
        • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
        • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
        • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
        • Part of subcall function 00440D98: SendMessageW.USER32(00A11A18,000000F1,00000000,00000000), ref: 00440E6E
        • Part of subcall function 00440D98: SendMessageW.USER32(00A11A18,000000F1,00000001,00000000), ref: 00440E9A
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$EnableMessageSend$LongShow
      • String ID:
      • API String ID: 142311417-0
      • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
      • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
      • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
      • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
      • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
      • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
      • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
      APIs
      • IsWindowVisible.USER32(?), ref: 00445879
      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
      • _wcslen.LIBCMT ref: 004458FB
      • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
      • String ID:
      • API String ID: 3087257052-0
      • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
      • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
      • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
      • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
      APIs
        • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
      • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
      • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
      • connect.WSOCK32(00000000,?,00000010), ref: 00465446
      • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
      • closesocket.WSOCK32(00000000,00000000), ref: 00465481
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorLast$closesocketconnectinet_addrsocket
      • String ID:
      • API String ID: 245547762-0
      • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
      • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
      • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
      • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
      APIs
      • DeleteObject.GDI32(00000000), ref: 004471D8
      • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
      • SelectObject.GDI32(?,00000000), ref: 00447228
      • BeginPath.GDI32(?), ref: 0044723D
      • SelectObject.GDI32(?,00000000), ref: 00447266
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Object$Select$BeginCreateDeletePath
      • String ID:
      • API String ID: 2338827641-0
      • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
      • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
      • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
      • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
      APIs
      • Sleep.KERNEL32(00000000), ref: 00434598
      • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
      • Sleep.KERNEL32(00000000), ref: 004345D4
      • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CounterPerformanceQuerySleep
      • String ID:
      • API String ID: 2875609808-0
      • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
      • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
      • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
      • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
      APIs
      • GetDlgItem.USER32(?,000003E9), ref: 00460C17
      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
      • MessageBeep.USER32(00000000), ref: 00460C46
      • KillTimer.USER32(?,0000040A), ref: 00460C68
      • EndDialog.USER32(?,00000001), ref: 00460C83
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: BeepDialogItemKillMessageTextTimerWindow
      • String ID:
      • API String ID: 3741023627-0
      • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
      • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
      • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
      • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$Icon
      • String ID:
      • API String ID: 4023252218-0
      • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
      • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
      • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
      • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
      APIs
      • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: DeleteDestroyObject$IconMessageSendWindow
      • String ID:
      • API String ID: 1489400265-0
      • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
      • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
      • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
      • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
      APIs
        • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
      • DestroyWindow.USER32(?), ref: 00455728
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
      • String ID:
      • API String ID: 1042038666-0
      • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
      • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
      • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
      • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Path$ObjectStroke$DeleteFillSelect
      • String ID:
      • API String ID: 2625713937-0
      • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
      • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
      • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
      • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
      APIs
      • __getptd.LIBCMT ref: 0041780F
        • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
        • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
      • __getptd.LIBCMT ref: 00417826
      • __amsg_exit.LIBCMT ref: 00417834
      • __lock.LIBCMT ref: 00417844
      • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
      • String ID:
      • API String ID: 938513278-0
      • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
      • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
      • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
      • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
      APIs
        • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
      • ___set_flsgetvalue.LIBCMT ref: 00413D20
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 00413D2B
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 00413D3E
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
      • ExitThread.KERNEL32 ref: 00413D4E
      • GetCurrentThreadId.KERNEL32 ref: 00413D54
      • __freefls@4.LIBCMT ref: 00413D74
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
      • String ID:
      • API String ID: 2403457894-0
      • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
      • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
      • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
      • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
      APIs
        • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
      • ___set_flsgetvalue.LIBCMT ref: 004151C0
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 004151CB
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 004151DD
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
      • ExitThread.KERNEL32 ref: 004151ED
      • __freefls@4.LIBCMT ref: 00415209
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
      • String ID:
      • API String ID: 4247068974-0
      • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
      • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
      • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
      • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID:
      • String ID: )$U$\
      • API String ID: 0-3705770531
      • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
      • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
      • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
      • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
      APIs
        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
      • CoInitialize.OLE32(00000000), ref: 0046E505
      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
      • CoUninitialize.OLE32 ref: 0046E53D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize_wcslen
      • String ID: .lnk
      • API String ID: 886957087-24824748
      • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
      • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
      • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
      • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
      Strings
      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
      • API String ID: 708495834-557222456
      • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
      • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
      • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
      • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
      APIs
        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
      • CoInitialize.OLE32(00000000), ref: 00478442
      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
      • CoUninitialize.OLE32 ref: 0047863C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize_wcslen
      • String ID: .lnk
      • API String ID: 886957087-24824748
      • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
      • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
      • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
      • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
      APIs
        • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
        • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
        • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
        • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
        • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
      • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
      • String ID: @
      • API String ID: 4150878124-2766056989
      • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
      • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
      • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
      • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \$]$h
      • API String ID: 4104443479-3262404753
      • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
      • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
      • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
      • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
      APIs
      • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • CloseHandle.KERNEL32(?), ref: 00457E09
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CloseExecuteHandleShell_wcscpy_wcslen
      • String ID: <$@
      • API String ID: 2417854910-1426351568
      • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
      • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
      • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
      • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
      APIs
      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
      • String ID:
      • API String ID: 3705125965-3916222277
      • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
      • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
      • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
      • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
      APIs
      • GetMenuItemInfoW.USER32 ref: 0045FAC4
      • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
      • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Menu$Delete$InfoItem
      • String ID: 0
      • API String ID: 135850232-4108050209
      • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
      • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
      • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
      • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
      APIs
      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
      • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$Long
      • String ID: SysTreeView32
      • API String ID: 847901565-1698111956
      • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
      • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
      • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
      • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
      APIs
      • LoadLibraryA.KERNEL32(?), ref: 00434B10
      • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
      • FreeLibrary.KERNEL32(?), ref: 00434B9F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Library$AddressFreeLoadProc
      • String ID: AU3_GetPluginDetails
      • API String ID: 145871493-4132174516
      • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
      • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
      • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
      • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
      APIs
      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$Window
      • String ID: SysMonthCal32
      • API String ID: 2326795674-1439706946
      • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
      • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
      • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
      • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
      APIs
      • DestroyWindow.USER32(00000000), ref: 00450A2F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: DestroyWindow
      • String ID: msctls_updown32
      • API String ID: 3375834691-2298589950
      • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
      • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
      • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
      • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID: $<
      • API String ID: 4104443479-428540627
      • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
      • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
      • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
      • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorMode$DiskFreeSpace
      • String ID: \VH
      • API String ID: 1682464887-234962358
      • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
      • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
      • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
      • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorMode$DiskFreeSpace
      • String ID: \VH
      • API String ID: 1682464887-234962358
      • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
      • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
      • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
      • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorMode$DiskFreeSpace
      • String ID: \VH
      • API String ID: 1682464887-234962358
      • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
      • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
      • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
      • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorMode$InformationVolume
      • String ID: \VH
      • API String ID: 2507767853-234962358
      • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
      • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
      • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
      • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorMode$InformationVolume
      • String ID: \VH
      • API String ID: 2507767853-234962358
      • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
      • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
      • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
      • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
      APIs
      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
      • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: msctls_trackbar32
      • API String ID: 3850602802-1010561917
      • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
      • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
      • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
      • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • CLSIDFromString.OLE32(?,00000000), ref: 00435236
      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
      • String ID: crts
      • API String ID: 943502515-3724388283
      • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
      • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
      • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
      • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
      APIs
        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
      • CoInitialize.OLE32(00000000), ref: 0046E505
      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
      • CoUninitialize.OLE32 ref: 0046E53D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize_wcslen
      • String ID: .lnk
      • API String ID: 886957087-24824748
      • Opcode ID: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
      • Instruction ID: 8523b4f55483354ee3aaa8e7e2ee5f8b04597d59409be9d2747526508be4cfd1
      • Opcode Fuzzy Hash: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
      • Instruction Fuzzy Hash: E72183312082009FD700EF55C985F4AB7F4AF88729F14866EF9589B2E1D7B4E804CB56
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
      • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
      • SetErrorMode.KERNEL32(?), ref: 0045D35C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorMode$LabelVolume
      • String ID: \VH
      • API String ID: 2006950084-234962358
      • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
      • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
      • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
      • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • GetMenuItemInfoW.USER32 ref: 00449727
      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
      • DrawMenuBar.USER32 ref: 00449761
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Menu$InfoItem$Draw_malloc
      • String ID: 0
      • API String ID: 772068139-4108050209
      • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
      • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
      • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
      • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcslen$_wcscpy
      • String ID: 3, 3, 8, 1
      • API String ID: 3469035223-357260408
      • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
      • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
      • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
      • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
      APIs
      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
      • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpCloseHandle
      • API String ID: 2574300362-3530519716
      • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
      • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
      • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
      • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
      APIs
      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
      • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpCreateFile
      • API String ID: 2574300362-275556492
      • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
      • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
      • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
      • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
      APIs
      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
      • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpSendEcho
      • API String ID: 2574300362-58917771
      • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
      • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
      • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
      • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
      APIs
      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: RegDeleteKeyExW$advapi32.dll
      • API String ID: 2574300362-4033151799
      • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
      • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
      • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
      • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
      APIs
      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: GetSystemWow64DirectoryW$kernel32.dll
      • API String ID: 2574300362-1816364905
      • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
      • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
      • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
      • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
      APIs
      • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
      • __itow.LIBCMT ref: 004699CD
        • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
      • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
      • __itow.LIBCMT ref: 00469A97
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$__itow
      • String ID:
      • API String ID: 3379773720-0
      • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
      • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
      • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
      • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
      APIs
      • GetWindowRect.USER32(?,?), ref: 00449A4A
      • ScreenToClient.USER32(?,?), ref: 00449A80
      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$ClientMoveRectScreen
      • String ID:
      • API String ID: 3880355969-0
      • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
      • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
      • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
      • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
      • String ID:
      • API String ID: 2782032738-0
      • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
      • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
      • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
      • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
      APIs
      • ClientToScreen.USER32(00000000,?), ref: 0044169A
      • GetWindowRect.USER32(?,?), ref: 00441722
      • PtInRect.USER32(?,?,?), ref: 00441734
      • MessageBeep.USER32(00000000), ref: 004417AD
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Rect$BeepClientMessageScreenWindow
      • String ID:
      • API String ID: 1352109105-0
      • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
      • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
      • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
      • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
      APIs
      • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
      • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
      • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
      • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CreateHardLink$DeleteErrorFileLast
      • String ID:
      • API String ID: 3321077145-0
      • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
      • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
      • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
      • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
      APIs
      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
      • __isleadbyte_l.LIBCMT ref: 004208A6
      • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
      • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
      • String ID:
      • API String ID: 3058430110-0
      • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
      • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
      • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
      • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
      APIs
      • GetParent.USER32(?), ref: 004503C8
      • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
      • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
      • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Proc$Parent
      • String ID:
      • API String ID: 2351499541-0
      • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
      • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
      • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
      • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
      APIs
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
      • TranslateMessage.USER32(?), ref: 00442B01
      • DispatchMessageW.USER32(?), ref: 00442B0B
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Message$Peek$DispatchTranslate
      • String ID:
      • API String ID: 1795658109-0
      • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
      • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
      • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
      • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
      APIs
      • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
        • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
        • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
        • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
      • GetCaretPos.USER32(?), ref: 004743B2
      • ClientToScreen.USER32(00000000,?), ref: 004743E8
      • GetForegroundWindow.USER32 ref: 004743EE
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
      • String ID:
      • API String ID: 2759813231-0
      • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
      • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
      • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
      • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
      APIs
        • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
      • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
      • _wcslen.LIBCMT ref: 00449519
      • _wcslen.LIBCMT ref: 00449526
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend_wcslen$_wcspbrk
      • String ID:
      • API String ID: 2886238975-0
      • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
      • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
      • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
      • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __setmode$DebugOutputString_fprintf
      • String ID:
      • API String ID: 1792727568-0
      • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
      • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
      • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
      • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
      APIs
        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
      • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$Long$AttributesLayered
      • String ID:
      • API String ID: 2169480361-0
      • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
      • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
      • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
      • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
      APIs
        • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
        • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
        • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
      • lstrlenW.KERNEL32(?), ref: 00434CF6
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
      • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: lstrcmpilstrcpylstrlen$_malloc
      • String ID: cdecl
      • API String ID: 3850814276-3896280584
      • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
      • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
      • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
      • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
      APIs
        • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
      • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
      • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
      • _memmove.LIBCMT ref: 0046D475
      • inet_ntoa.WSOCK32(?), ref: 0046D481
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
      • String ID:
      • API String ID: 2502553879-0
      • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
      • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
      • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
      • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
      APIs
      • SendMessageW.USER32 ref: 00448C69
      • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
      • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
      • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend$LongWindow
      • String ID:
      • API String ID: 312131281-0
      • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
      • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
      • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
      • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
      APIs
      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
      • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
      • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
      • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorLastacceptselect
      • String ID:
      • API String ID: 385091864-0
      • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
      • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
      • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
      • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
      APIs
      • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend
      • String ID:
      • API String ID: 3850602802-0
      • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
      • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
      • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
      • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
      APIs
      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
      • GetStockObject.GDI32(00000011), ref: 00430258
      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
      • ShowWindow.USER32(00000000,00000000), ref: 0043027D
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Window$CreateMessageObjectSendShowStock
      • String ID:
      • API String ID: 1358664141-0
      • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
      • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
      • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
      • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
      APIs
      • GetCurrentThreadId.KERNEL32 ref: 00443CA6
      • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
      • CloseHandle.KERNEL32(00000000), ref: 00443CF9
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
      • String ID:
      • API String ID: 2880819207-0
      • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
      • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
      • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
      • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
      APIs
      • GetWindowRect.USER32(?,?), ref: 00430BA2
      • ScreenToClient.USER32(?,?), ref: 00430BC1
      • ScreenToClient.USER32(?,?), ref: 00430BE2
      • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ClientRectScreen$InvalidateWindow
      • String ID:
      • API String ID: 357397906-0
      • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
      • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
      • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
      • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
      APIs
      • __wsplitpath.LIBCMT ref: 0043392E
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • __wsplitpath.LIBCMT ref: 00433950
      • __wcsicoll.LIBCMT ref: 00433974
      • __wcsicoll.LIBCMT ref: 0043398A
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
      • String ID:
      • API String ID: 1187119602-0
      • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
      • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
      • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
      • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _wcslen$_malloc_wcscat_wcscpy
      • String ID:
      • API String ID: 1597257046-0
      • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
      • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
      • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
      • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
      APIs
      • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
      • __malloc_crt.LIBCMT ref: 0041F5B6
      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: EnvironmentStrings$Free__malloc_crt
      • String ID:
      • API String ID: 237123855-0
      • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
      • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
      • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
      • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: DeleteDestroyObject$IconWindow
      • String ID:
      • API String ID: 3349847261-0
      • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
      • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
      • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
      • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
      APIs
      • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
      • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CriticalSection$Leave$EnterExchangeInterlocked
      • String ID:
      • API String ID: 2223660684-0
      • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
      • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
      • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
      • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
      APIs
        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
      • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
      • LineTo.GDI32(?,?,?), ref: 00447326
      • EndPath.GDI32(?), ref: 00447336
      • StrokePath.GDI32(?), ref: 00447344
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
      • String ID:
      • API String ID: 2783949968-0
      • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
      • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
      • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
      • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
      APIs
      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
      • GetCurrentThreadId.KERNEL32 ref: 004364A3
      • AttachThreadInput.USER32(00000000), ref: 004364AA
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
      • String ID:
      • API String ID: 2710830443-0
      • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
      • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
      • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
      • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
      APIs
      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
      • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
      • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
      • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
        • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
        • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
      • String ID:
      • API String ID: 146765662-0
      • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
      • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
      • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
      • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
      APIs
      • GetDesktopWindow.USER32 ref: 00472B63
      • GetDC.USER32(00000000), ref: 00472B6C
      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
      • ReleaseDC.USER32(00000000,?), ref: 00472B99
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CapsDesktopDeviceReleaseWindow
      • String ID:
      • API String ID: 2889604237-0
      • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
      • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
      • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
      • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
      APIs
      • GetDesktopWindow.USER32 ref: 00472BB2
      • GetDC.USER32(00000000), ref: 00472BBB
      • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
      • ReleaseDC.USER32(00000000,?), ref: 00472BE8
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CapsDesktopDeviceReleaseWindow
      • String ID:
      • API String ID: 2889604237-0
      • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
      • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
      • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
      • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
      APIs
      • __getptd_noexit.LIBCMT ref: 00415150
        • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
        • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
        • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
        • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
        • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
      • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
      • __freeptd.LIBCMT ref: 0041516B
      • ExitThread.KERNEL32 ref: 00415173
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
      • String ID:
      • API String ID: 1454798553-0
      • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
      • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
      • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
      • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _strncmp
      • String ID: Q\E
      • API String ID: 909875538-2189900498
      • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
      • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
      • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
      • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
      APIs
      • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
        • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
        • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
      • String ID: AutoIt3GUI$Container
      • API String ID: 2652923123-3941886329
      • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
      • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
      • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
      • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove_strncmp
      • String ID: U$\
      • API String ID: 2666721431-100911408
      • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
      • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
      • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
      • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
      APIs
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • __wcsnicmp.LIBCMT ref: 00467288
      • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Connection__wcsnicmp_wcscpy_wcslen
      • String ID: LPT
      • API String ID: 3035604524-1350329615
      • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
      • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
      • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
      • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \$h
      • API String ID: 4104443479-677774858
      • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
      • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
      • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
      • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memcmp
      • String ID: &
      • API String ID: 2931989736-1010288
      • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
      • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
      • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
      • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \
      • API String ID: 4104443479-2967466578
      • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
      • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
      • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
      • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
      APIs
      • _wcslen.LIBCMT ref: 00466825
      • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CrackInternet_wcslen
      • String ID: |
      • API String ID: 596671847-2343686810
      • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
      • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
      • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
      • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
      APIs
      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: '
      • API String ID: 3850602802-1997036262
      • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
      • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
      • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
      • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
      APIs
      • _strlen.LIBCMT ref: 0040F858
        • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
        • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
      • _sprintf.LIBCMT ref: 0040F9AE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove$_sprintf_strlen
      • String ID: %02X
      • API String ID: 1921645428-436463671
      • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
      • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
      • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
      • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
      APIs
      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: Combobox
      • API String ID: 3850602802-2096851135
      • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
      • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
      • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
      • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
      APIs
      • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: LengthMessageSendTextWindow
      • String ID: edit
      • API String ID: 2978978980-2167791130
      • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
      • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
      • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
      • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
      APIs
      • Sleep.KERNEL32(00000000), ref: 00476CB0
      • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: GlobalMemorySleepStatus
      • String ID: @
      • API String ID: 2783356886-2766056989
      • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
      • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
      • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
      • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: htonsinet_addr
      • String ID: 255.255.255.255
      • API String ID: 3832099526-2422070025
      • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
      • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
      • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
      • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
      APIs
      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: InternetOpen
      • String ID: <local>
      • API String ID: 2038078732-4266983199
      • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
      • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
      • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
      • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: __fread_nolock_memmove
      • String ID: EA06
      • API String ID: 1988441806-3962188686
      • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
      • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
      • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
      • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID: u,D
      • API String ID: 4104443479-3858472334
      • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
      • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
      • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
      • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: _memmove
      • String ID: Error:
      • API String ID: 4104443479-232661952
      • Opcode ID: 47c0561e29c226fab9e20f11d30fc4033f42905d42d91430649e8e798f40a5ad
      • Instruction ID: e6e9f2aa443a554b8bda50df2a041f2c42dbd20d32390c21629c974d0e28b4a3
      • Opcode Fuzzy Hash: 47c0561e29c226fab9e20f11d30fc4033f42905d42d91430649e8e798f40a5ad
      • Instruction Fuzzy Hash: 2101EFB6200115ABC704DF49D981D6AF7A9FF88710708855AF819CB302D774FD20CBA4
      APIs
      • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • wsprintfW.USER32 ref: 0045612A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: MessageSend_mallocwsprintf
      • String ID: %d/%02d/%02d
      • API String ID: 1262938277-328681919
      • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
      • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
      • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
      • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
      APIs
      • InternetCloseHandle.WININET(?), ref: 00442663
      • InternetCloseHandle.WININET ref: 00442668
        • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: CloseHandleInternet$ObjectSingleWait
      • String ID: aeB
      • API String ID: 857135153-906807131
      • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
      • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
      • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
      • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
      APIs
      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
      • PostMessageW.USER32(00000000), ref: 00441C05
        • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: FindMessagePostSleepWindow
      • String ID: Shell_TrayWnd
      • API String ID: 529655941-2988720461
      • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
      • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
      • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
      • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
      APIs
      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
        • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: FindMessagePostSleepWindow
      • String ID: Shell_TrayWnd
      • API String ID: 529655941-2988720461
      • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
      • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
      • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
      • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
      APIs
      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
        • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1746109497.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1746092499.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746155076.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746174216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746191122.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746206492.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1746289820.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_payment Receipt.jbxd
      Similarity
      • API ID: Message_doexit
      • String ID: AutoIt$Error allocating memory.
      • API String ID: 1993061046-4017498283
      • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
      • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
      • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
      • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D