Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Bankcopyscanneddoc.exe

Overview

General Information

Sample name:Bankcopyscanneddoc.exe
Analysis ID:1482847
MD5:901969f80acf800e522c7e2e73840e22
SHA1:de89bca939c5674b3afca2eaa34f2e578b3f9c84
SHA256:f03d12cadb70aa5f2d93285bf541f8a02e4fe24c574d7eb5062c693cfb6fc076
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Bankcopyscanneddoc.exe (PID: 6312 cmdline: "C:\Users\user\Desktop\Bankcopyscanneddoc.exe" MD5: 901969F80ACF800E522C7E2E73840E22)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["84.38.129.21:1912"], "Bot Id": "foz", "Authorization Header": "c74790bd166600f1f665c8ce201776eb"}
SourceRuleDescriptionAuthorStrings
Bankcopyscanneddoc.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
      dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1250760554.0000000000712000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              00000000.00000002.1363475474.0000000002D83000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Process Memory Space: Bankcopyscanneddoc.exe PID: 6312JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 1 entries
                  SourceRuleDescriptionAuthorStrings
                  0.0.Bankcopyscanneddoc.exe.710000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched
                    Timestamp:2024-07-26T09:12:08.384450+0200
                    SID:2046056
                    Source Port:1912
                    Destination Port:49699
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T09:12:08.206533+0200
                    SID:2043231
                    Source Port:49699
                    Destination Port:1912
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T09:12:20.036450+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49701
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T09:12:02.655038+0200
                    SID:2046045
                    Source Port:49699
                    Destination Port:1912
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T09:12:11.875496+0200
                    SID:2043231
                    Source Port:49699
                    Destination Port:1912
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T09:12:02.830260+0200
                    SID:2043234
                    Source Port:1912
                    Destination Port:49699
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T09:12:58.931591+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49705
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T09:12:11.660867+0200
                    SID:2043231
                    Source Port:49699
                    Destination Port:1912
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Bankcopyscanneddoc.exeAvira: detected
                    Source: Bankcopyscanneddoc.exeMalware Configuration Extractor: RedLine {"C2 url": ["84.38.129.21:1912"], "Bot Id": "foz", "Authorization Header": "c74790bd166600f1f665c8ce201776eb"}
                    Source: Bankcopyscanneddoc.exeReversingLabs: Detection: 65%
                    Source: Bankcopyscanneddoc.exeVirustotal: Detection: 79%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: Bankcopyscanneddoc.exeJoe Sandbox ML: detected
                    Source: Bankcopyscanneddoc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Bankcopyscanneddoc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 4x nop then jmp 07965E23h0_2_07965BF0
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 4x nop then jmp 07964F22h0_2_07964B00
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 4x nop then jmp 079653A2h0_2_07964B00
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 4x nop then jmp 07963018h0_2_07963000

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 84.38.129.21:1912
                    Source: global trafficTCP traffic: 192.168.2.7:49699 -> 84.38.129.21:1912
                    Source: Joe Sandbox ViewASN Name: DATACLUB-NL DATACLUB-NL
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.21
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rmX
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002F8E000.00000004.00000800.00020000.00000000.sdmp, Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3ResponseD
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                    Source: Bankcopyscanneddoc.exeString found in binary or memory: https://api.ip.sb/ip
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_0109DC740_2_0109DC74
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_04FFEE580_2_04FFEE58
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_04FF88500_2_04FF8850
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_04FF00400_2_04FF0040
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_04FF003C0_2_04FF003C
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_04FF88400_2_04FF8840
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079627180_2_07962718
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_07960E480_2_07960E48
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079615A00_2_079615A0
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079664180_2_07966418
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_07969C380_2_07969C38
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_07964B000_2_07964B00
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079632C00_2_079632C0
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079642700_2_07964270
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079620D80_2_079620D8
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079638280_2_07963828
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079600400_2_07960040
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_07960E370_2_07960E37
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079632AF0_2_079632AF
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_07964AF60_2_07964AF6
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079642600_2_07964260
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_079620CA0_2_079620CA
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1362445132.0000000000E0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exe, 00000000.00000000.1250820901.0000000000756000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSteanings.exe8 vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefirefox.exe0 vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\000004B0\\OriginalFilename vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\040904B0\\OriginalFilename vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXE.MUID vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXED vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\080904B0\\OriginalFilename vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsedge.exe> vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exeBinary or memory string: OriginalFilenameSteanings.exe8 vs Bankcopyscanneddoc.exe
                    Source: Bankcopyscanneddoc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@0/1
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile created: C:\Users\user\AppData\Local\SystemCacheJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeMutant created: NULL
                    Source: Bankcopyscanneddoc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Bankcopyscanneddoc.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Bankcopyscanneddoc.exeReversingLabs: Detection: 65%
                    Source: Bankcopyscanneddoc.exeVirustotal: Detection: 79%
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocServer32Jump to behavior
                    Source: Bankcopyscanneddoc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Bankcopyscanneddoc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Bankcopyscanneddoc.exeStatic PE information: 0xD22848DC [Tue Sep 23 12:17:32 2081 UTC]
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_04FFD442 push eax; ret 0_2_04FFD451
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeCode function: 0_2_0796797A push esp; retf 0_2_07967981
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeMemory allocated: 1090000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeMemory allocated: 2B10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWindow / User API: threadDelayed 1263Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWindow / User API: threadDelayed 1790Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exe TID: 2716Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exe TID: 6020Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1362612231.0000000000EBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1365694259.0000000003F26000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Users\user\Desktop\Bankcopyscanneddoc.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1362665832.0000000000EE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: Bankcopyscanneddoc.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Bankcopyscanneddoc.exe.710000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1250760554.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Bankcopyscanneddoc.exe PID: 6312, type: MEMORYSTR
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumE#
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q5C:\Users\user\AppData\Roaming\Electrum\wallets\*
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: JaxxE#
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.walletLR
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\walletsLR
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ExodusE#
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: qdC:\Users\user\AppData\Roaming\Binance
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: EthereumE#
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q&%localappdata%\Coinomi\Coinomi\walletsLR
                    Source: Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002D83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q9C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                    Source: C:\Users\user\Desktop\Bankcopyscanneddoc.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                    Source: Yara matchFile source: 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1363475474.0000000002D83000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Bankcopyscanneddoc.exe PID: 6312, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: Bankcopyscanneddoc.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.Bankcopyscanneddoc.exe.710000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1250760554.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Bankcopyscanneddoc.exe PID: 6312, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    231
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol3
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                    Virtualization/Sandbox Evasion
                    Security Account Manager241
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets113
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Bankcopyscanneddoc.exe66%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                    Bankcopyscanneddoc.exe80%VirustotalBrowse
                    Bankcopyscanneddoc.exe100%AviraTR/AD.RedLineSteal.iyobn
                    Bankcopyscanneddoc.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%URL Reputationsafe
                    http://tempuri.org/Entity/Id23ResponseD0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%URL Reputationsafe
                    http://tempuri.org/Entity/Id12Response0%URL Reputationsafe
                    http://tempuri.org/0%URL Reputationsafe
                    http://tempuri.org/Entity/Id2Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%URL Reputationsafe
                    http://tempuri.org/Entity/Id21Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%URL Reputationsafe
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%URL Reputationsafe
                    http://tempuri.org/Entity/Id90%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%URL Reputationsafe
                    http://tempuri.org/Entity/Id80%URL Reputationsafe
                    http://tempuri.org/Entity/Id50%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%URL Reputationsafe
                    http://tempuri.org/Entity/Id40%URL Reputationsafe
                    http://tempuri.org/Entity/Id70%URL Reputationsafe
                    http://tempuri.org/Entity/Id60%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%URL Reputationsafe
                    http://tempuri.org/Entity/Id19Response0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%URL Reputationsafe
                    http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%URL Reputationsafe
                    http://tempuri.org/Entity/Id6Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%URL Reputationsafe
                    https://api.ip.sb/ip0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/sc0%URL Reputationsafe
                    http://tempuri.org/Entity/Id1ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%URL Reputationsafe
                    http://tempuri.org/Entity/Id9Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id200%URL Reputationsafe
                    http://tempuri.org/Entity/Id210%URL Reputationsafe
                    http://tempuri.org/Entity/Id220%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%URL Reputationsafe
                    http://tempuri.org/Entity/Id230%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%URL Reputationsafe
                    http://tempuri.org/Entity/Id240%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%URL Reputationsafe
                    http://tempuri.org/Entity/Id24Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id1Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust0%URL Reputationsafe
                    http://tempuri.org/Entity/Id100%URL Reputationsafe
                    http://tempuri.org/Entity/Id110%URL Reputationsafe
                    http://tempuri.org/Entity/Id120%URL Reputationsafe
                    http://tempuri.org/Entity/Id16Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%URL Reputationsafe
                    http://tempuri.org/Entity/Id130%URL Reputationsafe
                    http://tempuri.org/Entity/Id140%URL Reputationsafe
                    http://tempuri.org/Entity/Id150%URL Reputationsafe
                    http://tempuri.org/Entity/Id160%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%URL Reputationsafe
                    http://tempuri.org/Entity/Id170%URL Reputationsafe
                    http://tempuri.org/Entity/Id170%URL Reputationsafe
                    http://tempuri.org/Entity/Id180%URL Reputationsafe
                    http://tempuri.org/Entity/Id5Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id190%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%URL Reputationsafe
                    http://tempuri.org/Entity/Id10Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%URL Reputationsafe
                    http://tempuri.org/Entity/Id8Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentity0%URL Reputationsafe
                    http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA10%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback0%URL Reputationsafe
                    http://tempuri.org/Entity/Id23Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id23Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT0%URL Reputationsafe
                    http://tempuri.org/D0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/06/addressingex0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse0%URL Reputationsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sctBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id23ResponseDBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002F8E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id12ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id2ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id21ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id9Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id8Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id5Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id4Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id7Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id6Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id19ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/faultBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsatBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id6ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ip.sb/ipBankcopyscanneddoc.exefalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/scBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseDBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id9ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id20Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id21Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id22Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id23Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id24Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id24ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressingBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trustBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id10Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id11Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id12Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id16ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id13Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id14Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id16Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/NonceBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id17Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id18Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id5ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id19Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id10ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RenewBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id8ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentityBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/soap/envelope/Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKeyBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trustBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/RollbackBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id3ResponseDBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002F8E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id23ResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, Bankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCTBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/DBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/06/addressingexBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoorBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/NonceBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponseBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/faultBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002B11000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/RenewBankcopyscanneddoc.exe, 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    84.38.129.21
                    unknownLatvia
                    203557DATACLUB-NLtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1482847
                    Start date and time:2024-07-26 09:11:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 3s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:16
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Bankcopyscanneddoc.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@1/1@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 38
                    • Number of non-executed functions: 7
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    03:12:08API Interceptor18x Sleep call for process: Bankcopyscanneddoc.exe modified
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    DATACLUB-NLxCjIO3SCur0S.exeGet hashmaliciousRemcosBrowse
                    • 185.29.11.23
                    new.cmdGet hashmaliciousGuLoaderBrowse
                    • 185.29.11.28
                    temp.cmdGet hashmaliciousUnknownBrowse
                    • 185.29.11.28
                    price_request_.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                    • 185.29.11.62
                    disprovable.dllGet hashmaliciousCryptOne, QbotBrowse
                    • 84.38.133.191
                    BL.xlsGet hashmaliciousLokibotBrowse
                    • 84.38.129.114
                    kej177el6.dllGet hashmaliciousQbotBrowse
                    • 84.38.133.191
                    e0CIQlOSBx.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                    • 84.38.133.134
                    6K9552cWbC.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                    • 84.38.133.134
                    VMefbbeoVM.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                    • 185.29.11.109
                    No context
                    No context
                    Process:C:\Users\user\Desktop\Bankcopyscanneddoc.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):3094
                    Entropy (8bit):5.33145931749415
                    Encrypted:false
                    SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0atTqdqlq7qV
                    MD5:3FD5C0634443FB2EF2796B9636159CB6
                    SHA1:366DDE94AEFCFFFAB8E03AD8B448E05D7489EB48
                    SHA-256:58307E94C67E2348F5A838DE4FF668983B38B7E9A3B1D61535D3A392814A57D6
                    SHA-512:8535E7C0777C6B0876936D84BDE2BDC59963CF0954D4E50D65808E6E806E8B131DF5DB8FA0E030FAE2702143A7C3A70698A2B9A80519C9E2FFC286A71F0B797C
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):5.081282873476631
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    File name:Bankcopyscanneddoc.exe
                    File size:307'712 bytes
                    MD5:901969f80acf800e522c7e2e73840e22
                    SHA1:de89bca939c5674b3afca2eaa34f2e578b3f9c84
                    SHA256:f03d12cadb70aa5f2d93285bf541f8a02e4fe24c574d7eb5062c693cfb6fc076
                    SHA512:12879e31390b6a4c074fefdaff426efb43b82e478de9d29aed1e0a1a5e6e1bfe1987789274c178b2f44be5951cac7b77845c4532783acafb753849a440b71ab5
                    SSDEEP:3072:+cZqf7D34xp/0+mAQkygx9QEgJ/B1fA0PuTVAtkxzx3RQeqiOL2bBOA:+cZqf7DIjnH6lB1fA0GTV8kXwL
                    TLSH:4A645B5833E8C910DA7F4775D861D67093B0BCA3A552E70B4FC4ACAB3D32740EA51AB6
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H(...............0.................. ... ....@.. ....................... ............@................................
                    Icon Hash:4d8ea38d85a38e6d
                    Entrypoint:0x43028e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0xD22848DC [Tue Sep 23 12:17:32 2081 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x302380x53.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x1c9c6.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x500000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x2e2940x2e40072d90635ff7e01a48350fdd4c42b5460False0.4747730152027027data6.186205546769274IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0x320000x1c9c60x1ca00a8cf3f8ff27a4a736ba8fb433d91107fFalse0.2380765556768559data2.615031395625776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x500000xc0x20021472a05bd31cf3b960b3bcc0808216bFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x322200x3d04PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9934058898847631
                    RT_ICON0x35f240x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.09013072282030049
                    RT_ICON0x4674c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.13905290505432216
                    RT_ICON0x4a9740x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.17033195020746889
                    RT_ICON0x4cf1c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.2045028142589118
                    RT_ICON0x4dfc40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.24645390070921985
                    RT_GROUP_ICON0x4e42c0x5adata0.7666666666666667
                    RT_VERSION0x4e4880x352data0.4447058823529412
                    RT_MANIFEST0x4e7dc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                    2024-07-26T09:12:08.384450+0200TCP2046056ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)19124969984.38.129.21192.168.2.7
                    2024-07-26T09:12:08.206533+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity496991912192.168.2.784.38.129.21
                    2024-07-26T09:12:20.036450+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970113.85.23.86192.168.2.7
                    2024-07-26T09:12:02.655038+0200TCP2046045ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)496991912192.168.2.784.38.129.21
                    2024-07-26T09:12:11.875496+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity496991912192.168.2.784.38.129.21
                    2024-07-26T09:12:02.830260+0200TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response19124969984.38.129.21192.168.2.7
                    2024-07-26T09:12:58.931591+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970513.85.23.86192.168.2.7
                    2024-07-26T09:12:11.660867+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity496991912192.168.2.784.38.129.21
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 26, 2024 09:12:01.652684927 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:01.657685995 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:01.657808065 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:01.666865110 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:01.671979904 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:02.284023046 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:02.327039957 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:02.655038118 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:02.660070896 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:02.830260038 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:02.873908043 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:08.206532955 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:08.211838007 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:08.384136915 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:08.384185076 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:08.384196997 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:08.384282112 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:08.384284019 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:08.384377003 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:08.384449959 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:08.384460926 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:08.384572029 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.796834946 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.803107023 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.803210974 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.803236008 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.803265095 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.803280115 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.803288937 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.803309917 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.803318024 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.803339958 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.803356886 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.803549051 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.803637981 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.803675890 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.803680897 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.803689957 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.803738117 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.810000896 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.810024023 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.810082912 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.810127020 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.810137033 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.810153961 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.810164928 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.810187101 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.810194016 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.810205936 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.810235977 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.810425997 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.810519934 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.810909986 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.810986996 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.816042900 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.816098928 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.816337109 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.816395998 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.816462994 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.816504002 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.816530943 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.816560030 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.817903996 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.817960978 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.818147898 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.818205118 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.818223953 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.818279982 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.818281889 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.818331003 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.818367004 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.818447113 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.821445942 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821460009 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821472883 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821485996 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821496010 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821508884 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821510077 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.821521044 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821527958 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821537971 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.821542025 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821553946 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821563959 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821574926 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821607113 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821619034 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821625948 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.821755886 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.822815895 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822825909 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822873116 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822890997 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822901011 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822915077 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.822916985 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822926998 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822941065 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822943926 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.822961092 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822967052 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.822971106 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822983980 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.822997093 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.823008060 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.823015928 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.823030949 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.823031902 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.823038101 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.823054075 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.823060989 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.823076010 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.823096037 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.823102951 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.829910040 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.829988956 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.829993010 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830192089 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830200911 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830216885 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830228090 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830240965 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830248117 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830271959 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830285072 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830298901 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830324888 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830337048 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830427885 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830440044 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830457926 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830466032 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830490112 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830502987 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830560923 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830569983 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830648899 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830702066 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830782890 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830815077 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830836058 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830879927 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830982924 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.830991983 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831008911 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831011057 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.831020117 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831101894 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.831114054 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831125975 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831351995 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831366062 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831381083 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831393003 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831410885 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831425905 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831552982 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831576109 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831744909 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831758976 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831851006 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831862926 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831959963 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.831971884 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832010031 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832021952 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832072973 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832086086 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832097054 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832117081 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832130909 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832206964 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832272053 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832283974 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832350969 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832434893 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832447052 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832470894 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832530975 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832540035 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832591057 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832602024 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832667112 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832679987 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832899094 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832911968 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832957983 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.832972050 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.833017111 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.833029032 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.833055973 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.833065033 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.833100080 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.833381891 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.833453894 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.836144924 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836220026 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836335897 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836344957 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836359024 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836368084 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836544991 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836555004 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836569071 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836579084 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836592913 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836611986 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836620092 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836636066 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836803913 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836812973 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836828947 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836837053 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836863041 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836874008 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836886883 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836896896 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.836947918 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837217093 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837225914 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837246895 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837253094 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837255001 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837259054 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837275028 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837285042 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837297916 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837320089 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837330103 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837342978 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837351084 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837366104 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837440968 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837452888 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837464094 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837477922 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837488890 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837587118 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837596893 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837614059 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.837622881 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838474035 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838486910 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838499069 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838512897 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838522911 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838535070 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838550091 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838551998 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838553905 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838726997 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838736057 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838754892 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838767052 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838778973 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838788986 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838792086 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.838845968 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838850975 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.838860035 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838875055 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838882923 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838907957 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838916063 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.838965893 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839030027 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839041948 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839056015 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839097977 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839109898 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839157104 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839215040 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839226961 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839632034 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839641094 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839644909 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839648008 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839652061 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839654922 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839658022 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839660883 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839664936 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839874983 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839888096 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839901924 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839912891 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839924097 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839939117 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839951992 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839961052 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839973927 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.839987993 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841525078 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841536999 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841551065 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841558933 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841576099 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841586113 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841598988 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841609001 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841624975 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841635942 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.841667891 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844469070 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844477892 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844568968 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844578028 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844594002 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844610929 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844624043 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844717979 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.844719887 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844734907 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844750881 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844763041 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844794035 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.844808102 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.844824076 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845254898 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845263958 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845277071 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845284939 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845298052 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845309019 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845381975 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845392942 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845400095 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845411062 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845433950 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845444918 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845453024 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845467091 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845474005 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845485926 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845496893 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845509052 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845518112 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845531940 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845539093 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845554113 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845561981 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845577955 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845607996 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845608950 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845612049 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845823050 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845833063 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845848083 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845855951 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845870018 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845876932 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845889091 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845896006 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845910072 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845935106 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845946074 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.845952988 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.846194983 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852437973 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852458000 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852466106 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852492094 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852499962 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852505922 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852525949 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852718115 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852725983 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852740049 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852757931 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852767944 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852780104 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852858067 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852936029 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852947950 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852988005 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.852998972 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853044033 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853055954 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853101015 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853111982 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853172064 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853182077 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853199005 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853276014 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853286982 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853318930 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853332996 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853369951 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853389978 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.853450060 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854337931 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854389906 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854454994 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854473114 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854491949 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854537010 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854563951 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854600906 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854691029 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854705095 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854716063 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854914904 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854928017 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854938984 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854953051 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.854960918 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.855319977 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.855329037 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.855344057 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.855359077 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.855366945 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.857420921 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.857486963 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.862359047 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862369061 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862488985 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862495899 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862509012 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862518072 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862565994 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862574100 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862601995 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862610102 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862673998 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862685919 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862709045 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862720966 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862771988 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.862792015 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862804890 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862840891 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.862860918 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.862873077 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864384890 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864393950 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864411116 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864418983 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864434958 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864443064 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864459991 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864470959 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864485979 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864507914 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864514112 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864527941 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864535093 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864548922 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864557981 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864568949 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.864576101 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.895570040 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.895790100 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.895873070 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.895873070 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.895936012 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.900923967 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901062965 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901221991 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901253939 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901349068 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901362896 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901416063 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901427031 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901470900 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901484013 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901526928 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901537895 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901619911 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901628017 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901873112 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901886940 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901958942 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.901968002 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.902048111 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.902060986 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.902105093 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.902112961 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.902198076 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.902206898 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.902241945 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.902251005 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.930143118 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.930313110 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:10.935456038 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.935472012 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.935570002 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.935581923 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.935607910 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.935653925 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.935705900 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.935714006 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.935774088 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.935801983 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:10.935900927 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:11.660139084 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:11.660866976 CEST496991912192.168.2.784.38.129.21
                    Jul 26, 2024 09:12:11.666783094 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:11.838006973 CEST19124969984.38.129.21192.168.2.7
                    Jul 26, 2024 09:12:11.875495911 CEST496991912192.168.2.784.38.129.21

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:03:12:00
                    Start date:26/07/2024
                    Path:C:\Users\user\Desktop\Bankcopyscanneddoc.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\Bankcopyscanneddoc.exe"
                    Imagebase:0x710000
                    File size:307'712 bytes
                    MD5 hash:901969F80ACF800E522C7E2E73840E22
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.1250760554.0000000000712000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1363475474.0000000002BA6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1363475474.0000000002D83000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:12.6%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:150
                      Total number of Limit Nodes:14
                      execution_graph 34198 1094668 34199 1094684 34198->34199 34200 1094696 34199->34200 34204 10947a0 34199->34204 34209 1093e10 34200->34209 34202 10946b5 34205 10947c5 34204->34205 34213 10948b0 34205->34213 34217 10948a1 34205->34217 34210 1093e1b 34209->34210 34225 1095c54 34210->34225 34212 1096ff0 34212->34202 34215 10948d7 34213->34215 34214 10949b4 34214->34214 34215->34214 34221 1094248 34215->34221 34219 10948b0 34217->34219 34218 10949b4 34218->34218 34219->34218 34220 1094248 CreateActCtxA 34219->34220 34220->34218 34222 1095940 CreateActCtxA 34221->34222 34224 1095a03 34222->34224 34226 1095c5f 34225->34226 34229 1095c64 34226->34229 34228 109709d 34228->34212 34230 1095c6f 34229->34230 34233 1095c94 34230->34233 34232 109717a 34232->34228 34234 1095c9f 34233->34234 34237 1095cc4 34234->34237 34236 109726d 34236->34232 34239 1095ccf 34237->34239 34238 1098691 34238->34236 34239->34238 34241 109cdf0 34239->34241 34242 109ce11 34241->34242 34243 109ce35 34242->34243 34245 109cfa0 34242->34245 34243->34238 34247 109cfad 34245->34247 34246 109cfe7 34246->34243 34247->34246 34249 109c8d8 34247->34249 34250 109c8dd 34249->34250 34252 109d8f8 34250->34252 34253 109ca04 34250->34253 34252->34252 34254 109ca0f 34253->34254 34255 1095cc4 CreateWindowExW 34254->34255 34256 109d967 34255->34256 34260 109f6c8 34256->34260 34266 109f6e0 34256->34266 34257 109d9a1 34257->34252 34262 109f711 34260->34262 34263 109f811 34260->34263 34261 109f71d 34261->34257 34262->34261 34264 4ff0dc8 CreateWindowExW 34262->34264 34265 4ff0db8 CreateWindowExW 34262->34265 34263->34257 34264->34263 34265->34263 34268 109f811 34266->34268 34269 109f711 34266->34269 34267 109f71d 34267->34257 34268->34257 34269->34267 34270 4ff0dc8 CreateWindowExW 34269->34270 34271 4ff0db8 CreateWindowExW 34269->34271 34270->34268 34271->34268 34272 109ad38 34273 109ad47 34272->34273 34276 109ae20 34272->34276 34284 109ae30 34272->34284 34277 109ae41 34276->34277 34278 109ae64 34276->34278 34277->34278 34292 109b0b8 34277->34292 34296 109b0c8 34277->34296 34278->34273 34279 109ae5c 34279->34278 34280 109b068 GetModuleHandleW 34279->34280 34281 109b095 34280->34281 34281->34273 34285 109ae41 34284->34285 34286 109ae64 34284->34286 34285->34286 34290 109b0b8 LoadLibraryExW 34285->34290 34291 109b0c8 LoadLibraryExW 34285->34291 34286->34273 34287 109ae5c 34287->34286 34288 109b068 GetModuleHandleW 34287->34288 34289 109b095 34288->34289 34289->34273 34290->34287 34291->34287 34293 109b0dc 34292->34293 34294 109b101 34293->34294 34300 109a870 34293->34300 34294->34279 34297 109b0dc 34296->34297 34298 109b101 34297->34298 34299 109a870 LoadLibraryExW 34297->34299 34298->34279 34299->34298 34301 109b2a8 LoadLibraryExW 34300->34301 34303 109b321 34301->34303 34303->34294 34304 109d0b8 34305 109d0fe 34304->34305 34309 109d289 34305->34309 34312 109d298 34305->34312 34306 109d1eb 34315 109c9a0 34309->34315 34313 109d2c6 34312->34313 34314 109c9a0 DuplicateHandle 34312->34314 34313->34306 34314->34313 34316 109d300 DuplicateHandle 34315->34316 34317 109d2c6 34316->34317 34317->34306 34129 7968ac0 34130 7968c4b 34129->34130 34131 7968ae6 34129->34131 34131->34130 34133 7967d10 34131->34133 34134 7968d40 PostMessageW 34133->34134 34135 7968dac 34134->34135 34135->34131 34136 104d01c 34137 104d034 34136->34137 34138 104d08e 34137->34138 34143 4ff1ea8 34137->34143 34147 4ff0ad4 34137->34147 34156 4ff2c08 34137->34156 34165 4ff1e98 34137->34165 34144 4ff1ece 34143->34144 34145 4ff0ad4 CallWindowProcW 34144->34145 34146 4ff1eef 34145->34146 34146->34138 34148 4ff0adf 34147->34148 34149 4ff2c79 34148->34149 34151 4ff2c69 34148->34151 34185 4ff0bfc 34149->34185 34169 4ff2e6c 34151->34169 34175 4ff2d90 34151->34175 34180 4ff2da0 34151->34180 34152 4ff2c77 34152->34152 34159 4ff2c45 34156->34159 34157 4ff2c79 34158 4ff0bfc CallWindowProcW 34157->34158 34161 4ff2c77 34158->34161 34159->34157 34160 4ff2c69 34159->34160 34162 4ff2e6c CallWindowProcW 34160->34162 34163 4ff2da0 CallWindowProcW 34160->34163 34164 4ff2d90 CallWindowProcW 34160->34164 34161->34161 34162->34161 34163->34161 34164->34161 34166 4ff1ece 34165->34166 34167 4ff0ad4 CallWindowProcW 34166->34167 34168 4ff1eef 34167->34168 34168->34138 34170 4ff2e2a 34169->34170 34171 4ff2e7a 34169->34171 34189 4ff2e58 34170->34189 34192 4ff2e48 34170->34192 34172 4ff2e40 34172->34152 34177 4ff2db4 34175->34177 34176 4ff2e40 34176->34152 34178 4ff2e58 CallWindowProcW 34177->34178 34179 4ff2e48 CallWindowProcW 34177->34179 34178->34176 34179->34176 34182 4ff2db4 34180->34182 34181 4ff2e40 34181->34152 34183 4ff2e58 CallWindowProcW 34182->34183 34184 4ff2e48 CallWindowProcW 34182->34184 34183->34181 34184->34181 34186 4ff0c07 34185->34186 34187 4ff435a CallWindowProcW 34186->34187 34188 4ff4309 34186->34188 34187->34188 34188->34152 34190 4ff2e69 34189->34190 34195 4ff429e 34189->34195 34190->34172 34193 4ff2e69 34192->34193 34194 4ff429e CallWindowProcW 34192->34194 34193->34172 34194->34193 34196 4ff0bfc CallWindowProcW 34195->34196 34197 4ff42aa 34196->34197 34197->34190

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 294 7964b00-7964b20 295 7964b27-7964c1c 294->295 296 7964b22 294->296 305 7964c23-7964c51 295->305 306 7964c1e 295->306 296->295 308 7964ff9-7965002 305->308 306->305 309 7964c56-7964c5f 308->309 310 7965008-796508a 308->310 311 7964c66-7964d80 call 7960974 309->311 312 7964c61 309->312 324 7965091-79650bf 310->324 325 796508c 310->325 348 7964f23-7964f29 311->348 312->311 329 796547c-7965485 324->329 325->324 330 79650c4-79650cd 329->330 331 796548b-79654bb 329->331 333 79650d4-79651b3 call 7960974 330->333 334 79650cf 330->334 369 79651ba-79651ee 333->369 334->333 349 7964f30-7964f37 348->349 351 7964d85-7964e1d 349->351 352 7964f3d-7964f5a 349->352 372 7964e1f-7964e37 351->372 373 7964e39 351->373 355 7964f5c-7964f68 352->355 356 7964f69-7964f6a 352->356 355->356 356->308 374 79653a3-79653b7 369->374 375 7964e3f-7964e60 372->375 373->375 378 79651f3-7965291 374->378 379 79653bd-79653da 374->379 380 7964e66-7964ee1 375->380 381 7964f12-7964f22 375->381 401 7965293-79652ab 378->401 402 79652ad 378->402 385 79653dc-79653e8 379->385 386 79653e9 379->386 397 7964ee3-7964efb 380->397 398 7964efd 380->398 381->348 385->386 386->329 400 7964f03-7964f11 397->400 398->400 400->381 403 79652b3-79652d4 401->403 402->403 406 796538f-79653a2 403->406 407 79652da-796535e 403->407 406->374 414 7965360-7965378 407->414 415 796537a 407->415 416 7965380-796538e 414->416 415->416 416->406
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID: $q$$q$$q$$q
                      • API String ID: 0-4102054182
                      • Opcode ID: 7bb4b0a9562c84d97202c35bade307d84785be1e5332427dfa578e08139fd68d
                      • Instruction ID: 5542c727d2c2f1e6b6bab0f60af7599cc2bf0fa2935b41ad78058ffcf516ec43
                      • Opcode Fuzzy Hash: 7bb4b0a9562c84d97202c35bade307d84785be1e5332427dfa578e08139fd68d
                      • Instruction Fuzzy Hash: E332B174E01228CFDB68DF64C995BDEBBB2BB89300F1085E9D509AB254DB359E81CF44

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 476 79615a0-79615c8 478 79615cf-79616d5 476->478 479 79615ca 476->479 494 79616d7-79616de 478->494 495 79616e3-79617c8 478->495 479->478 496 7961a17-7961a20 494->496 508 79619cf-79619d8 495->508 509 79619df-79619f5 508->509 510 79617cd-79619b9 509->510 511 79619fb-7961a15 509->511 536 79619cb-79619cc 510->536 537 79619bb-79619ca 510->537 511->496 536->508 537->536
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID: .$1
                      • API String ID: 0-1839485796
                      • Opcode ID: 2c1c45bcc5cbea19754d20dafac814ae853bffe7d946d652127f081ec9e2157e
                      • Instruction ID: 63a04690fbf7634ed040b6ba38e3808776026f3c1ca0f2d768ed22e9b1a2a11c
                      • Opcode Fuzzy Hash: 2c1c45bcc5cbea19754d20dafac814ae853bffe7d946d652127f081ec9e2157e
                      • Instruction Fuzzy Hash: 1BD1B274E01218CFDB68DFA5C980BDDB7B2BF89304F6085AAD409AB254DB359E85CF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1368743870.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ff0000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,7q
                      • API String ID: 0-3839523172
                      • Opcode ID: b609d8b56a5023a35cefd46cb6f03bb28aa2b08982dbb132e524165f4453da44
                      • Instruction ID: 35fdcf2ecc017c359ddd72e8b301df8585574d366721451b7f057e93abed921e
                      • Opcode Fuzzy Hash: b609d8b56a5023a35cefd46cb6f03bb28aa2b08982dbb132e524165f4453da44
                      • Instruction Fuzzy Hash: 1D92B374B503058FEB249BB8D8A576E7AF3EFC8240B644429E506DB395DE74EC02CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1016 7962718-7962743 1017 7962745 1016->1017 1018 796274a-79627f3 1016->1018 1017->1018 1023 79627f5-796283f 1018->1023 1024 7962842-796287a 1018->1024 1023->1024 1029 7963061-7963074 1024->1029 1032 796287f-79629e6 1029->1032 1033 796307a-79630a0 1029->1033 1055 79629f1-7962a00 1032->1055 1036 79630a2-79630ae 1033->1036 1037 79630af 1033->1037 1036->1037 1040 79630b0 1037->1040 1040->1040 1056 7962a08-7962a36 1055->1056 1058 7963019-7963033 1056->1058 1060 7962a3b-7962b3e 1058->1060 1061 7963039-796305d 1058->1061 1074 7962b40-7962b9a 1060->1074 1075 7962b9f-7962c14 1060->1075 1061->1029 1084 7962c55-7962c7a 1074->1084 1087 7962c36-7962c42 1075->1087 1088 7962c16-7962c34 1075->1088 1089 7962c80-7962d36 1084->1089 1090 7962ffc-7963018 1084->1090 1094 7962c48-7962c54 1087->1094 1088->1094 1102 7962d3c-7962d60 1089->1102 1103 7962ffb 1089->1103 1090->1058 1094->1084 1105 7962fac-7962fc5 1102->1105 1103->1090 1107 7962d65-7962dde 1105->1107 1108 7962fcb-7962fe8 1105->1108 1117 7962de5-7962fab 1107->1117 1118 7962de0 1107->1118 1110 7962ff7 1108->1110 1111 7962fea-7962ff6 1108->1111 1110->1103 1111->1110 1117->1105 1118->1117
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID: s(
                      • API String ID: 0-3583383123
                      • Opcode ID: 1063b9cce8743f82940675a883b03523afcaef021364808ec8db3448a0755d55
                      • Instruction ID: 20f5f0d7bcec11e41ece4235a543001da976335382bfdcba853d85425b8de426
                      • Opcode Fuzzy Hash: 1063b9cce8743f82940675a883b03523afcaef021364808ec8db3448a0755d55
                      • Instruction Fuzzy Hash: 6242CF74E012298FDB64DF64C994BEEBBB2BF89300F5085E9D40AAB254DB315E85CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID: $q
                      • API String ID: 0-1301096350
                      • Opcode ID: 0a6d7ea74c9ef4bc6b1cff42184187817aa1b8f6537c910c6f7a6ed464f94d5e
                      • Instruction ID: 1873358621ac22b5de8ea409183f6db20d5758ae994b62ca017c8b8610b76433
                      • Opcode Fuzzy Hash: 0a6d7ea74c9ef4bc6b1cff42184187817aa1b8f6537c910c6f7a6ed464f94d5e
                      • Instruction Fuzzy Hash: F771D2B4E01218DFDF28DFA5D594AADBBB2FF89304F609529D415AB354DB349841CF40
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 412d66ac3afc8e871da0cc7008e6da89ad30b1466addd41c60dd06eb7fd55568
                      • Instruction ID: b279f302dba9d13e89421283a6e232f95daebf2f17f3d4dbbff49b2271e17217
                      • Opcode Fuzzy Hash: 412d66ac3afc8e871da0cc7008e6da89ad30b1466addd41c60dd06eb7fd55568
                      • Instruction Fuzzy Hash: 7F226B74E012288FDB64DF68C995BDDBBB2BB49300F1085EAD549AB350DB319E85CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3083a0e55caaafa4ef8ec3e6a5374127fcd0aa015247af24aed481ef62394f5b
                      • Instruction ID: 4335a746d5f19262a7f99ffb7e88f2b133ca13370463bc1a00f8c4408ec587d8
                      • Opcode Fuzzy Hash: 3083a0e55caaafa4ef8ec3e6a5374127fcd0aa015247af24aed481ef62394f5b
                      • Instruction Fuzzy Hash: FF02C074A01229CFDB68DF64C994B9DBBB2BF89300F1085E9D409AB354DB31AE81CF54
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 54216c201c6756cf74d1294c0f696d8133fb974ab36cc06b8a9ec348c001a9d5
                      • Instruction ID: dac017d93032994626716afca5118253f6a45910f224173fb07e79ba54aaf8f5
                      • Opcode Fuzzy Hash: 54216c201c6756cf74d1294c0f696d8133fb974ab36cc06b8a9ec348c001a9d5
                      • Instruction Fuzzy Hash: F5C19CB17006018FDB25EB76C4687AE77EAAFC9714F10456DE186DB290DF35E801CB62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d0f77c7098240e787cb7a6185635681e925afa506adea663e61def7a01e635e8
                      • Instruction ID: 6bbb0f7b8b9b7478252cc0002c3fa09656bd9e5b1fc04264f13157b0fbf344d3
                      • Opcode Fuzzy Hash: d0f77c7098240e787cb7a6185635681e925afa506adea663e61def7a01e635e8
                      • Instruction Fuzzy Hash: 52F1B074A01228CFDB28DF64C991B9EBBB2BF89304F5085E9D509AB354DB319E81CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 718aea3ffc78046e0629a3dd6918ad2399e25daa5e6f12ea25f954ea11492ddf
                      • Instruction ID: c385569a4ab7609ee626f15ad667e54c0c5caf1a9d2436c55129bad5ce0eea41
                      • Opcode Fuzzy Hash: 718aea3ffc78046e0629a3dd6918ad2399e25daa5e6f12ea25f954ea11492ddf
                      • Instruction Fuzzy Hash: 5FE1D374E00229CFDB68DF65C994BEDBBB2BF89300F5085AAD40AA7254DB305E85CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1368743870.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ff0000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: acb7828d112c3e979ccff01a515388c87783a85729923cf04e2f9b1a000bb40e
                      • Instruction ID: d77023c12359731e665152ad2474a67aa8698644327f133de61b8b92c558df25
                      • Opcode Fuzzy Hash: acb7828d112c3e979ccff01a515388c87783a85729923cf04e2f9b1a000bb40e
                      • Instruction Fuzzy Hash: 3FD1E674A10318CFCB14EFB4D99469DBBB2FF8A301F1085A9E40AAB254DF359986CF51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1368743870.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ff0000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bbe3d928a140080df4cbe8f9915ee3ab2fb8c49193995a7f7d45a1369ebb18f8
                      • Instruction ID: bcee20c3bbc4a5ef1ada0df720d1701c1435518139e7081fb765e931b8bbb637
                      • Opcode Fuzzy Hash: bbe3d928a140080df4cbe8f9915ee3ab2fb8c49193995a7f7d45a1369ebb18f8
                      • Instruction Fuzzy Hash: 1CD1E674A10318CFCB14EFB4D99469DBBB2FF8A301F1085A9E40AAB254DF359986CF51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 63d5b69c6b002b76b75180dd347e434aced5b7261152b7db291e9fdc6d30ada9
                      • Instruction ID: 2f54a39a5078e7bc377e2e702fcf600b62f1660b58be4aefeede288c31fcb87f
                      • Opcode Fuzzy Hash: 63d5b69c6b002b76b75180dd347e434aced5b7261152b7db291e9fdc6d30ada9
                      • Instruction Fuzzy Hash: D5D1B1B4E01218CFDB64DFA5C898B9DBBB2BF89304F1085A9D409AB354DB359D85CF10
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 058bcd60c7f253eacef765d7de8bf161cbb1f3af7b8a3c11bdbc1a8e4051eec9
                      • Instruction ID: f0fa45901addf992edff79a77674028d6fd9be0f529876eec6be0d757237debe
                      • Opcode Fuzzy Hash: 058bcd60c7f253eacef765d7de8bf161cbb1f3af7b8a3c11bdbc1a8e4051eec9
                      • Instruction Fuzzy Hash: 1CC1D2B0D01219CFEB24DFA5C994BEDBBB6BF89304F1085AAD409AB250DB345E85CF51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0737b50f975eb48062f4a0bf4ea7e7144d5f9371ca1a11afcb22782aebafc272
                      • Instruction ID: 74544b0853d017c886ebb653b4f788ea20e957266f7ff105b603c89379435215
                      • Opcode Fuzzy Hash: 0737b50f975eb48062f4a0bf4ea7e7144d5f9371ca1a11afcb22782aebafc272
                      • Instruction Fuzzy Hash: FFB1C774E01228CFDB68DF65C994B9DBBB2BF89300F1085AAD409AB355DB309E85CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9a6ff0922250eaedbe5a3d37a9d8c39c4b438752e5d016806c2569ff05ea122c
                      • Instruction ID: 56f80ebe8c9b4bdac7821a336795156bc05b5d3d6ac8d5610f4b50e055d51bcb
                      • Opcode Fuzzy Hash: 9a6ff0922250eaedbe5a3d37a9d8c39c4b438752e5d016806c2569ff05ea122c
                      • Instruction Fuzzy Hash: 20A1C574E01228CFEB28DFA5D950B9EBBB2BF88300F5085AAD5096B354DB315E85CF51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cbb01b32d2c39dd3509a6c505a0b40ea71339072ed77d4eda23f993857a8ef27
                      • Instruction ID: 67e36d4a8283d4f99b50c532fddd878347fa482d902bf7e847e5d11ba4f3a4b5
                      • Opcode Fuzzy Hash: cbb01b32d2c39dd3509a6c505a0b40ea71339072ed77d4eda23f993857a8ef27
                      • Instruction Fuzzy Hash: 983118B1D016189BEB28CFA6C8447DEFBB7AF89304F10C56AC808AB255DB714A85CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1139 109ae30-109ae3f 1140 109ae6b-109ae6f 1139->1140 1141 109ae41-109ae4e call 1099838 1139->1141 1142 109ae71-109ae7b 1140->1142 1143 109ae83-109aec4 1140->1143 1148 109ae50 1141->1148 1149 109ae64 1141->1149 1142->1143 1150 109aed1-109aedf 1143->1150 1151 109aec6-109aece 1143->1151 1196 109ae56 call 109b0b8 1148->1196 1197 109ae56 call 109b0c8 1148->1197 1149->1140 1153 109aee1-109aee6 1150->1153 1154 109af03-109af05 1150->1154 1151->1150 1152 109ae5c-109ae5e 1152->1149 1155 109afa0-109afb7 1152->1155 1157 109aee8-109aeef call 109a814 1153->1157 1158 109aef1 1153->1158 1156 109af08-109af0f 1154->1156 1170 109afb9-109b018 1155->1170 1159 109af1c-109af23 1156->1159 1160 109af11-109af19 1156->1160 1161 109aef3-109af01 1157->1161 1158->1161 1164 109af30-109af39 call 109a824 1159->1164 1165 109af25-109af2d 1159->1165 1160->1159 1161->1156 1171 109af3b-109af43 1164->1171 1172 109af46-109af4b 1164->1172 1165->1164 1190 109b01a-109b060 1170->1190 1171->1172 1173 109af69-109af76 1172->1173 1174 109af4d-109af54 1172->1174 1180 109af99-109af9f 1173->1180 1181 109af78-109af96 1173->1181 1174->1173 1176 109af56-109af66 call 109a834 call 109a844 1174->1176 1176->1173 1181->1180 1191 109b068-109b093 GetModuleHandleW 1190->1191 1192 109b062-109b065 1190->1192 1193 109b09c-109b0b0 1191->1193 1194 109b095-109b09b 1191->1194 1192->1191 1194->1193 1196->1152 1197->1152
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0109B086
                      Memory Dump Source
                      • Source File: 00000000.00000002.1363035199.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1090000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: e9e532a6dc430d11009784ee1cb76a0147ea13f27f27d919c071cdc394fbdce9
                      • Instruction ID: afe5a9b390a1585e4620d3fc4257066f30269ba3533381b3f792414d272051f8
                      • Opcode Fuzzy Hash: e9e532a6dc430d11009784ee1cb76a0147ea13f27f27d919c071cdc394fbdce9
                      • Instruction Fuzzy Hash: 9B7138B0A00B05CFEB64DF69D16479ABBF1FF88204F00892DD49ADBA50D775E846CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1198 4ff1ce4-4ff1d56 1200 4ff1d58-4ff1d5e 1198->1200 1201 4ff1d61-4ff1d68 1198->1201 1200->1201 1202 4ff1d6a-4ff1d70 1201->1202 1203 4ff1d73-4ff1dab 1201->1203 1202->1203 1204 4ff1db3-4ff1e12 CreateWindowExW 1203->1204 1205 4ff1e1b-4ff1e53 1204->1205 1206 4ff1e14-4ff1e1a 1204->1206 1210 4ff1e55-4ff1e58 1205->1210 1211 4ff1e60 1205->1211 1206->1205 1210->1211 1212 4ff1e61 1211->1212 1212->1212
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04FF1E02
                      Memory Dump Source
                      • Source File: 00000000.00000002.1368743870.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ff0000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 9060df34c965043ef8660ed6478c4872ed682e278f896b70844a35d5f867d73d
                      • Instruction ID: 08297205bdcaffd13293dd8a5006b902eb4f239b0fd55624e5b125fe4269c792
                      • Opcode Fuzzy Hash: 9060df34c965043ef8660ed6478c4872ed682e278f896b70844a35d5f867d73d
                      • Instruction Fuzzy Hash: 9851D0B1D00319DFDB14CFA9C984ADEBBB5BF48310F24822AE818AB210D771A845CF94

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1213 4ff0aa8-4ff1d56 1215 4ff1d58-4ff1d5e 1213->1215 1216 4ff1d61-4ff1d68 1213->1216 1215->1216 1217 4ff1d6a-4ff1d70 1216->1217 1218 4ff1d73-4ff1e12 CreateWindowExW 1216->1218 1217->1218 1220 4ff1e1b-4ff1e53 1218->1220 1221 4ff1e14-4ff1e1a 1218->1221 1225 4ff1e55-4ff1e58 1220->1225 1226 4ff1e60 1220->1226 1221->1220 1225->1226 1227 4ff1e61 1226->1227 1227->1227
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04FF1E02
                      Memory Dump Source
                      • Source File: 00000000.00000002.1368743870.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ff0000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 38ded6587617d390c22daf92d7f509eb08269a82f2e92d81d7a6486c46a0295f
                      • Instruction ID: 7c4a0a244527a5f2166af6fee2c7d93580440c2a9fb8d068330f5510b4542a23
                      • Opcode Fuzzy Hash: 38ded6587617d390c22daf92d7f509eb08269a82f2e92d81d7a6486c46a0295f
                      • Instruction Fuzzy Hash: AD51C0B1D00319DFDB14CF9AC984ADEBBF5BF48310F24812AE919AB210D775A845CF94

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1228 1095935-109593b 1229 1095944-1095a01 CreateActCtxA 1228->1229 1231 1095a0a-1095a64 1229->1231 1232 1095a03-1095a09 1229->1232 1239 1095a73-1095a77 1231->1239 1240 1095a66-1095a69 1231->1240 1232->1231 1241 1095a79-1095a85 1239->1241 1242 1095a88 1239->1242 1240->1239 1241->1242 1244 1095a89 1242->1244 1244->1244
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 010959F1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1363035199.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1090000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: fdafc7286f99d7286bf3df9cf69a25f137388068104a26e6437d1eb27934406e
                      • Instruction ID: 186931406d48fdaabd9341f01a327ff6b9531bcc809e2d893732cddcbc5516c6
                      • Opcode Fuzzy Hash: fdafc7286f99d7286bf3df9cf69a25f137388068104a26e6437d1eb27934406e
                      • Instruction Fuzzy Hash: 6B41EEB0D00729CFEB24CFAAC88478DBBF5BF48304F20816AD418AB251DB756946CF94

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1245 4ff0bfc-4ff42fc 1248 4ff43ac-4ff43cc call 4ff0ad4 1245->1248 1249 4ff4302-4ff4307 1245->1249 1256 4ff43cf-4ff43dc 1248->1256 1251 4ff435a-4ff4392 CallWindowProcW 1249->1251 1252 4ff4309-4ff4340 1249->1252 1253 4ff439b-4ff43aa 1251->1253 1254 4ff4394-4ff439a 1251->1254 1258 4ff4349-4ff4358 1252->1258 1259 4ff4342-4ff4348 1252->1259 1253->1256 1254->1253 1258->1256 1259->1258
                      APIs
                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 04FF4381
                      Memory Dump Source
                      • Source File: 00000000.00000002.1368743870.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ff0000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: cc127073fb0a524c13477555f4b684ffe8fc473ed8c8efc4f007b2cd103665fd
                      • Instruction ID: 0f6f2d3dc36289f6e308f3519b23840b642f0e8a4edcfd5b4fdc1a01ec815153
                      • Opcode Fuzzy Hash: cc127073fb0a524c13477555f4b684ffe8fc473ed8c8efc4f007b2cd103665fd
                      • Instruction Fuzzy Hash: F2413BB5A00309DFDB14CF95C848AABBBF5FF88314F248559D519AB321D375A841CFA1
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 010959F1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1363035199.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1090000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 3cc08aa50cc824fc031735f09b77164bbf97dde0040a17e8ae96c4b0964a3585
                      • Instruction ID: aec7edb6599c7079daf8f310d169007d37a8acbd7f1639c0437cd2260c37b643
                      • Opcode Fuzzy Hash: 3cc08aa50cc824fc031735f09b77164bbf97dde0040a17e8ae96c4b0964a3585
                      • Instruction Fuzzy Hash: EE41C170D00718CFEB25CFAAC884B9DBBF5BF49304F20816AD409AB255DB756946CF94
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0109D2C6,?,?,?,?,?), ref: 0109D387
                      Memory Dump Source
                      • Source File: 00000000.00000002.1363035199.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1090000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: ba287f94b466be0a4dd1637af2bd9d27e181305db6990741b86db64198717df6
                      • Instruction ID: caaff716893907ea7a25ae8c1af4b6ac81fad26992d7dca348ae13f12e3b5785
                      • Opcode Fuzzy Hash: ba287f94b466be0a4dd1637af2bd9d27e181305db6990741b86db64198717df6
                      • Instruction Fuzzy Hash: 2521E3B5D00218EFDB10CFAAD984ADEBBF4EB48310F14801AE958A7350D375A954DFA5
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0109D2C6,?,?,?,?,?), ref: 0109D387
                      Memory Dump Source
                      • Source File: 00000000.00000002.1363035199.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1090000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 72040fc2e28960d3f884d77c862bcf4c91839b7be431ff6fd58ddfff579d1271
                      • Instruction ID: f949bafddd4d236539a7e47b3733fc03b5f349296f4a68d1c096aa49cfb13d38
                      • Opcode Fuzzy Hash: 72040fc2e28960d3f884d77c862bcf4c91839b7be431ff6fd58ddfff579d1271
                      • Instruction Fuzzy Hash: C22100B5D002189FDB10CFAAD884ADEBBF4FB48310F10801AE968A3310C378A944CFA4
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0109B101,00000800,00000000,00000000), ref: 0109B312
                      Memory Dump Source
                      • Source File: 00000000.00000002.1363035199.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1090000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: e4ab72997f071c71d88b94b8e32c2aea903fa04ed9c3182a7a4caeb9ee742e43
                      • Instruction ID: f380f807dab47f11d7d59a4b06638bb18fa7aa2aea1aa4b9824f8e416e69a190
                      • Opcode Fuzzy Hash: e4ab72997f071c71d88b94b8e32c2aea903fa04ed9c3182a7a4caeb9ee742e43
                      • Instruction Fuzzy Hash: 621129B6D003498FDB14CFAAD844ADEFBF4EB48320F10851ED969A7200C3759545CFA5
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0109B101,00000800,00000000,00000000), ref: 0109B312
                      Memory Dump Source
                      • Source File: 00000000.00000002.1363035199.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1090000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: d564473414f84ab9b14e67885287f3a0a197b1a1b1a971a1015fc53af489de7c
                      • Instruction ID: 244479d652f833419f264e1e1e5b3ab2b184472f7d17524d96d271e19db66ef8
                      • Opcode Fuzzy Hash: d564473414f84ab9b14e67885287f3a0a197b1a1b1a971a1015fc53af489de7c
                      • Instruction Fuzzy Hash: 071103B6D003499FDB20CF9AD444A9EFBF4EB48320F10856EE969A7200C375A545CFA5
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0109B086
                      Memory Dump Source
                      • Source File: 00000000.00000002.1363035199.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1090000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: f3153627663d07800235f87f166e9a3ed41833920aff162eed740260ed1f47af
                      • Instruction ID: 4fbcff4db7a5a881766f02f57d6107260bbfddd07dedab9076daafb9479e2f86
                      • Opcode Fuzzy Hash: f3153627663d07800235f87f166e9a3ed41833920aff162eed740260ed1f47af
                      • Instruction Fuzzy Hash: BF1110B6C003498FDB20CF9AD444BDEFBF4AB88224F10855AD468B7210C37AA545CFA5
                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 07968D9D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: 8238ba16bca343a547f4658f5092d690ff55c716fc816960ad5b7cd2c5cc5fa7
                      • Instruction ID: c2e9db9a760a5de166e1bf9a62841213390f46659e6f24e04b00ba3896dd42a0
                      • Opcode Fuzzy Hash: 8238ba16bca343a547f4658f5092d690ff55c716fc816960ad5b7cd2c5cc5fa7
                      • Instruction Fuzzy Hash: 271136B58003499FDB20CF9AC488BDEBBF8FB48314F10841AE514A7300C375A944CFA5
                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,?), ref: 07968D9D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: 021f78efb4bbd4da1b4dd89dff483757ec94af508966cf8a936e8ce7b111c766
                      • Instruction ID: 3143d8c927f3086b5111cfb7a5652c642a1a6a2cbfc945abfc86cc8599aa3705
                      • Opcode Fuzzy Hash: 021f78efb4bbd4da1b4dd89dff483757ec94af508966cf8a936e8ce7b111c766
                      • Instruction Fuzzy Hash: B21136B59003599FDB20CF99D888BDEFFF8EB48320F20850AE558A7240C3756544CFA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1362787770.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_103d000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7255670b4f48d18ab44742b020d38700e3c9941dacd3847a2d3794d369c9b653
                      • Instruction ID: f27b41cc3c1fa3d4ec653f0479c510020e9e0b47da5ac2ed79e1d40f055cde73
                      • Opcode Fuzzy Hash: 7255670b4f48d18ab44742b020d38700e3c9941dacd3847a2d3794d369c9b653
                      • Instruction Fuzzy Hash: 67214B75500240EFDF16DF54D9C0B1ABBA9FBC8314F60C698E9890F246C336D412DBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1362787770.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_103d000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b9db6590da1e1abcb15d17509447cf015e177e30916f950496d730aef3797cac
                      • Instruction ID: 2bd960c6952d9b5168ed0eb6882ef90053a0cc32d05c7aa58494f113ce059b78
                      • Opcode Fuzzy Hash: b9db6590da1e1abcb15d17509447cf015e177e30916f950496d730aef3797cac
                      • Instruction Fuzzy Hash: B5213371504200EFDB15DF94D9C0B5ABBA9FBC8324F20C5A9E94A0F256C736E456CBA2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1362824059.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_104d000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e0798213ec94f90315c998950d85346c18554ac944a0056955279fc8c004374
                      • Instruction ID: b8b8d244b6c3875dacca803492b6e60ec9ec56f56b3c11cc930f71ab60a8460d
                      • Opcode Fuzzy Hash: 7e0798213ec94f90315c998950d85346c18554ac944a0056955279fc8c004374
                      • Instruction Fuzzy Hash: 9621D3B1504300DFDB25DFA4D5C4B16BBA5EB94314F20C5BDE98A4B256C336D447CB61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1362824059.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_104d000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a3c7ca55bad1af360a1645e9d40683a39278ba62920e7697660a4e6efe681f0c
                      • Instruction ID: cb00c75aa5a964822f23ae6132ea8f4e26d3f5268b46236477bdcd2f13379d9e
                      • Opcode Fuzzy Hash: a3c7ca55bad1af360a1645e9d40683a39278ba62920e7697660a4e6efe681f0c
                      • Instruction Fuzzy Hash: 4D2183B55083809FCB12CF54D9D4711BFB1EB46214F24C5EAD8898F2A7C33A9806CB62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1362787770.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_103d000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 768dc57047f853eeb21c306de65d75245ca6a2e1656418214d17e77524cda1ad
                      • Instruction ID: ce383b61ffaa722f29e8b0075b46e980b47a2ce4b16cfea36848689c66ac009b
                      • Opcode Fuzzy Hash: 768dc57047f853eeb21c306de65d75245ca6a2e1656418214d17e77524cda1ad
                      • Instruction Fuzzy Hash: C1219D76504280DFCB16CF54D9C4B16BFB2FB88314F2486A9E9890B657C33AD426CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1362787770.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_103d000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                      • Instruction ID: 181d4f1d59768408b420df079b253b150e79bedc59cabbc794fabdee18be4be2
                      • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                      • Instruction Fuzzy Hash: 3711E172404240CFCB12CF54D5C4B56BFB1FB84324F24C6A9D9490B657C33AE456CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1362787770.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_103d000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 56769b82d15a4210c20221b988741a4e00662a1279e76f4e464f6e7ac9cd268f
                      • Instruction ID: a84c1402df331a93a8643f9537811b71dcf8b3fa0c2ee564731408473851c864
                      • Opcode Fuzzy Hash: 56769b82d15a4210c20221b988741a4e00662a1279e76f4e464f6e7ac9cd268f
                      • Instruction Fuzzy Hash: 2C01F7715087409BE7208E96CD84766BBDCDF80220F48855AED884F282C2359845CBB2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1362787770.000000000103D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0103D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_103d000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f2137e4af4505ced4c8a1626569bb7c5e7e25ce54dbbd62627a69db5a30d77e
                      • Instruction ID: dcf1657a7b3b422000f483d848a9d228587f05485a880c40861f478577698a3a
                      • Opcode Fuzzy Hash: 3f2137e4af4505ced4c8a1626569bb7c5e7e25ce54dbbd62627a69db5a30d77e
                      • Instruction Fuzzy Hash: 82F062715087549EE7208E5ADA84B62FFDCEB81724F18C59AED485F283C3799844CB71
                      Memory Dump Source
                      • Source File: 00000000.00000002.1368743870.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ff0000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 89a8b39eab793a796b86f743d18df8a30ef093e035902b9c2b464eea1c90c359
                      • Instruction ID: 83c1e826a6f9e134521a7e50f0b19f0b25a82630c188619d47061669997581f4
                      • Opcode Fuzzy Hash: 89a8b39eab793a796b86f743d18df8a30ef093e035902b9c2b464eea1c90c359
                      • Instruction Fuzzy Hash: 8612B9F2E997658BD310CF25F84C2A93BB1BB41318FD24A09D2611F2E6DBB4156ACF44
                      Memory Dump Source
                      • Source File: 00000000.00000002.1363035199.0000000001090000.00000040.00000800.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1090000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6401c7fdaac9ab23ceef0c5e83a0f0a4f0bba8939fb911b692a81e8a4380b284
                      • Instruction ID: 6f0243997ce99d58868614b6a081ed06290cfe2fe7a72e916039d5a9bc58318f
                      • Opcode Fuzzy Hash: 6401c7fdaac9ab23ceef0c5e83a0f0a4f0bba8939fb911b692a81e8a4380b284
                      • Instruction Fuzzy Hash: A8A19132E0061A8FCF05DFB8C8505DEBBF2FF84300B1585AAE945AB265DB71D955DB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1368743870.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ff0000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5727a565f0078e12d5334d4c62d3ac38e2d73973fe3c67e142ea27ae54e1ee61
                      • Instruction ID: d60525b812f937883fb0bfc6e1bfe37bf4aa41cb64a3938081e926d8292ce7a4
                      • Opcode Fuzzy Hash: 5727a565f0078e12d5334d4c62d3ac38e2d73973fe3c67e142ea27ae54e1ee61
                      • Instruction Fuzzy Hash: BDC12BB2E987658BD710CF25F8481A97BB1BF81324FD24A09D1612F2E6DBB42466CF44
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e2a68e7a1db6690f05a20a33a2601072530388c57e166780f9d43fff08a3126d
                      • Instruction ID: 757b02b9a6e725411c209656e0122e4ba8a40a797ae6898b057901254ab16ac6
                      • Opcode Fuzzy Hash: e2a68e7a1db6690f05a20a33a2601072530388c57e166780f9d43fff08a3126d
                      • Instruction Fuzzy Hash: D151D474E002188FDB28DF65C941BDEBBB2BF88304F14D1E9D549AB264DB349A81CF55
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cee83a3b30930586bb06992a31136f76f026d3953440bb0c44a6ddd981fd1546
                      • Instruction ID: b80b76c3c7b150ccaf5758e734a0267f75e81663df9d8eecee2bdef91492271d
                      • Opcode Fuzzy Hash: cee83a3b30930586bb06992a31136f76f026d3953440bb0c44a6ddd981fd1546
                      • Instruction Fuzzy Hash: EB310AB5D003088FEB28CFA6D9496DEFBF6AF89300F14D12AD419AB254DB711846CF54
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e386cb18a7d4a81ad3d5069b0fbba5e24ddc59bdc8e5f31df7e9ae6eb13c0fe2
                      • Instruction ID: f0e207ab648db1139be5956a73f552f0db1a2b23bdc4b9846c59a91933492336
                      • Opcode Fuzzy Hash: e386cb18a7d4a81ad3d5069b0fbba5e24ddc59bdc8e5f31df7e9ae6eb13c0fe2
                      • Instruction Fuzzy Hash: 1F312BB5D0021C8BEB28CF7AD949BDEBBF6AF85314F14C26AD409A7255DB700985CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1374757099.0000000007960000.00000040.00000800.00020000.00000000.sdmp, Offset: 07960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_7960000_Bankcopyscanneddoc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 74c2f5c469ae64c25b395a59b23f97e2764c68814edfc797d476da30f50c46af
                      • Instruction ID: 211055d06c92877f585fb68788c0cd86ca049310c9438d840aafae6b6e06f91b
                      • Opcode Fuzzy Hash: 74c2f5c469ae64c25b395a59b23f97e2764c68814edfc797d476da30f50c46af
                      • Instruction Fuzzy Hash: 0AE092B0C5560EDAD7149FA1C0097FEFA747B46318FA06909840673281CAB08A488F65